Exam 12: Computer Crime
Exam 1: Introduction64 Questions
Exam 2: Crimes Against Consumers68 Questions
Exam 3: Unsafe Products68 Questions
Exam 4: Environmental Crime61 Questions
Exam 5: Institutional Corruption: Mass Media and Religion61 Questions
Exam 6: Securities Fraud61 Questions
Exam 7: Corporate Fraud62 Questions
Exam 8: Fiduciary Fraud60 Questions
Exam 9: Crimes by the Government60 Questions
Exam 10: Corruption of Public Officials61 Questions
Exam 11: Medical Crime62 Questions
Exam 12: Computer Crime63 Questions
Exam 13: Conclusions62 Questions
Select questions type
Identify and describe the four phases of computer viruses. Practically speaking, how do these stages work and what are the implications in the context of computer crime?
(Essay)
4.9/5
(33)
In 1996 the General Accounting Office said that hackers had targeted the Pentagon __________ times and gained entry 2 of every 3 times.
(Multiple Choice)
4.9/5
(35)
The fastest-spreading virus is a variation of the________________ virus.
(Short Answer)
4.8/5
(28)
Coasting along looking for doors to open is a quality of cookbook hackers.
(True/False)
4.9/5
(44)
Which of the following is unlikely to be classed as a computer crime?
(Multiple Choice)
5.0/5
(41)
The term "hacker" can include all of the following except a(n):
(Multiple Choice)
4.8/5
(27)
International cooperation in regards to stealing software has faltered because of minimal economic impact.
(True/False)
4.9/5
(30)
An authorized program planted on a computer is known as a(n):
(Multiple Choice)
5.0/5
(22)
If you send out 30,000 e-mails and get only one response, but you get $40.00 per response and you send out a half a million e-mails, how much money can you make?
(Multiple Choice)
4.9/5
(41)
Reasons for the Nigerian scam include all of the following except:
(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)