Deck 15: Technology and Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
Play
Full screen (f)
Deck 15: Technology and Crime
1
DNA profiling is
A) infallible.
B) highly reliable.
C) somewhat reliable.
D) not very reliable.
A) infallible.
B) highly reliable.
C) somewhat reliable.
D) not very reliable.
B
2
According to the 1994 federal DNA Identification Act, the FBI is authorized to establish DNA indexes for all but which of the following categories?
A) Samples recovered from unidentified human remains
B) Samples recovered from crime scenes
C) Offenders convicted of crimes
D) Offenders charged with crimes
A) Samples recovered from unidentified human remains
B) Samples recovered from crime scenes
C) Offenders convicted of crimes
D) Offenders charged with crimes
D
3
____________involves using official-looking e-mail messages to steal valuable information.
A) Cloning
B) Phishing
C) Phreaking
D) Softlifting
A) Cloning
B) Phishing
C) Phreaking
D) Softlifting
Phishing
4
____________are hackers who are fascinated by the evolving technology of telecommunications and explore it without knowing exactly what they will find.
A) Game players
B) Explorers
C) Scamps
D) Pioneers
A) Game players
B) Explorers
C) Scamps
D) Pioneers
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
Illegally obtaining computerized information through the path of direct access is usually taken by
A) malware creators.
B) business competitors.
C) office workers.
D) hackers.
A) malware creators.
B) business competitors.
C) office workers.
D) hackers.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
The __________ Act criminalized the willful infringement of copyrighted works.
A) Communications Decency
B) No Electronic Theft
C) National Stolen Property
D) Cyber Security Enhancement
A) Communications Decency
B) No Electronic Theft
C) National Stolen Property
D) Cyber Security Enhancement
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following best describes the average hacker?
A) A 20-year-old man living in San Francisco
B) A 23-year-old woman living in Chicago
C) A 35-year-old woman living in Paris
D) A 40-year-old man living in New York
A) A 20-year-old man living in San Francisco
B) A 23-year-old woman living in Chicago
C) A 35-year-old woman living in Paris
D) A 40-year-old man living in New York
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not a characteristic shared by white-collar and computer criminals?
A) Their acts generally involve information manipulations that create profits or losses
B) Their crimes can be committed by an individual, several people working in collusion, and/or organizations
C) Their crimes generally are committed through violent means
D) The generally require access to computers or computer storage media
A) Their acts generally involve information manipulations that create profits or losses
B) Their crimes can be committed by an individual, several people working in collusion, and/or organizations
C) Their crimes generally are committed through violent means
D) The generally require access to computers or computer storage media
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
____________is defined as any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution.
A) Cybercrime
B) Computer crime
C) Computer-related crime
D) Computer abuse
A) Cybercrime
B) Computer crime
C) Computer-related crime
D) Computer abuse
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
__________ is any violation of a federal or state computer-crime statute.
A) Computer-facilitated crime
B) Cybercrime
C) Computer abuse
D) Computer-related crime
A) Computer-facilitated crime
B) Cybercrime
C) Computer abuse
D) Computer-related crime
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
Hackers who are excited about breaking into geographically distant computer systems fall into which category?
A) Game players
B) Explorers
C) Vandals
D) Scamps
A) Game players
B) Explorers
C) Vandals
D) Scamps
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
Using a computer to create a database to support drug distribution falls into which category of cybercrime?
A) Internal cybercrime
B) Computer-manipulation crime
C) Support of criminal enterprises
D) Telecommunications crimes
A) Internal cybercrime
B) Computer-manipulation crime
C) Support of criminal enterprises
D) Telecommunications crimes
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
In the case of __________, the U.S. Supreme Court rejected an earlier standard for the admissibility of scientific evidence and said that all relevant evidence is admissible unless otherwise provided by the U.S. Constitution or other relevant legal rules.
A) Frye v. U.S.
B) Daubert v. Merrell Dow Pharmaceuticals, Inc.
C) Buck v. Bell
D) Reno v. ACLU
A) Frye v. U.S.
B) Daubert v. Merrell Dow Pharmaceuticals, Inc.
C) Buck v. Bell
D) Reno v. ACLU
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
In the case of __________, the U.S. Supreme Court struck down several provisions of the Communications Decency Act.
A) Frye v. U.S.
B) Daubert v. Merrell Dow Pharmaceuticals, Inc.
C) Buck v. Bell
D) Reno v. ACLU
A) Frye v. U.S.
B) Daubert v. Merrell Dow Pharmaceuticals, Inc.
C) Buck v. Bell
D) Reno v. ACLU
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
Malware involves
A) phone phreaking.
B) embezzlement.
C) computer viruses.
D) software piracy.
A) phone phreaking.
B) embezzlement.
C) computer viruses.
D) software piracy.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
The primary motivation of the average hacker is to
A) profit financially by hacking.
B) gain access to computer networks.
C) demonstrate network vulnerability.
D) create a computer security system.
A) profit financially by hacking.
B) gain access to computer networks.
C) demonstrate network vulnerability.
D) create a computer security system.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
Which type of hacker is most likely to use illicit drugs?
A) Scamps
B) Vandals
C) Explorers
D) Addicts
A) Scamps
B) Vandals
C) Explorers
D) Addicts
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
Planting a virus is an example of which category of cybercrime?
A) Internal cybercrime
B) Computer-manipulation crime
C) Support of criminal enterprises
D) Telecommunications crimes
A) Internal cybercrime
B) Computer-manipulation crime
C) Support of criminal enterprises
D) Telecommunications crimes
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
Which is not one of the factors that may be used to determine whether a form of scientific evidence is reliable?
A) It has no known or potential rates of error
B) It has been subjected to peer review
C) It has been subjected to testing
D) It has standards controlling application of the techniques involved
A) It has no known or potential rates of error
B) It has been subjected to peer review
C) It has been subjected to testing
D) It has standards controlling application of the techniques involved
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
Lawsuits challenging the constitutionality of the Communications Decency Act claimed that provisions of the act contravened __________ Amendment guarantees.
A) First
B) Fourth
C) Fifth
D) Sixth
A) First
B) Fourth
C) Fifth
D) Sixth
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
Explorers focus on computer systems that are geographically distant from the hacker's physical location.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) __________ records the activities of computer operators surrounding each event in a transaction.
A) expert systems analysis.
B) data encryption.
C) threat analysis
D) audit trail
A) expert systems analysis.
B) data encryption.
C) threat analysis
D) audit trail
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
Cybercrime is often committed through the use of violent means.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
The Daubert standard deals with the application of the laws requiring convicted offenders to provide DNA samples.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
Discovery of cybercrime is often by accident.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
Technology and crime have always been closely linked.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
The primary motivation of the average hacker is financial profit.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
The Supreme Court case of Reno v. ACLU focused on whether the Communications Decency Act abridged First Amendment protections.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
The path of direct access to computer information is generally used by office workers violating positions of trust.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
DNA evidence may last for many years.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
The first national police force to begin routine collection of DNA samples from anyone involved in a serious crime is located in which country?
A) Great Britain
B) France
C) Germany
D) China
A) Great Britain
B) France
C) Germany
D) China
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
Illegal hacking is an example of a computer manipulation crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
Phishing is usually done via calls and texts made on cell phones
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
The "Spiderman snare" is a discolike strobe light which quickly disorients human targets.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
is a system used to match a suspect's fingerprints against stored records.
A) NCIC
B) AFIS
C) METAPOL
D) VICAP
A) NCIC
B) AFIS
C) METAPOL
D) VICAP
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
The _____________ is a citizens' group that focuses on refining notions of privacy and legality as they relate to telecommunications and other communications-based media.
A) The Computer Security Institute
B) The Cybersecurity Center
C) The National Computer Security Association
D) The Electronic Frontier Foundation
A) The Computer Security Institute
B) The Cybersecurity Center
C) The National Computer Security Association
D) The Electronic Frontier Foundation
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
What does President Obama consider one of the most serious economic and national security challenges facing the US today?
A) White-collar crime
B) Cybersecurity
C) Violent crime
D) Constitutional protections
A) White-collar crime
B) Cybersecurity
C) Violent crime
D) Constitutional protections
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
____________attempt to duplicate the decision-making processes used by skilled investigators in evidence analysis.
A) Expert systems
B) TEMPEST
C) Audit trails
D) DNA systems
A) Expert systems
B) TEMPEST
C) Audit trails
D) DNA systems
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
An assessment of the potential disasters facing an organization is known as
A) data encryption.
B) threat analysis.
C) an expert system.
D) an audit trail.
A) data encryption.
B) threat analysis.
C) an expert system.
D) an audit trail.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
Typical phishing schemes generally reach only about 10,000 e-mail in-boxes
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
Computer __________ involves remote access to targeted machines.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
____________are malicious hackers who deliberately cause damage with no apparent personal gain.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
The federal DNA Identification Act authorizes the FBI to establish DNA indexes for samples recovered from crime scenes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
The greatest threat to reliable results in DNA profiling is __________ error.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
Most police departments today are prepared to effectively investigate computer crimes
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
The lifeblood of the cyberworld is ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
Cybercriminals do not need to come into direct contact with victims.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
The Daubert ruling rejected the standards set in the previous case of __________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
Expert systems such as NCAVC may eventually replace human criminal investigators.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
____________used special dial-up access codes to avoid long-distance charges.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
Computer __________ involves an unlawful incident associated with computer technology in which a victim suffers loss or a perpetrator reaps benefit.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
Threat analysis is the process of encoding information so that it is unreadable to all but its intended recipients.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
The U.S. Constitution states that electronic documents and communications qualify for protection under the First and Fourth Amendments.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) __________ or sequential record of system activities is a powerful tool that is useful in identifying instances of computer crime when they occur.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
Hackers who intend no overt harm but just have a sense of fun are known as __________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
The Electronic Frontier Foundation focuses on protecting the individual rights found in the Constitution and Bill of Rights as new communications technologies emerge.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
Illegally copying software programs is known as __________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
__________ systems are systems of computer hardware and software that attempt to duplicate the decision-making processes used by skilled investigators in evidence analysis and pattern recognition.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
____________is the process by which information is encoded so that it is unreadable by all but its intended recipients.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
________ is the violation of a federal or state computer-crime statue
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Do you agree with President Barack Obama that "cybersecurity is one of the most serious economic and national-security challenges facing the United States"?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
According to President Barak Obama, _________ is one of the most serious economic and national-security challenges facing the U.S.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
Describe the characteristics of hackers and explain the categories of the basic typology that is based on psychological characteristics.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
Compare and contrast phone phreaking with phishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
One contemporary is whether e-mail qualifies as speech and is therefore protected under the _______ Amendment.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
How might similarities between hacking and playing computer games blur the lines between entertainment and crime?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
How is the use of computer technology by criminals and law enforcement similar too and different from the use of other types of technology to perpetrate crimes and bring perpetrators to justice?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
Match between columns
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
Match between columns
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck