Exam 4: Digital Piracy and Intellectual Property Theft
Exam 1: Law Enforcement, Privacy, and Security in Dealing With Cybercrime; Technology and Cybercrime9 Questions
Exam 2: Computer Hackers and Hacking8 Questions
Exam 3: Malware and Automated Computer Attacks10 Questions
Exam 4: Digital Piracy and Intellectual Property Theft6 Questions
Exam 5: Economic Crimes and Online Fraud9 Questions
Exam 6: Child Pornography and Sexual Exploitation; Pornography, Prostitution, and Sex Crimes11 Questions
Exam 7: Online Extremism, Cyberterror, and Cyberwarfare9 Questions
Exam 8: Cybercrime and Criminological Theories7 Questions
Exam 9: Evolution of Digital Forensics6 Questions
Exam 10: Acquisition and Examination of Forensic Evidence8 Questions
Exam 11: Legal Challenges in Digital Forensic Investigations7 Questions
Exam 12: The Future of Cybercrime, Terror, and Policy7 Questions
Select questions type
What is the name of the legal statute used to pursue cases of intellectual property infringement in the US?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
C
The subculture of piracy places great value and status on which of the following factors?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
What is the term used to refer to individuals who broke software copyright protections in the 1980s to share files?
Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
B
What is the name of the trade association that brokers for the rights management concerns of recording artists?
(Multiple Choice)
4.7/5
(37)
What is the general lifetime of copyright protections for intellectual property?
(Multiple Choice)
4.7/5
(35)
What is the name of the peer-to-peer file-sharing program that became very popular among pirates in the mid-2000s?
(Multiple Choice)
4.9/5
(34)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)