Exam 12: Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Match the key terms to the descriptions below. Use each description only once.
Toll fraud
Avoid phone charges
Shoulder surfers
Allow reentry at will
Sniffer programs
Infect the host computer
Correct Answer:
Verified
Premises:
Responses:
Toll fraud
Avoid phone charges
Shoulder surfers
Allow reentry at will
Sniffer programs
Infect the host computer
Stealth programs
Unreported crime
Back-door programs
Look for programs
Dark figure of crime
Steal access codes at airports
Worm
Hide from virus protection programs
Virus
Multiplies
(Matching)
4.8/5
(27)

Playpen-mentality hackers have the goal of breaking in.

(True/False)
4.8/5
(37)

According to Cressey, embezzlers go through a process that includes all of the following except:

(Multiple Choice)
4.8/5
(32)

A denial of service ________________ shuts down a Web site.

(Short Answer)
4.7/5
(30)

Toll fraud is:

(Multiple Choice)
4.8/5
(37)

Mafiaboy activities affected all of the following except:

(Multiple Choice)
4.8/5
(37)

According to the text, the broad but somewhat more specific definition of computer crime can be described as:

(Multiple Choice)
4.8/5
(32)

Sniffer programs look for ________________.

(Short Answer)
4.8/5
(43)

Hacking can include all of the following except:

(Multiple Choice)
4.9/5
(31)

Crackers break which of the following?

(Multiple Choice)
4.8/5
(34)

Examine both domestic and international computer espionage and give examples of each. Why do you think it is more difficult to determine the extent of international espionage?

(Essay)
4.8/5
(34)

So-called first generation phone "phreaks" used their talents to steal from checking accounts.

(True/False)
4.9/5
(45)

A reason for the Nigerian scam is that it has a well-educated populace.

(True/False)
4.9/5
(40)

Worms infect the ________________ computer.

(Short Answer)
4.8/5
(41)

The easiest way into a computer is through the ________________ door.

(Short Answer)
4.9/5
(35)

Stealth programs:

(Multiple Choice)
4.8/5
(40)

Malicious hacking, affecting national security, has affected all of the following except:

(Multiple Choice)
4.9/5
(35)

The average bank robbery nets approximately:

(Multiple Choice)
4.9/5
(42)

Which one of the following crimes could not be classified as a computer crime?

(Multiple Choice)
4.9/5
(32)

Mafiaboy turned out to be a(n) ____________ Canadian.

(Multiple Choice)
4.8/5
(38)
Showing 41 - 60 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)