Exam 4: Contemporary Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Misrepresentation occurs in an auction when a fraudster deceives the bidder as to the item's ________.

Free
(Short Answer)
4.9/5
(42)
Correct Answer:
Verified

condition

Which of the following is NOT true regarding child pornography and child exploitation?

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

B

Like the majority of malware, whose survival is almost entirely contingent upon concealment, ransomware does not proclaim its existence at inception.

Free
(True/False)
5.0/5
(29)
Correct Answer:
Verified

False

The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.

(Multiple Choice)
4.8/5
(37)

Victims of harassment and stalking are overwhelmingly females or children.

(True/False)
4.7/5
(44)

________ may be defined as the willful, malicious, and repeated following and/ or harassing of another person in an effort to inflict or cause fear of actual harm through words or deeds.

(Short Answer)
4.8/5
(47)

To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.

(Multiple Choice)
4.9/5
(39)

Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?

(Multiple Choice)
4.7/5
(31)
Match the following descriptions with eras of computer viruses.
Infection of DOS machines spread by removable media
The Classical Era
The introduction of group of publicized infections such as CodeRed and Sir Cam, with new methods of replication
The Floppy Era
System anomalies occurred accidentally or as a result of pranks by programers or system administrators
The Internet Era
Correct Answer:
Verified
Premises:
Responses:
Infection of DOS machines spread by removable media
The Classical Era
The introduction of group of publicized infections such as CodeRed and Sir Cam, with new methods of replication
The Floppy Era
System anomalies occurred accidentally or as a result of pranks by programers or system administrators
The Internet Era
(Matching)
4.8/5
(37)

Stealing credit card information by installing devices on magnetic card readers located in ATMs and gas pumps is known as data diddling.

(True/False)
4.8/5
(36)

Which of the following is atypical of both physical stalkers and cyberstalkers?

(Multiple Choice)
4.8/5
(41)

Discuss how a traditional crime such as dissemination of contraband and offensive materials has reappeared in the computer era.

(Essay)
4.7/5
(35)

Which of the following eras of computer viruses is largely characterized by infection of DOS machines spread by removable media?

(Multiple Choice)
4.9/5
(40)

Rootkit is a software program or hardware device that records all keystrokes of a compromised computer.

(True/False)
4.9/5
(41)

________ refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges.

(Short Answer)
4.9/5
(47)

According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are black males who are under the age of 25.

(True/False)
4.8/5
(27)

Which of the following refers to the sale of stolen goods through technological means?

(Multiple Choice)
4.8/5
(39)

________ stalkers seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.

(Short Answer)
4.8/5
(31)

________ involves disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers.

(Short Answer)
4.8/5
(36)

The SAFE DOSES Act targets computer malware attacks.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)