Exam 17: Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cyberterrorism is a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets.

(True/False)
4.8/5
(28)

What are some of the essential questions that investigators should ask when interviewing employees and staff at a business or organization that has been the victim of computer crime?

(Essay)
4.8/5
(32)

What are some of the guidelines investigators must adhere to when dealing with physical evidence in a computer crime case?

(Essay)
4.7/5
(44)

Common protocol for processing a crime scene involving electronic evidence includes which of the following?

(Multiple Choice)
4.9/5
(37)

Data is the residual physical representation of data that have been erased.

(Essay)
4.9/5
(41)

Keystroke logging is used in espionage to bypass security measures and obtain passwords.

(True/False)
4.7/5
(40)

Cybercrime is:

(Multiple Choice)
4.7/5
(39)

A search warrant is needed to search a computer connected to the Internet.

(True/False)
4.9/5
(35)

The Privacy Protection Act establishes that investigators are allowed to seize drafts of newsletters or Web pages if there is reason to believe that the seizure is necessary in order to prevent death or serious bodily injury.

(True/False)
4.9/5
(30)

Most computer crimes are:

(Multiple Choice)
4.8/5
(37)

Describe the basic elements of a "reshipper scheme."

(Essay)
4.9/5
(31)

Digital evidence is often contained on:

(Multiple Choice)
4.7/5
(33)

Because successful criminal prosecution of intellectual property theft requires reliable investigative resources, the Cyber Division and the Intellectual Property Rights Division were created by the _______________ to investigate intellectual property theft and fraud.

(Essay)
4.8/5
(31)

Perverted Justice is an Internet-based organization that is committed to assisting victims of cybercrime.

(True/False)
4.7/5
(40)

Spyware is most commonly used to infiltrate national security systems, with the ultimate goal of disarming national defense systems.

(True/False)
4.8/5
(42)

It may be possible to retrieve electronic memory devices within cell phones.

(True/False)
4.8/5
(39)

A computer program such as Google Chrome that accesses and displays data from the Internet or other networks is called a(n) ______________.

(Essay)
4.9/5
(25)

A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a:

(Multiple Choice)
4.8/5
(38)

Computer crimes can also include hidden messages or images, which may appear as an innocent cover message or picture.The Greek word for "hidden writing" refers to this process as .

(Essay)
4.9/5
(32)

Most e-crimes are handled without involving legal action or law enforcement.

(Essay)
4.9/5
(26)
Showing 41 - 60 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)