Exam 17: Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Less than one percent of U.S.residents aged 16 or older were victims of identity theft in 2012.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

False

Intentionally destroying computer information, programs, or hardware using a logic bomb is classified as:

Free
(Multiple Choice)
4.9/5
(25)
Correct Answer:
Verified

D

The suffixes ".com," ".gov," and ".int" are common examples of ISPs.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

Very few states have enacted computer crime statutes.

(True/False)
4.8/5
(33)

Port scanning is:

(Multiple Choice)
4.8/5
(42)

Investigators do not need to be concerned that digital evidence may also contain physical evidence such as DNA, fingerprints, or serology.

(True/False)
4.8/5
(40)

_______________ involves the hijacking of a domain name in order to redirect online traffic toward a bogus Web site.

(Essay)
4.7/5
(32)

Which of the following statements is true?

(Multiple Choice)
4.7/5
(37)

Which of the following is one of the three general categories of cybercriminals?

(Multiple Choice)
4.7/5
(30)

IC3 stands for:

(Multiple Choice)
4.8/5
(36)

List and briefly describe the various resources (agencies or organizations) available to help law enforcement investigate computer crimes.

(Essay)
4.9/5
(38)

Theft of intellectual property:

(Multiple Choice)
4.9/5
(37)

What type of material should be used when packaging electronic evidence?

(Multiple Choice)
4.8/5
(27)

Transmission of computer viruses and worms may be prosecuted under the federal provisions of the computer fraud and abuse statute relating to damage to computer systems and files.

(True/False)
4.7/5
(31)

Which of the following statements about reshipper schemes is correct?

(Multiple Choice)
4.8/5
(37)

What did the Supreme Court decide in the case of Ashcroft v.Free Speech Coalition (2002) where the issue involved the use of "virtual" child pornography?

(Essay)
4.8/5
(31)

Define the "ON/OFF rule" and explain why it is imperative in any cybercrime investigation.

(Essay)
4.8/5
(23)

Most computer crimes against businesses and organizations are committed by outsiders.

(True/False)
4.8/5
(32)

Which of the following statements is true?

(Multiple Choice)
4.9/5
(33)

Adware is a covert way to advertise on Web sites without having to pay a fee.

(True/False)
4.8/5
(40)
Showing 1 - 20 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)