Exam 17: Cybercrime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The denial-of-service (DOS)attack occurs when the service provider suspends service after the subscriber's email account is flooded by thousands of emails in a short period of time.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

True

The first modern electronic computer was completed in 1942.

Free
(True/False)
4.7/5
(29)
Correct Answer:
Verified

True

This type of evidence does not need to be seized at the scene of a computer-assisted or cybercrime.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

Transportation hazards when transporting digital evidence that the investigator should be aware of include

(Multiple Choice)
4.9/5
(41)

Which of the following type of cybercriminal is more likely to cause the greatest losses?

(Multiple Choice)
4.8/5
(28)

A/an __________ is a type of computer intrusion programmed to execute at a particular time or on a particular date.

(Short Answer)
4.8/5
(40)

Which statement about the typical computer hacker is not correct?

(Multiple Choice)
4.8/5
(38)

The first personal computer was the

(Multiple Choice)
5.0/5
(33)

The primary purpose of a virus is to

(Multiple Choice)
4.7/5
(30)

This type of hacker may work for a national government to destroy the operational capabilities of the target.

(Multiple Choice)
4.7/5
(44)

A virus is a small program that sends itself to other computers,rather than relying on user actions,as a virus does.

(True/False)
4.8/5
(35)

A specially designed malware package with tools that give the intruder "superpowers" over computers,which allows them,for example,to steal personal information is a ________.

(Short Answer)
4.9/5
(32)

If no destructive processes are running and no items of evidentiary value on the screen,one step in seizing computer crime evidence is to

(Multiple Choice)
4.8/5
(30)

The FBI and the United States Attorney General play the most prominent roles in investigating computer - assisted and cybercrime.

(True/False)
4.9/5
(35)

Discuss the issues relating to cybercrime/computer/high technology/electronic crime units at the state and local level.

(Essay)
4.7/5
(29)

The two prerequisites for the emergence of cybercrime were:

(Multiple Choice)
4.8/5
(36)

Discuss the differences between "black hatters" and "white hatters."

(Essay)
4.8/5
(31)

A __________is a network of zombies or bots.

(Short Answer)
4.8/5
(32)

Discuss polymorphic and metamorphic viruses.

(Essay)
4.9/5
(39)

The consent to search must be freely and _______________ given.

(Short Answer)
4.7/5
(36)
Showing 1 - 20 of 55
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)