Exam 4: Contemporary Computer Crime
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
Misrepresentation occurs in an auction when a fraudster deceives the bidder as to the item's ________.
Free
(Short Answer)
4.9/5
(42)
Correct Answer:
condition
Which of the following is NOT true regarding child pornography and child exploitation?
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
B
Like the majority of malware, whose survival is almost entirely contingent upon concealment, ransomware does not proclaim its existence at inception.
Free
(True/False)
5.0/5
(29)
Correct Answer:
False
The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.
(Multiple Choice)
4.8/5
(37)
Victims of harassment and stalking are overwhelmingly females or children.
(True/False)
4.7/5
(44)
________ may be defined as the willful, malicious, and repeated following and/ or harassing of another person in an effort to inflict or cause fear of actual harm through words or deeds.
(Short Answer)
4.8/5
(47)
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.
(Multiple Choice)
4.9/5
(39)
Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?
(Multiple Choice)
4.7/5
(31)
Match the following descriptions with eras of computer viruses.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
Stealing credit card information by installing devices on magnetic card readers located in ATMs and gas pumps is known as data diddling.
(True/False)
4.8/5
(36)
Which of the following is atypical of both physical stalkers and cyberstalkers?
(Multiple Choice)
4.8/5
(41)
Discuss how a traditional crime such as dissemination of contraband and offensive materials has reappeared in the computer era.
(Essay)
4.7/5
(35)
Which of the following eras of computer viruses is largely characterized by infection of DOS machines spread by removable media?
(Multiple Choice)
4.9/5
(40)
Rootkit is a software program or hardware device that records all keystrokes of a compromised computer.
(True/False)
4.9/5
(41)
________ refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges.
(Short Answer)
4.9/5
(47)
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are black males who are under the age of 25.
(True/False)
4.8/5
(27)
Which of the following refers to the sale of stolen goods through technological means?
(Multiple Choice)
4.8/5
(39)
________ stalkers seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
(Short Answer)
4.8/5
(31)
________ involves disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers.
(Short Answer)
4.8/5
(36)
Showing 1 - 20 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)