Exam 4: Contemporary Computer Crime
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
What are some of the malwares employed by terrorists, hacktivists, corporate spies, criminals, and pleasure seekers?
(Essay)
4.9/5
(30)
Match the following categories of crimes with examples.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(39)
The process of buying and selling highly speculative stocks within one trading day is known as ________.
(Short Answer)
4.8/5
(29)
An aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him-or herself is known as ________.
(Short Answer)
4.8/5
(46)
Which of the following statements regarding online gaming is untrue?
(Multiple Choice)
4.9/5
(44)
Discuss the process of money laundering and the methods of combating it in the computer era.
(Essay)
4.8/5
(29)
Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?
(Multiple Choice)
4.9/5
(42)
A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.
(Multiple Choice)
4.9/5
(33)
Which of the following refers to redirecting thin slices of accounts into a designated location?
(Multiple Choice)
4.8/5
(45)
Cybervandalism and cyberterrorism are examples of which category of online crime?
(Multiple Choice)
4.9/5
(38)
The ultimate goal of ransomware can be realized only when a secure method of payment is available.
(True/False)
4.8/5
(40)
Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?
(Multiple Choice)
4.8/5
(26)
Vengeance or terrorist stalkers are motivated by either economic gain or revenge.
(True/False)
4.7/5
(36)
Which of the following is NOT a primary motivation for the possession of child pornography?
(Multiple Choice)
4.9/5
(42)
A deliberate politically or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target is known as cyberterrorism.
(True/False)
4.8/5
(40)
Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?
(Multiple Choice)
5.0/5
(39)
________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.
(Short Answer)
4.8/5
(31)
A malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange is termed as ________.
(Short Answer)
4.8/5
(46)
Engaging in deliberate financial transactions to conceal the identity, source, and/or destination of income is known as ________.
(Short Answer)
4.9/5
(29)
Showing 21 - 40 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)