Exam 17: Computer Crime
Exam 1: Criminal Investigation an Overview71 Questions
Exam 2: Documenting the Crime Scene Note Taking Photographing and Sketching86 Questions
Exam 3: Writing Effective Reports69 Questions
Exam 4: Searches68 Questions
Exam 5: Forensics Physical Evidence69 Questions
Exam 6: Obtaining Information and Intelligence70 Questions
Exam 7: Identifying and Arresting Suspects70 Questions
Exam 8: Death Investigations75 Questions
Exam 9: Assault Domestic Violence Stalking and Elder Abuse70 Questions
Exam 10: Sex Offenses69 Questions
Exam 11: Crimes Against Children69 Questions
Exam 12: Robbery70 Questions
Exam 13: Burglary70 Questions
Exam 14: Larency Theft Fraud and White Collar Crime70 Questions
Exam 15: Motor Vehicle Theft67 Questions
Exam 16: Arson Bombs and Explosives71 Questions
Exam 17: Computer Crime69 Questions
Exam 18: A Dual Threat Drug Related Crime and Organized Crime70 Questions
Exam 19: Criminal Activities of Gangs and Other Dangerous Groups70 Questions
Exam 20: Terrorism and Homeland Security69 Questions
Exam 21: Preparing for and Presenting Cases in Court68 Questions
Select questions type
How can computer crimes be prevented? Who is primarily responsible for putting new policies into place?
(Essay)
5.0/5
(49)
A virus attack may replace or destroy data on the computer's hard drive and:
(Multiple Choice)
4.8/5
(37)
How could the Privacy Protection Act (PPA) impact a computer crime investigation? What issues should be considered?
(Essay)
4.9/5
(35)
_______________ is any procedure used in cryptography to convert plain text into cipher-text to prevent anyone but the intended recipient from reading the data.
(Essay)
4.9/5
(44)
What are the elements of common protocol for processing a crime scene involving electronic evidence?
(Essay)
4.8/5
(31)
Discuss some of the challenges of investigating a business environment versus a stand-alone computer.
(Essay)
4.9/5
(34)
An attempt to get victims to disclose personal, sensitive information such as passwords and bank account numbers is referred to as phishing.
(True/False)
4.9/5
(37)
A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:
(Multiple Choice)
4.9/5
(36)
Cybercriminals are solitary by nature and rarely operate in groups.
(True/False)
4.9/5
(39)
Outline some examples of the type of computer crime evidence that may be found in an investigation.
(Essay)
4.7/5
(43)
Which process is often considered synonymous with phishing and involves acquiring unauthorized access to a computer or network through a message using an IP address appearing to be from a trusted host, in an attempt to commit identity theft?
(Multiple Choice)
4.9/5
(40)
Discuss some of the difficulties in reporting, investigating, and prosecuting Internet crimes that are transnational in scope.
(Essay)
4.9/5
(36)
Outline the NetSmartz program, including its mission and how it has been implemented.
(Essay)
4.9/5
(39)
Child pornography, fraud, and gambling are examples of crimes in which the computer is used as a(n)
_______________.
(Essay)
4.7/5
(36)
The biggest difference between traditional evidence and computer evidence is the latter's:
(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)