Exam 19: Computers and Technological Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computers have improved the capacity of law enforcement to collect, analyze, and store large volumes of essential information.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

Which of the following is not one of the more common types of crime using information technology?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

On an individual basis, most investigators working at a crime scene have found that the computer does not serve any useful purpose.

Free
(True/False)
4.7/5
(27)
Correct Answer:
Verified

False

According to the authors, a criminal investigator should, at a minimum, know the difference between various types of computers, as well as have some understanding of their capabilities.

(True/False)
4.9/5
(37)

One of the most fastest growing crimes in the United States is:

(Multiple Choice)
4.8/5
(33)

In the field of criminal investigation, the computer has been found to be useful only in the area of text-based information.

(True/False)
4.7/5
(34)

Clipper chips, encryption, logic bombs, pinging, remailers, trapdoors, Trojan horses, viruses, and worms are all cited as examples of _______________ used to accomplish or conceal crime in cyberspace.

(Multiple Choice)
4.8/5
(33)

According to the text, crimes involving sabotage of computers or data processing systems are frequently carried out by disgruntled employees.

(True/False)
4.9/5
(38)

When dealing with a high-tech crime scene, which of the following investigation steps are recommended by the NIJ?

(Multiple Choice)
4.9/5
(37)

The Rapid Start Team, a team of experts who assist federal and local law enforcement with a quick mobilization capacity for investigating serious crimes, is an elite unit of the:

(Multiple Choice)
4.9/5
(45)

To date, the computer has not come close to the potential it offers as an investigative tool because of which of the following?

(Multiple Choice)
4.9/5
(38)

Although statutes differ by states, the elements of computer fraud make it unlawful for any person to use a computer or computer network without permission with the intent to:

(Multiple Choice)
4.9/5
(38)

Home computers and other personal and portable devices fall under the purview of the Fourth Amendment, which protects citizens from unreasonable searches and seizures.

(True/False)
4.8/5
(27)

According to the text, some social networking sites have agreed to remove from their sites those individuals who have a criminal record involving children.

(True/False)
4.9/5
(33)

Police may sometimes pose as children in chat rooms in an effort to identify child molesters. In such cases, it is important to avoid _____________, which is a common defense.

(Multiple Choice)
4.9/5
(32)

______________ is a term that refers to one who enters a computer system illegally for the purpose of destroying, changing, or stealing data.

(Multiple Choice)
4.8/5
(27)

According to the authors, the proper investigation of computer-related crime can be performed by any criminal investigator regardless of training and experience.

(True/False)
5.0/5
(41)

One of the most common types of electronic fraud involves the use of:

(Multiple Choice)
4.7/5
(35)

To date, the computer has not come close to the potential it offers as an investigative tool because of:

(Multiple Choice)
4.8/5
(27)

The investigator facing a crime scene involving computers should:

(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)