Exam 17: Computer Crime
Exam 1: Criminal Investigation an Overview71 Questions
Exam 2: Documenting the Crime Scene Note Taking Photographing and Sketching86 Questions
Exam 3: Writing Effective Reports69 Questions
Exam 4: Searches68 Questions
Exam 5: Forensics Physical Evidence69 Questions
Exam 6: Obtaining Information and Intelligence70 Questions
Exam 7: Identifying and Arresting Suspects70 Questions
Exam 8: Death Investigations75 Questions
Exam 9: Assault Domestic Violence Stalking and Elder Abuse70 Questions
Exam 10: Sex Offenses69 Questions
Exam 11: Crimes Against Children69 Questions
Exam 12: Robbery70 Questions
Exam 13: Burglary70 Questions
Exam 14: Larency Theft Fraud and White Collar Crime70 Questions
Exam 15: Motor Vehicle Theft67 Questions
Exam 16: Arson Bombs and Explosives71 Questions
Exam 17: Computer Crime69 Questions
Exam 18: A Dual Threat Drug Related Crime and Organized Crime70 Questions
Exam 19: Criminal Activities of Gangs and Other Dangerous Groups70 Questions
Exam 20: Terrorism and Homeland Security69 Questions
Exam 21: Preparing for and Presenting Cases in Court68 Questions
Select questions type
Less than one percent of U.S.residents aged 16 or older were victims of identity theft in 2012.
Free
(True/False)
4.8/5
(42)
Correct Answer:
False
Intentionally destroying computer information, programs, or hardware using a logic bomb is classified as:
Free
(Multiple Choice)
4.9/5
(25)
Correct Answer:
D
The suffixes ".com," ".gov," and ".int" are common examples of ISPs.
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
Investigators do not need to be concerned that digital evidence may also contain physical evidence such as DNA, fingerprints, or serology.
(True/False)
4.8/5
(40)
_______________ involves the hijacking of a domain name in order to redirect online traffic toward a bogus Web site.
(Essay)
4.7/5
(32)
Which of the following is one of the three general categories of cybercriminals?
(Multiple Choice)
4.7/5
(30)
List and briefly describe the various resources (agencies or organizations) available to help law enforcement investigate computer crimes.
(Essay)
4.9/5
(38)
What type of material should be used when packaging electronic evidence?
(Multiple Choice)
4.8/5
(27)
Transmission of computer viruses and worms may be prosecuted under the federal provisions of the computer fraud and abuse statute relating to damage to computer systems and files.
(True/False)
4.7/5
(31)
Which of the following statements about reshipper schemes is correct?
(Multiple Choice)
4.8/5
(37)
What did the Supreme Court decide in the case of Ashcroft v.Free Speech Coalition (2002) where the
issue involved the use of "virtual" child pornography?
(Essay)
4.8/5
(31)
Define the "ON/OFF rule" and explain why it is imperative in any cybercrime investigation.
(Essay)
4.8/5
(23)
Most computer crimes against businesses and organizations are committed by outsiders.
(True/False)
4.8/5
(32)
Adware is a covert way to advertise on Web sites without having to pay a fee.
(True/False)
4.8/5
(40)
Showing 1 - 20 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)