Exam 1: Introduction and Overview of Computer Forensics and Cybercrime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is NOT a problem in the investigation of cybercrime?

(Multiple Choice)
4.8/5
(39)

Which of the following has been characterized as "a social networking site on steroids"?

(Multiple Choice)
4.8/5
(35)

Which of the following is true of the Digital Revolution?

(Multiple Choice)
4.9/5
(36)

Law enforcement has been threatened and weakened by the advent of the Internet and has not been able to benefit from it.

(True/False)
4.9/5
(36)

In addition to costs associated with training, administrators must consider three additional areas in support of computer crime investigations: ________.

(Short Answer)
4.8/5
(33)

Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?

(Multiple Choice)
4.9/5
(41)

The Information or Digital Revolution has exacerbated the vulnerabilities of government institutions and personal residences alike.

(True/False)
4.8/5
(40)

Increasing dependence on cyber information is one of the disadvantages of the Internet.

(True/False)
4.9/5
(39)

Barlow and Gilmore created the ________ to demonstrate that the Secret Service had conducted itself in an arbitrary, oppressive, and unconstitutional manner.

(Short Answer)
4.9/5
(35)

Much computer-related crime involves specialist users.

(True/False)
4.9/5
(35)

Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?

(Multiple Choice)
4.8/5
(38)

Cyberspace is the indefinite place where individuals transact and communicate.

(True/False)
4.7/5
(44)

Evaluate some of the innovative payment mechanisms that can be targeted by cyber criminals.

(Essay)
4.9/5
(32)

Investigators and administrators have displayed a zealous commitment to pursuing computer criminals.

(True/False)
4.8/5
(36)

________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.

(Multiple Choice)
4.8/5
(38)

________ have historically been divided into three categories: computer as a target, computer as an instrument, and computer as an incidental.

(Short Answer)
4.8/5
(32)

Which of the following e-payment methods stores funds on an integrated circuit chip in the card?

(Multiple Choice)
4.7/5
(42)

________ purpose cards may be used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.

(Short Answer)
5.0/5
(30)

What is cyberspace? Discuss various terms that pertain to criminal behavior involving computers.

(Essay)
4.9/5
(41)

Expenditures on which area represent a nonrecurring expense for a computer crime unit?

(Multiple Choice)
4.9/5
(30)
Showing 21 - 40 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)