Exam 12: Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Logic bombs hide from virus protection programs.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

Evaluate and explain why you think it has become so much easier to commit identity theft.

Free
(Essay)
4.8/5
(36)
Correct Answer:
Verified

Answers may attribute this to phishing scams, hacking, and spamming. Hackers are exploiting Internet auctions, along with sweepstakes scams, which make it easier to commit identity fraud.

Computers can be used to commit all of the following kinds of espionage except:

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

The virus that overwrites the system, and whose data files download a password-thieving program, destroys files, and is sent to everyone on the contact list was called ________________ Letter.

(Short Answer)
4.9/5
(36)

The Masters of Destruction (MOD) corrupted the databases of all of the following companies except:

(Multiple Choice)
4.8/5
(40)

Computer crimes may have begun with the use of the blue box. The blue box involved which instrument?

(Multiple Choice)
4.8/5
(31)

The magnitude of Mafiaboy damage was estimated to exceed at least:

(Multiple Choice)
4.8/5
(37)

Distinguish between the following: Trojan Horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.

(Essay)
4.8/5
(31)

Trap doors or sleepers allow a technique known as salami slicing to loot accounts. This is taking small amounts from a lot of people.

(True/False)
4.7/5
(31)

Discuss why early computer hackers exhibited few characteristics of secondary deviance as defined by Lemert.

(Essay)
4.7/5
(35)

Describe the three state process defined by Cressey that characterized typical embezzlers.

(Essay)
4.8/5
(35)

Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for being advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion.

(True/False)
4.9/5
(37)

Back door programs:

(Multiple Choice)
4.9/5
(41)

A less formal definition of computer crime would be those crimes using a computer to accomplish its ends.

(True/False)
4.7/5
(38)

The average computer crime nets $500,000.

(True/False)
4.8/5
(33)

The most effective computer crimes are those perpetrated by experts.

(True/False)
4.8/5
(35)

Hackers first targeted:

(Multiple Choice)
4.9/5
(44)

The dark figure of crime is crime that is ________________.

(Short Answer)
4.8/5
(35)

A simple but effective form of electronic bank robbery used ________________ slips.

(Short Answer)
4.9/5
(25)

In the 1970s a Los Angeles-based insurance company programmed its computers to do all of the following except:

(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)