Exam 17: Cybercrime
Exam 1: The Evolution of Criminal Investigation and Forensic Science55 Questions
Exam 2: Legal Aspects of Investigation56 Questions
Exam 3: Investigators, the Investigative Process, and the Crime Scene55 Questions
Exam 4: Physical Evidence55 Questions
Exam 5: Interviewing and Interrogation54 Questions
Exam 6: Field Notes and Reporting55 Questions
Exam 7: The Follow-Up Investigation and Investigative Resources55 Questions
Exam 8: The Crime Laboratory55 Questions
Exam 9: Injury and Death Investigations55 Questions
Exam 10: Sex-Related Offenses55 Questions
Exam 11: Crimes Against Children55 Questions
Exam 12: Human Trafficking55 Questions
Exam 13: Robbery55 Questions
Exam 14: Burglary55 Questions
Exam 15: Larceny Theft and White-Collar Crime55 Questions
Exam 16: Vehicle Thefts and Related Offenses55 Questions
Exam 17: Cybercrime55 Questions
Exam 18: Agricultural, Wildlife, and Environmental Crimes55 Questions
Exam 19: Arson and Explosives Investigations55 Questions
Exam 20: Recognition, Control, and Investigation of Drug Abuse55 Questions
Exam 21: Terrorism55 Questions
Exam 22: The Trial Process and the Investigator As a Witness55 Questions
Select questions type
The denial-of-service (DOS)attack occurs when the service provider suspends service after the subscriber's email account is flooded by thousands of emails in a short period of time.
Free
(True/False)
4.8/5
(42)
Correct Answer:
True
The first modern electronic computer was completed in 1942.
Free
(True/False)
4.7/5
(29)
Correct Answer:
True
This type of evidence does not need to be seized at the scene of a computer-assisted or cybercrime.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
Transportation hazards when transporting digital evidence that the investigator should be aware of include
(Multiple Choice)
4.9/5
(41)
Which of the following type of cybercriminal is more likely to cause the greatest losses?
(Multiple Choice)
4.8/5
(28)
A/an __________ is a type of computer intrusion programmed to execute at a particular time or on a particular date.
(Short Answer)
4.8/5
(40)
Which statement about the typical computer hacker is not correct?
(Multiple Choice)
4.8/5
(38)
This type of hacker may work for a national government to destroy the operational capabilities of the target.
(Multiple Choice)
4.7/5
(44)
A virus is a small program that sends itself to other computers,rather than relying on user actions,as a virus does.
(True/False)
4.8/5
(35)
A specially designed malware package with tools that give the intruder "superpowers" over computers,which allows them,for example,to steal personal information is a ________.
(Short Answer)
4.9/5
(32)
If no destructive processes are running and no items of evidentiary value on the screen,one step in seizing computer crime evidence is to
(Multiple Choice)
4.8/5
(30)
The FBI and the United States Attorney General play the most prominent roles in investigating computer - assisted and cybercrime.
(True/False)
4.9/5
(35)
Discuss the issues relating to cybercrime/computer/high technology/electronic crime units at the state and local level.
(Essay)
4.7/5
(29)
The two prerequisites for the emergence of cybercrime were:
(Multiple Choice)
4.8/5
(36)
The consent to search must be freely and _______________ given.
(Short Answer)
4.7/5
(36)
Showing 1 - 20 of 55
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)