Exam 5: Cybercrime Law: a European Perspective
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
An example of a content-related crime would be:
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
In the EU, computer-assisted crimes consist of those crimes which cannot be committed in the absence of computers or computer networks.
Free
(True/False)
4.7/5
(32)
Correct Answer:
False
In the EU, crimes like illegal access, illegal interception, and data interference are categorized as computer-integrity crimes.
Free
(True/False)
4.8/5
(29)
Correct Answer:
True
Data interference is the intentional "serious hindering without right to the functioning of a computer system."
(True/False)
4.7/5
(32)
The English Sentencing Advisory Panel (SAP) categorized the increasing seriousness of child pornography material into five levels. Which of the following is considered the worst, level 5?
(Multiple Choice)
4.8/5
(31)
According to the CoE Convention on Cybercrime, it is not illegal to break into a computer provided the intruder does not cause any damage.
(True/False)
4.7/5
(32)
In England, child prostitution and pornography are scheduled offenses to the English
Serious Crime Act 2007.
(True/False)
4.9/5
(37)
In the EU, content-related crimes relate to traditional offenses where computers are tools rather than targets but, unlike computer-assisted crimes it is the content of data rather than the result of an action that is the core of the offense.
(True/False)
4.8/5
(41)
The Netherlands claims universal jurisdiction for the crime of:
(Multiple Choice)
4.7/5
(35)
The EU Framework Decision makes illegal access to information systems (intentional, without right). Member states are required to ensure that this is:
(Multiple Choice)
4.8/5
(26)
In the UK, prosecution of child pornography falls under what Act?
(Multiple Choice)
4.9/5
(34)
In the UK, downloading child pornography is equated with "making" illegal material according to the legal definition.
(True/False)
4.9/5
(24)
In Ireland, the Non-Fatal Offences Against the State Act of 1997 specifically addresses:
(Multiple Choice)
4.8/5
(36)
How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?
(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)