Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
Which of the following is true of the infamous hacking board Plovernet?
(Multiple Choice)
4.9/5
(35)
Which of the following hacking-related developments occurred during the 1990s?
(Multiple Choice)
4.9/5
(33)
Which of the following is the least destructive category of hackers?
(Multiple Choice)
4.8/5
(41)
Traditionally, criminal statutes were predicated on the ________ of the criminal act.
(Short Answer)
4.8/5
(38)
Match the following terms with their descriptions.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(48)
Fry Guy and the Atlanta Three were directly responsible for the downfall of the Legion of Doom (LoD).
(True/False)
4.8/5
(31)
The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.
(Short Answer)
4.7/5
(37)
Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.
(Short Answer)
4.8/5
(40)
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?
(Multiple Choice)
4.8/5
(46)
________ involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services.
(Short Answer)
4.7/5
(41)
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?
(Multiple Choice)
4.8/5
(36)
________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.
(Short Answer)
4.9/5
(44)
Operations known as ________ involve prepaid calls being sold on the street using stolen access or PBX codes during operations.
(Short Answer)
4.9/5
(38)
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?
(Multiple Choice)
4.8/5
(38)
Match the following tools with their uses.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(45)
Which was the first event to signal the potential of computer crime?
(Multiple Choice)
4.8/5
(38)
Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.
(Short Answer)
4.9/5
(42)
Insiders pose the most overrated danger to informational security.
(True/False)
4.8/5
(44)
Showing 41 - 60 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)