Exam 15: Crimes of the New Millenium Cybercrime

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The two main mediums for cyberbullying include:

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

What are "cyber smears" and "pump and dumps?"

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

C

_________________ is the illegal buying and/or selling of merchandise on the Internet.

Free
(Short Answer)
4.9/5
(32)
Correct Answer:
Verified

E-tailing fraud

Which type of cybercrime consists of acts aimed at undermining the social, economic, and political system of an enemy nation?

(Multiple Choice)
4.8/5
(33)

In 2004, the Identity Theft Penalty Enhancement Act was signed into law; the act increases existing penalties for the crime of identity theft.

(True/False)
5.0/5
(41)

A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.

(True/False)
4.7/5
(31)

Cybervandalism is motivated more by a profit than a cybercriminal's urge to seek revenge.

(True/False)
4.8/5
(27)

The number of Web sites that advertise or sell prescription drugs is booming. The majority of these sites require that a patient provide a prescription from his or her doctor.

(True/False)
4.7/5
(31)

__________________is a new breed of offenses typically involving the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, or the Internet.

(Short Answer)
4.8/5
(39)

Cybercriminals who aim their malicious attacks at disrupting, defacing, and destroying technology that they find offensive are known as____________________.

(Multiple Choice)
4.9/5
(32)

When an identity thief creates false e-mails and/or Web sites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:

(Multiple Choice)
4.9/5
(31)

The Electronic Crimes Task Force is operated by the DEA.

(True/False)
4.8/5
(36)

The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.

(True/False)
4.7/5
(30)

Define what is meant by phishing and identity theft .

(Essay)
4.9/5
(35)

Using the Internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim's name is known as ______________.

(Short Answer)
4.9/5
(30)

Sharing files with friends who did not pay for them is an example of:

(Multiple Choice)
4.9/5
(33)

_________ crimes are challenging for criminologists to explain because they defy long-held assumptions about the cause of crime.

(Short Answer)
4.8/5
(24)

Using cyberspace for acts of violence, including spying and disrupting an enemy's computer network is known as ___________________.

(Short Answer)
4.9/5
(35)

While many wonder how people can be so easily duped, the government's Internet fraud center receives 200,000 complaints yearly, and Internet scams result in over ____ in losses each year.

(Multiple Choice)
4.9/5
(33)

Because of a new portion of the D.A.R.E. program, cyberbullying has decreased by nearly 27% in recent years.

(True/False)
4.7/5
(33)
Showing 1 - 20 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)