Exam 12: Sex Offenders on the Internet

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Providing information about an offender's method of approach, attack, or control may help investigators interact with an offender or provide potential victims with protective advice.

Free
(True/False)
4.8/5
(43)
Correct Answer:
Verified

True

Detailed knowledge of an offender can help investigators:

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

D

Typically, children are not used in undercover investigations because:

Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
Verified

C

"Grooming" refers to the ways that a sexual offender gains control over victims.

(True/False)
4.9/5
(35)

The process of correlating evidence through temporal, relational, and functional analysis is known as:

(Multiple Choice)
4.8/5
(37)

Sex offender peer support groups can give offenders access to child pornography, children, and technical knowledge.

(True/False)
4.8/5
(38)

Failure to interpret evidence, obtain information from an unknown offender, or apprehend an unknown offender can be caused by:

(Multiple Choice)
4.9/5
(37)

When dealing with online sexual offenders, it is critically important to take advantage of the Internet as a source of evidence.

(True/False)
4.9/5
(32)

Generalizations regarding investigations are of particular use, even though cases tend to be unique.

(True/False)
4.8/5
(33)

If an offender's computer reveals a large number of contacts, a good solution is:

(Multiple Choice)
4.9/5
(29)

When the offender is unknown, the reconstruction process becomes a necessary step to:

(Multiple Choice)
4.8/5
(26)

An offender's choice of location, tools, and actions taken are referred to as:

(Multiple Choice)
4.7/5
(35)

The initial stage of any investigation is to determine if a crime has actually occurred.

(True/False)
4.7/5
(41)

Confronting the victim with evidence of their abuse is standard practice in sex offender cases.

(True/False)
4.8/5
(32)

Because sex offenders tend to be nonviolent, investigators do not need to take the same precautions when serving warrants on computer-related offenses as they would with other crimes.

(True/False)
4.8/5
(37)

An accepted method of conducting undercover investigations involves using a minor, especially if the minor is the victim.

(True/False)
4.9/5
(39)

Which of the following is an impact of sex offender peer support groups?

(Multiple Choice)
4.9/5
(30)

Lanning identifies three general categories of sex offenders: situational, preferential, and differential.

(True/False)
4.9/5
(41)

Given the potential for concealment in sex offender cases, it is important to examine all digital evidence carefully rather than simply searching for a obvious items such as images that are not hidden.

(True/False)
4.8/5
(36)

Discuss the responsibility of the digital investigator in bringing charges of sex offense or possession of child pornography against a member of the local community.

(Essay)
4.8/5
(35)
Showing 1 - 20 of 31
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)