Exam 15: Technology and Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Lawsuits challenging the constitutionality of the Communications Decency Act claimed that provisions of the act contravened __________ Amendment guarantees.

Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
Verified

A

____________used special dial-up access codes to avoid long-distance charges.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

Phone phreaks

Which of the following best describes the average hacker?

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

A

The U.S. Constitution states that electronic documents and communications qualify for protection under the First and Fourth Amendments.

(True/False)
4.8/5
(29)

Threat analysis is the process of encoding information so that it is unreadable to all but its intended recipients.

(True/False)
4.9/5
(29)

The _____________ is a citizens' group that focuses on refining notions of privacy and legality as they relate to telecommunications and other communications-based media.

(Multiple Choice)
4.8/5
(32)

__________ is any violation of a federal or state computer-crime statute.

(Multiple Choice)
4.8/5
(25)

Illegally obtaining computerized information through the path of direct access is usually taken by

(Multiple Choice)
4.8/5
(42)

____________is the process by which information is encoded so that it is unreadable by all but its intended recipients.

(Short Answer)
4.9/5
(31)

Which is not one of the factors that may be used to determine whether a form of scientific evidence is reliable?

(Multiple Choice)
4.8/5
(33)

According to the 1994 federal DNA Identification Act, the FBI is authorized to establish DNA indexes for all but which of the following categories?

(Multiple Choice)
4.7/5
(35)

The Daubert ruling rejected the standards set in the previous case of __________.

(Short Answer)
4.8/5
(31)

Do you agree with President Barack Obama that "cybersecurity is one of the most serious economic and national-security challenges facing the United States"?

(Essay)
4.7/5
(36)

____________involves using official-looking e-mail messages to steal valuable information.

(Multiple Choice)
4.8/5
(38)

Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?

(Essay)
4.8/5
(40)

Compare and contrast phone phreaking with phishing.

(Essay)
4.8/5
(28)

Describe the characteristics of hackers and explain the categories of the basic typology that is based on psychological characteristics.

(Essay)
4.8/5
(43)

The __________ Act criminalized the willful infringement of copyrighted works.

(Multiple Choice)
4.8/5
(30)

An assessment of the potential disasters facing an organization is known as

(Multiple Choice)
4.7/5
(28)

A(n) __________ records the activities of computer operators surrounding each event in a transaction.

(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 72
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)