Exam 7: Cyber Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Digital pirates may be prosecuted under state,but not federal,law.

Free
(True/False)
4.9/5
(29)
Correct Answer:
Verified

False

Dinsmore Corporation employs Coolwater Cyberspace Security,Inc.to protect the integrity of Dinsmore's computer system.Coolwater assigns Brigit and each of Dinsmore's other authorized users an individualized password.A serious security problem would most likely exist if Brigit

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

A

Posing as Sterling Bank,Roxanne e-mails Quentin,asking him to update his personal banking information by calling a certain phone number.He makes the call and supplies the data,which Roxanne promptly sells to Porcio.This is

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

D

Vishing is phishing that involves voice communication.

(True/False)
4.9/5
(39)

Via the Internet,Rocky sabotages the computer system of Quik Chik'n Company,a food manufacturer,with the purpose of altering the levels of ingredients of the company's products so that consumers of the food become ill.Rocky is

(Multiple Choice)
4.9/5
(35)

An unknown individual launches a series of attacks against the Web sites of Prime Sales Corporation.The attacks significantly slow the sites,leading to $100 million in damage in terms of lost work time,lost revenue,site repair costs,and other expenses.The attacker does not intend to profit from the onslaught and in fact does not realize any financial benefit from the effects.How is this attack most likely orchestrated? Who is most likely to engage in this act-that is,whose habits and limitations are clearly suited to such conduct-and why?

(Essay)
4.8/5
(34)

Posing as a representative of Global Games Company,Ferris e-mails Evan,a job seeker,asking him to forward personal banking information so that if he is hired,payroll checks can be deposited directly into his account.Evan supplies the data,which Ferris promptly sells to Dixie.This is

(Multiple Choice)
4.9/5
(33)

Taylor digitally copies business software without the authorization of the owners and sells the copies to others via the Internet.Under federal law,this is

(Multiple Choice)
4.9/5
(34)

Federal law allows the use of unsolicited commercial e-mail.

(True/False)
4.9/5
(34)

It is not identity theft to use a fabricated identity to access online funds.

(True/False)
4.8/5
(40)

Patricia commits an act via e-mail against Othman Finance Company,a business in California,where the act is a cyber crime.Patricia resides in New York where the act is not a crime.Prosecution of Patricia in California involves questions of

(Multiple Choice)
4.9/5
(35)

Maksum floods virtual mailboxes with unsolicited junk e-mail,consisting of ads and other messages.This e-mail is

(Multiple Choice)
4.7/5
(35)

A cyberstalker must act from a location near the victim.

(True/False)
4.8/5
(35)

A hacker is someone who uses one computer to break into another.

(True/False)
4.8/5
(38)

Rashad accesses Quant Company's computer system without authority to obtain protected financial data.Under federal law,this is

(Multiple Choice)
4.9/5
(35)

Jean sends e-mail to Irwin promising a percentage of the amount in an African bank account for assistance in transferring the funds to a U.S.bank account.Irwin forwards his account number,but the funds are never sent.Instead,Jean quickly withdraws the funds in Irwin's account.This is

(Multiple Choice)
4.8/5
(33)

Because embezzlement is considered a white-collar crime,it cannot be considered a computer crime.

(True/False)
4.9/5
(41)

Most cyber crimes are new crimes.

(True/False)
4.9/5
(32)

Fraud has occurred online but not by e-mail.

(True/False)
4.7/5
(36)

Impersonating a victim to make provocative comments online is vishing.

(True/False)
4.8/5
(29)
Showing 1 - 20 of 72
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)