Exam 17: Computer Crime
Exam 1: Criminal Investigation an Overview71 Questions
Exam 2: Documenting the Crime Scene Note Taking Photographing and Sketching86 Questions
Exam 3: Writing Effective Reports69 Questions
Exam 4: Searches68 Questions
Exam 5: Forensics Physical Evidence69 Questions
Exam 6: Obtaining Information and Intelligence70 Questions
Exam 7: Identifying and Arresting Suspects70 Questions
Exam 8: Death Investigations75 Questions
Exam 9: Assault Domestic Violence Stalking and Elder Abuse70 Questions
Exam 10: Sex Offenses69 Questions
Exam 11: Crimes Against Children69 Questions
Exam 12: Robbery70 Questions
Exam 13: Burglary70 Questions
Exam 14: Larency Theft Fraud and White Collar Crime70 Questions
Exam 15: Motor Vehicle Theft67 Questions
Exam 16: Arson Bombs and Explosives71 Questions
Exam 17: Computer Crime69 Questions
Exam 18: A Dual Threat Drug Related Crime and Organized Crime70 Questions
Exam 19: Criminal Activities of Gangs and Other Dangerous Groups70 Questions
Exam 20: Terrorism and Homeland Security69 Questions
Exam 21: Preparing for and Presenting Cases in Court68 Questions
Select questions type
Cyberterrorism is a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets.
(True/False)
4.8/5
(28)
What are some of the essential questions that investigators should ask when interviewing employees and staff at a business or organization that has been the victim of computer crime?
(Essay)
4.8/5
(32)
What are some of the guidelines investigators must adhere to when dealing with physical evidence in a computer crime case?
(Essay)
4.7/5
(44)
Common protocol for processing a crime scene involving electronic evidence includes which of the following?
(Multiple Choice)
4.9/5
(37)
Data is the residual physical representation of data that have been erased.
(Essay)
4.9/5
(41)
Keystroke logging is used in espionage to bypass security measures and obtain passwords.
(True/False)
4.7/5
(40)
A search warrant is needed to search a computer connected to the Internet.
(True/False)
4.9/5
(35)
The Privacy Protection Act establishes that investigators are allowed to seize drafts of newsletters or Web pages if there is reason to believe that the seizure is necessary in order to prevent death or serious bodily injury.
(True/False)
4.9/5
(30)
Because successful criminal prosecution of intellectual property theft requires reliable investigative resources, the Cyber Division and the Intellectual Property Rights Division were created by the _______________ to investigate intellectual property theft and fraud.
(Essay)
4.8/5
(31)
Perverted Justice is an Internet-based organization that is committed to assisting victims of cybercrime.
(True/False)
4.7/5
(40)
Spyware is most commonly used to infiltrate national security systems, with the ultimate goal of disarming national defense systems.
(True/False)
4.8/5
(42)
It may be possible to retrieve electronic memory devices within cell phones.
(True/False)
4.8/5
(39)
A computer program such as Google Chrome that accesses and displays data from the Internet or other networks is called a(n) ______________.
(Essay)
4.9/5
(25)
A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a:
(Multiple Choice)
4.8/5
(38)
Computer crimes can also include hidden messages or images, which may appear as an innocent cover message
or picture.The Greek word for "hidden writing" refers to this process as .
(Essay)
4.9/5
(32)
Most e-crimes are handled without involving legal action or law enforcement.
(Essay)
4.9/5
(26)
Showing 41 - 60 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)