Exam 13: Technology and Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In which of these areas are cyberthreats least likely?

Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
Verified

D

What is the main difference in the two broad categories of identity theft?

Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
Verified

D

Computer hacking began with the rise of mass-market personal computers in the late 1970s.

Free
(True/False)
4.7/5
(42)
Correct Answer:
Verified

False

Compare and contrast phone phreaking with phishing.

(Essay)
4.9/5
(29)

The sequential record of system activities surrounding an event,a(n)_______,enables investigators to reconstruct,review,and examine what happened during a computer crime after the fact.

(Short Answer)
4.8/5
(29)

The situation in which prosecution was impeded by the inability of many state and local police departments to skillfully investigate cybercrimes has been changing because of

(Multiple Choice)
4.9/5
(38)

A computer virus is a program designed to invade a computer system and modify its operation or alter the information it stores.

(True/False)
4.8/5
(42)

Identity theft would be less likely if

(Multiple Choice)
4.9/5
(34)

Computer viruses,worms,and spyware are examples of ________.

(Short Answer)
4.7/5
(37)

Identify theft has indirect costs,such as costs related to prevention and mitigation.

(True/False)
4.9/5
(35)

Someone who uses computers for exploration or exploitation is known as a(n)________.

(Short Answer)
4.8/5
(40)

The combination of computer hardware and software that attempts to duplicate a skilled investigator's decision-making processes when analyzing evidence and recognizing patterns is known as a(n)________.

(Short Answer)
4.8/5
(37)

What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?

(Essay)
4.9/5
(32)

The contrast between cyberspace and the physical and social reality of the real world is summed up in the term

(Multiple Choice)
4.9/5
(31)

Computer-related crime and cybercrime are two names for the same thing.

(True/False)
4.7/5
(35)

When investigators use biological residue found at a crime scene for genetic comparison to aid in identifying criminal suspects,they are using ________.

(Short Answer)
4.8/5
(28)

What is TEMPEST?

(Multiple Choice)
4.9/5
(35)

AFIS allows investigators to

(Multiple Choice)
4.8/5
(38)

Do you agree with President Barack Obama that "the cyberthreat is one of the most serious economic and national security challenges we face as a nation"?

(Essay)
4.9/5
(34)

The trial judge has to decide is an expert's testimony is

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)