Exam 17: Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

NW3C stands for:

(Multiple Choice)
4.9/5
(33)

How can computer crimes be prevented? Who is primarily responsible for putting new policies into place?

(Essay)
5.0/5
(49)

A virus attack may replace or destroy data on the computer's hard drive and:

(Multiple Choice)
4.8/5
(37)

How could the Privacy Protection Act (PPA) impact a computer crime investigation? What issues should be considered?

(Essay)
4.9/5
(35)

_______________ is any procedure used in cryptography to convert plain text into cipher-text to prevent anyone but the intended recipient from reading the data.

(Essay)
4.9/5
(44)

What are the elements of common protocol for processing a crime scene involving electronic evidence?

(Essay)
4.8/5
(31)

Discuss some of the challenges of investigating a business environment versus a stand-alone computer.

(Essay)
4.9/5
(34)

An attempt to get victims to disclose personal, sensitive information such as passwords and bank account numbers is referred to as phishing.

(True/False)
4.9/5
(37)

A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:

(Multiple Choice)
4.9/5
(36)

Cybercriminals are solitary by nature and rarely operate in groups.

(True/False)
4.9/5
(39)

Outline some examples of the type of computer crime evidence that may be found in an investigation.

(Essay)
4.7/5
(43)

Which process is often considered synonymous with phishing and involves acquiring unauthorized access to a computer or network through a message using an IP address appearing to be from a trusted host, in an attempt to commit identity theft?

(Multiple Choice)
4.9/5
(40)

Skimming is defined as:

(Multiple Choice)
4.9/5
(33)

Discuss some of the difficulties in reporting, investigating, and prosecuting Internet crimes that are transnational in scope.

(Essay)
4.9/5
(36)

Outline the NetSmartz program, including its mission and how it has been implemented.

(Essay)
4.9/5
(39)

Viruses are more powerful and destructive than worms.

(True/False)
4.9/5
(32)

The terms Internet and Web are basically interchangeable.

(True/False)
4.9/5
(32)

Child pornography, fraud, and gambling are examples of crimes in which the computer is used as a(n) _______________.

(Essay)
4.7/5
(36)

Computer evidence is:

(Multiple Choice)
4.9/5
(30)

The biggest difference between traditional evidence and computer evidence is the latter's:

(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)