Exam 12: Computer Crime
Exam 1: Introduction64 Questions
Exam 2: Crimes Against Consumers68 Questions
Exam 3: Unsafe Products68 Questions
Exam 4: Environmental Crime61 Questions
Exam 5: Institutional Corruption: Mass Media and Religion61 Questions
Exam 6: Securities Fraud61 Questions
Exam 7: Corporate Fraud62 Questions
Exam 8: Fiduciary Fraud60 Questions
Exam 9: Crimes by the Government60 Questions
Exam 10: Corruption of Public Officials61 Questions
Exam 11: Medical Crime62 Questions
Exam 12: Computer Crime63 Questions
Exam 13: Conclusions62 Questions
Select questions type
Logic bombs hide from virus protection programs.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
Evaluate and explain why you think it has become so much easier to commit identity theft.
Free
(Essay)
4.8/5
(36)
Correct Answer:
Answers may attribute this to phishing scams, hacking, and spamming. Hackers are exploiting Internet auctions, along with sweepstakes scams, which make it easier to commit identity fraud.
Computers can be used to commit all of the following kinds of espionage except:
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
The virus that overwrites the system, and whose data files download a password-thieving program, destroys files, and is sent to everyone on the contact list was called ________________ Letter.
(Short Answer)
4.9/5
(36)
The Masters of Destruction (MOD) corrupted the databases of all of the following companies except:
(Multiple Choice)
4.8/5
(40)
Computer crimes may have begun with the use of the blue box. The blue box involved which instrument?
(Multiple Choice)
4.8/5
(31)
The magnitude of Mafiaboy damage was estimated to exceed at least:
(Multiple Choice)
4.8/5
(37)
Distinguish between the following: Trojan Horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.
(Essay)
4.8/5
(31)
Trap doors or sleepers allow a technique known as salami slicing to loot accounts. This is taking small amounts from a lot of people.
(True/False)
4.7/5
(31)
Discuss why early computer hackers exhibited few characteristics of secondary deviance as defined by Lemert.
(Essay)
4.7/5
(35)
Describe the three state process defined by Cressey that characterized typical embezzlers.
(Essay)
4.8/5
(35)
Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for being advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion.
(True/False)
4.9/5
(37)
A less formal definition of computer crime would be those crimes using a computer to accomplish its ends.
(True/False)
4.7/5
(38)
The most effective computer crimes are those perpetrated by experts.
(True/False)
4.8/5
(35)
A simple but effective form of electronic bank robbery used ________________ slips.
(Short Answer)
4.9/5
(25)
In the 1970s a Los Angeles-based insurance company programmed its computers to do all of the following except:
(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)