Exam 9: Crimes in the Cyber System

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If a computer virus is not introduced into a computer by an intruder, what is the intruder's probable goal?

(Multiple Choice)
4.9/5
(47)

A group of infected computers online, under the control of one cyber offender at the same time, is known as what type of computer crime?

(Multiple Choice)
4.7/5
(46)

Describe counterfeiting software crimes.

(Essay)
4.9/5
(36)

When cyber offenders steal information for profit, what is one way they sell stolen information?

(Multiple Choice)
4.8/5
(38)

What type of computer crime is most prevalent on college campuses?

(Multiple Choice)
4.8/5
(37)

The Computer Fraud and Abuse Act of 1984, broadened in 1996 to make various aspects of computer offending a federal crime, is what strategy for responding to cybercrime?

(Multiple Choice)
4.8/5
(33)

Choose one of the sectors of critical infrastructure and develop a discussion about what the consequences and the costs of a cyber offense on that sector might be.

(Essay)
4.8/5
(25)

White-collar cybercrimes are committed at work either by employees or what other actor?

(Multiple Choice)
4.8/5
(42)

The theft of intellectual property is what type of stolen information?

(Multiple Choice)
4.8/5
(40)

White-collar cybercrime describes crimes that occur outside of an employer's workplace.

(True/False)
4.8/5
(43)

Computer crime and cybercrime refer to computer-related behaviors that are illegal, but not harmful.

(True/False)
4.9/5
(37)

Why are colleges and universities a possible target for cyber criminals?

(Multiple Choice)
4.9/5
(44)

Piracy is most specifically considered a type of internet crime.

(True/False)
4.8/5
(33)

Discuss the issues that complicate responding to cybercrime.

(Essay)
4.8/5
(28)

What computer crime can result from responding to phishing emails?

(Multiple Choice)
4.8/5
(30)

Two types of crackers exist, those on the inside of a targeted company and those on the outside.

(True/False)
4.9/5
(29)

Unlike victims of other white-collar crimes that often fail to report their victimization, most victims of computer-related crimes report offenses.

(True/False)
4.9/5
(41)

What type of crime do hackers or crackers usually commit?

(Multiple Choice)
4.7/5
(37)

Complex jurisdictional issues encourage cooperation among law enforcement agencies in their efforts to respond to cybercrime.

(True/False)
4.9/5
(35)

Analyze the reasons officials have difficulties responding to computer crimes.

(Essay)
4.9/5
(46)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)