Exam 7: Cyber Crime
Exam 1: The Legal Environment72 Questions
Exam 2: Constitutional Law72 Questions
Exam 3: Courts and Alternative Dispute Resolution72 Questions
Exam 4: Torts and Cyber Torts72 Questions
Exam 5: Intellectual Property and Internet Law72 Questions
Exam 6: Criminal Law72 Questions
Exam 7: Cyber Crime72 Questions
Exam 8: Ethics and Business Decision Making72 Questions
Exam 9: Nature and Classification72 Questions
Exam 10: Agreement in Traditional and E-Contracts71 Questions
Exam 11: Consideration, capacity, and Legality72 Questions
Exam 12: Defenses to Contract Enforceability72 Questions
Exam 13: Third Party Rights and Discharge72 Questions
Exam 14: Breach and Remedies72 Questions
Exam 15: The Formation of Sales and Lease Contracts72 Questions
Exam 16: Performance Breach of Sales Lease Contracts72 Questions
Exam 17: Warranties and Product Liability72 Questions
Exam 18: Negotiable Instrument: Transferability Liability72 Questions
Exam 19: Checks and Banking in the Digital Age72 Questions
Exam 20: Security Interests in Personal Property72 Questions
Exam 21: Creditors Rights and Bankruptcy72 Questions
Exam 22: International Law in a Global Economy72 Questions
Exam 23: Agency Relationships in Business72 Questions
Exam 24: Employment,immigration,and Labor Law72 Questions
Exam 25: Employment Discrimination72 Questions
Exam 26: Sole Proprietorships and Private Franchises72 Questions
Exam 27: All Forms of Partnerships72 Questions
Exam 28: Limited Liability Companies Special Business Forms72 Questions
Exam 29: Corporate Formation, merger, and Termination72 Questions
Exam 31: Investor Protection, insider Trading, Corp Gov72 Questions
Exam 32: Promoting Competition72 Questions
Exam 33: Consumer and Environmental Law72 Questions
Exam 34: Liability of Accountants Other Professionals72 Questions
Exam 35: Personal Property and Bailments72 Questions
Exam 36: Real Property and Landlord-Tenant Law72 Questions
Exam 37: Insurance, wills, and Trusts72 Questions
Select questions type
Digital pirates may be prosecuted under state,but not federal,law.
Free
(True/False)
4.9/5
(29)
Correct Answer:
False
Dinsmore Corporation employs Coolwater Cyberspace Security,Inc.to protect the integrity of Dinsmore's computer system.Coolwater assigns Brigit and each of Dinsmore's other authorized users an individualized password.A serious security problem would most likely exist if Brigit
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
A
Posing as Sterling Bank,Roxanne e-mails Quentin,asking him to update his personal banking information by calling a certain phone number.He makes the call and supplies the data,which Roxanne promptly sells to Porcio.This is
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
D
Via the Internet,Rocky sabotages the computer system of Quik Chik'n Company,a food manufacturer,with the purpose of altering the levels of ingredients of the company's products so that consumers of the food become ill.Rocky is
(Multiple Choice)
4.9/5
(35)
An unknown individual launches a series of attacks against the Web sites of Prime Sales Corporation.The attacks significantly slow the sites,leading to $100 million in damage in terms of lost work time,lost revenue,site repair costs,and other expenses.The attacker does not intend to profit from the onslaught and in fact does not realize any financial benefit from the effects.How is this attack most likely orchestrated? Who is most likely to engage in this act-that is,whose habits and limitations are clearly suited to such conduct-and why?
(Essay)
4.8/5
(34)
Posing as a representative of Global Games Company,Ferris e-mails Evan,a job seeker,asking him to forward personal banking information so that if he is hired,payroll checks can be deposited directly into his account.Evan supplies the data,which Ferris promptly sells to Dixie.This is
(Multiple Choice)
4.9/5
(33)
Taylor digitally copies business software without the authorization of the owners and sells the copies to others via the Internet.Under federal law,this is
(Multiple Choice)
4.9/5
(34)
It is not identity theft to use a fabricated identity to access online funds.
(True/False)
4.8/5
(40)
Patricia commits an act via e-mail against Othman Finance Company,a business in California,where the act is a cyber crime.Patricia resides in New York where the act is not a crime.Prosecution of Patricia in California involves questions of
(Multiple Choice)
4.9/5
(35)
Maksum floods virtual mailboxes with unsolicited junk e-mail,consisting of ads and other messages.This e-mail is
(Multiple Choice)
4.7/5
(35)
A hacker is someone who uses one computer to break into another.
(True/False)
4.8/5
(38)
Rashad accesses Quant Company's computer system without authority to obtain protected financial data.Under federal law,this is
(Multiple Choice)
4.9/5
(35)
Jean sends e-mail to Irwin promising a percentage of the amount in an African bank account for assistance in transferring the funds to a U.S.bank account.Irwin forwards his account number,but the funds are never sent.Instead,Jean quickly withdraws the funds in Irwin's account.This is
(Multiple Choice)
4.8/5
(33)
Because embezzlement is considered a white-collar crime,it cannot be considered a computer crime.
(True/False)
4.9/5
(41)
Impersonating a victim to make provocative comments online is vishing.
(True/False)
4.8/5
(29)
Showing 1 - 20 of 72
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)