Exam 7: Information Technology Crime
Exam 1: Global Crime in Context: Defining and Measuring Global Crime67 Questions
Exam 2: Comparative and Transnational Crime53 Questions
Exam 3: Human Trafficking52 Questions
Exam 4: Drug Trafficking51 Questions
Exam 5: Weapons Trafficking52 Questions
Exam 6: Terrorism50 Questions
Exam 7: Information Technology Crime49 Questions
Exam 8: International Criminal Law57 Questions
Exam 9: Comparative Criminal Justice Systems54 Questions
Exam 11: Privatization and Global Justice38 Questions
Exam 10: Human Rights and International Crime Control45 Questions
Exam 12: The Future of Global Crime30 Questions
Select questions type
IT crime costs the global economy an estimated $388 million in 2012.
Free
(True/False)
4.9/5
(34)
Correct Answer:
False
Due to the tradition of high skill in mathematics, physics, and computing, many IT attacks originate from what area of the world?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
Mobile device attacks are typically imported through applications.
Free
(True/False)
4.9/5
(34)
Correct Answer:
True
Trespassing on information networks without doing any damage or leaving any trace of the visit is the least serious IT crime.
(True/False)
4.9/5
(36)
Black-hat hackers seek to make systems unusable or to steal data or other resources.
(True/False)
4.8/5
(31)
In this attack a perpetrator attempts to prevent users from accessing a server's information or services such as e-mails.
(Multiple Choice)
4.9/5
(34)
Black-hat hackers may be contracted or employed to test security on a system.
(True/False)
4.8/5
(37)
These hackers break into computer networks not necessarily to do damage, but to seek out exploits.
(Multiple Choice)
4.8/5
(35)
What factor affects the availability of security products written for that market?
(Multiple Choice)
4.8/5
(30)
This is much like a virus in that it replicates itself but does not require a host file or human action.
(Multiple Choice)
4.8/5
(42)
This is an attempt to acquire personal information such as usernames and passwords.
(Multiple Choice)
4.8/5
(38)
IT crime are criminal offenses that are committed with devices that communicate information to one another via networks.
(True/False)
5.0/5
(37)
What is the definition of the following word:
-Denial-of-service attack.
(Short Answer)
4.8/5
(31)
If a security technology company cannot make a profit in a developing market, then it will not produce software for that market.
(True/False)
4.7/5
(38)
Which of the following resources do developing countries lack to build against IT crime?
(Multiple Choice)
4.8/5
(25)
Perpetrators with these motives target information that may be used or sold in order to enrich themselves.
(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)