Exam 4: Contemporary Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are some of the malwares employed by terrorists, hacktivists, corporate spies, criminals, and pleasure seekers?

(Essay)
4.9/5
(30)
Match the following categories of crimes with examples.
Interference with lawful use of computer's
Cybervandalism, cyberterrorism
Ancillary crimes
Money laundering and conspiracy
Theft of information and copyright infringement
Industrial espionage and ID fraud
Correct Answer:
Verified
Premises:
Responses:
Interference with lawful use of computer's
Cybervandalism, cyberterrorism
Ancillary crimes
Money laundering and conspiracy
Theft of information and copyright infringement
Industrial espionage and ID fraud
(Matching)
4.8/5
(39)

The process of buying and selling highly speculative stocks within one trading day is known as ________.

(Short Answer)
4.8/5
(29)

An aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him-or herself is known as ________.

(Short Answer)
4.8/5
(46)

Which of the following statements regarding online gaming is untrue?

(Multiple Choice)
4.9/5
(44)

Discuss the process of money laundering and the methods of combating it in the computer era.

(Essay)
4.8/5
(29)

Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?

(Multiple Choice)
4.9/5
(42)

A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.

(Multiple Choice)
4.9/5
(33)

Which of the following refers to redirecting thin slices of accounts into a designated location?

(Multiple Choice)
4.8/5
(45)

Cybervandalism and cyberterrorism are examples of which category of online crime?

(Multiple Choice)
4.9/5
(38)

The ultimate goal of ransomware can be realized only when a secure method of payment is available.

(True/False)
4.8/5
(40)

Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?

(Multiple Choice)
4.8/5
(26)

Vengeance or terrorist stalkers are motivated by either economic gain or revenge.

(True/False)
4.7/5
(36)

Which of the following is NOT a primary motivation for the possession of child pornography?

(Multiple Choice)
4.9/5
(42)

A deliberate politically or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target is known as cyberterrorism.

(True/False)
4.8/5
(40)

Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?

(Multiple Choice)
5.0/5
(39)

Which of the following best defines shoulder surfing?

(Multiple Choice)
4.9/5
(27)

________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.

(Short Answer)
4.8/5
(31)

A malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange is termed as ________.

(Short Answer)
4.8/5
(46)

Engaging in deliberate financial transactions to conceal the identity, source, and/or destination of income is known as ________.

(Short Answer)
4.9/5
(29)
Showing 21 - 40 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)