Exam 4: Contemporary Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What, in your opinion, are the factors that make online gambling attractive to customers?

(Essay)
4.8/5
(31)

Discuss various methods of criminal theft of information or data manipulation.

(Essay)
4.8/5
(41)

Shill bidding at an auction occurs when a fraudster accepts payment for an item and then fails to deliver it.

(True/False)
4.9/5
(38)

Recent studies indicate that the emergence of cloud computing and removable media has effectively decreased theft of information or breaches in digital security.

(True/False)
4.8/5
(28)

According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.

(Multiple Choice)
4.9/5
(27)

Which of the following is true regarding child pornography in the United States?

(Multiple Choice)
4.8/5
(42)

The possession or distribution of child pornography is jurisdictionally illegal in all 50 states and in all territories under the umbrella of the United States.

(True/False)
4.8/5
(38)

Which of the following refers to a software program or hardware device that records everything you type into a compromised computer?

(Multiple Choice)
4.8/5
(46)

Which of the following is NOT true regarding the success of ransomwares?

(Multiple Choice)
4.8/5
(45)

Which of the following launched the first online casino in 1995 with 18 games?

(Multiple Choice)
4.9/5
(36)

Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?

(Multiple Choice)
4.8/5
(41)

The Macro Era of computer viruses was largely characterized by infection of DOS machines spread by removable media.

(True/False)
4.8/5
(44)

At the dawn of the computer age, the term "computer crime" usually referred to the theft of computers or computer components.

(True/False)
4.7/5
(33)

Compromised computers attached to the Internet, which are often used to remotely perform malicious or criminal tasks, are called ________.

(Short Answer)
4.7/5
(37)

________ is most often accomplished when criminals develop new Web pages for small businesses and nonprofit groups for little or no expense.

(Short Answer)
4.8/5
(33)

Which of the following refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages?

(Multiple Choice)
4.8/5
(43)

Spamming refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages.

(True/False)
4.9/5
(46)

The sale of stolen goods through technological means is known as ________.

(Short Answer)
4.8/5
(30)

An intentional deception, misrepresentation, or falsehood made with the intention of receiving unwarranted compensation or gratification is known as ________.

(Short Answer)
4.8/5
(36)

________ are delusional and believe that their victim is in love with them or has had a previous relationship with them.

(Short Answer)
4.8/5
(41)
Showing 41 - 60 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)