Deck 17: Computer Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
Play
Full screen (f)
Deck 17: Computer Crime
1
Which of the following statements about reshipper schemes is correct?
A)These schemes typically involve employees of the U.S.Postal Service, UPS, FedEx, or similar businesses.
B)The masterminds of reshipper schemes often initiate contact with their victims in chat rooms.
C)Scam artists who organize these schemes are frequently charged with sabotage.
D)These schemes involve intercepting a computer, installing spyware, and sending the computer to its destination.
A)These schemes typically involve employees of the U.S.Postal Service, UPS, FedEx, or similar businesses.
B)The masterminds of reshipper schemes often initiate contact with their victims in chat rooms.
C)Scam artists who organize these schemes are frequently charged with sabotage.
D)These schemes involve intercepting a computer, installing spyware, and sending the computer to its destination.
B
2
Which process is often considered synonymous with phishing and involves acquiring unauthorized access to a computer or network through a message using an IP address appearing to be from a trusted host, in an attempt to commit identity theft?
A)snarking
B)spoofing
C)sniping
D)shadowing
A)snarking
B)spoofing
C)sniping
D)shadowing
B
3
Common protocol for processing a crime scene involving electronic evidence includes which of the following?
A)photographing and diagramming the placement of all computer terminals
B)holding the IT staff in quarantine until reinforcements arrive
C)obtaining a search warrant
D)unplugging all computers, telephones, and printers
A)photographing and diagramming the placement of all computer terminals
B)holding the IT staff in quarantine until reinforcements arrive
C)obtaining a search warrant
D)unplugging all computers, telephones, and printers
C
4
Which of the following is one of the three general categories of cybercriminals?
A)pharmer
B)hacker
C)white hat
D)IT professionals
A)pharmer
B)hacker
C)white hat
D)IT professionals
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
Digital evidence is often contained on:
A)printers and scanners.
B)VCRs and GPS devices.
C)hard drives or CDs.
D)telephones and fax machines.
A)printers and scanners.
B)VCRs and GPS devices.
C)hard drives or CDs.
D)telephones and fax machines.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
Cybercrime is:
A)a local problem.
B)a transnational problem.
C)strictly a federal problem.
D)a minor problem.
A)a local problem.
B)a transnational problem.
C)strictly a federal problem.
D)a minor problem.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
Port scanning is:
A)looking for access into a computer.
B)scanning for a portable computer that is using a wireless system.
C)removing data.
D)linking access codes.
A)looking for access into a computer.
B)scanning for a portable computer that is using a wireless system.
C)removing data.
D)linking access codes.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
Most computer crimes are:
A)not reported.
B)reported in excessive amounts to local authorities.
C)reported frequently.
D)reported to the federal government.
A)not reported.
B)reported in excessive amounts to local authorities.
C)reported frequently.
D)reported to the federal government.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
Computer evidence is:
A)next to impossible to destroy.
B)destroyed only by fire or intense heat.
C)easy to destroy.
D)preserved by magnetic fields.
A)next to impossible to destroy.
B)destroyed only by fire or intense heat.
C)easy to destroy.
D)preserved by magnetic fields.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
The biggest difference between traditional evidence and computer evidence is the latter's:
A)electronic nature.
B)lack of availability.
C)storage on discs.
D)fragility.
A)electronic nature.
B)lack of availability.
C)storage on discs.
D)fragility.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
A virus attack may replace or destroy data on the computer's hard drive and:
A)identify bank accounts and financial records.
B)leave a "back door" open for later entry.
C)obtain one's access codes.
D)defraud the end user.
A)identify bank accounts and financial records.
B)leave a "back door" open for later entry.
C)obtain one's access codes.
D)defraud the end user.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
Skimming is defined as:
A)monitoring data traveling along a data network.
B)scavenging through a business's garbage looking for useful information.
C)exploiting the telephone system's vulnerabilities to acquire free access to Internet provider systems.
D)a method in which a device is placed in a card reader to record sensitive information.
A)monitoring data traveling along a data network.
B)scavenging through a business's garbage looking for useful information.
C)exploiting the telephone system's vulnerabilities to acquire free access to Internet provider systems.
D)a method in which a device is placed in a card reader to record sensitive information.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a:
A)shadow bomb.
B)logic bomb.
C)super-program.
D)turtle.
A)shadow bomb.
B)logic bomb.
C)super-program.
D)turtle.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
NW3C stands for:
A)North West Computer Crime Center.
B)National White Collar Crime Center.
C)New West Crime Center Corporation.
D)National White Collar Criminological Center.
A)North West Computer Crime Center.
B)National White Collar Crime Center.
C)New West Crime Center Corporation.
D)National White Collar Criminological Center.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:
A)salami slice.
B)logic bomb.
C)super-zapper.
D)Trojan horse.
A)salami slice.
B)logic bomb.
C)super-zapper.
D)Trojan horse.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
IC3 stands for:
A)International Computer Crime Categorization.
B)International Computer Classification Corporation.
C)Internet Crime Complaint Center.
D)Internet Computer Crime Commission
A)International Computer Crime Categorization.
B)International Computer Classification Corporation.
C)Internet Crime Complaint Center.
D)Internet Computer Crime Commission
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
Theft of intellectual property:
A)involves the theft of ideas, not property.
B)is hacking into a computer and stealing individual programs, not ideas.
C)involves the pirating of proprietary information and copyrighted material.
D)only applies to written material.
A)involves the theft of ideas, not property.
B)is hacking into a computer and stealing individual programs, not ideas.
C)involves the pirating of proprietary information and copyrighted material.
D)only applies to written material.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
A zombie is a computer:
A)used to spoof or falsify IP and e-mail addresses.
B)that has been rendered nonfunctional by a virus.
C)used by hackers to copy other computer programs.
D)that has been taken over by another computer.
A)used to spoof or falsify IP and e-mail addresses.
B)that has been rendered nonfunctional by a virus.
C)used by hackers to copy other computer programs.
D)that has been taken over by another computer.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following statements is true?
A)A static IP address does not fluctuate and is thus more secure.
B)A dynamic IP address fluctuates and is thus more secure.
C)An ISP is a unique number, analogous to a phone number.
D)An IP address is directly linked to the location of the building where the computer can be found.
A)A static IP address does not fluctuate and is thus more secure.
B)A dynamic IP address fluctuates and is thus more secure.
C)An ISP is a unique number, analogous to a phone number.
D)An IP address is directly linked to the location of the building where the computer can be found.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
Intentionally destroying computer information, programs, or hardware using a logic bomb is classified as:
A)embezzlement.
B)espionage.
C)extortion.
D)sabotage.
A)embezzlement.
B)espionage.
C)extortion.
D)sabotage.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
Cybercriminals are solitary by nature and rarely operate in groups.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
Cyberterrorism is a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
Less than one percent of U.S.residents aged 16 or older were victims of identity theft in 2012.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
Investigators do not need to be concerned that digital evidence may also contain physical evidence such as DNA, fingerprints, or serology.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
Spyware is most commonly used to infiltrate national security systems, with the ultimate goal of disarming national defense systems.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following specialists are frequently consulted in the team approach to investigating computer crime?
A)mathematicians
B)auditors
C)social media specialists
D)logicians
A)mathematicians
B)auditors
C)social media specialists
D)logicians
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
What type of material should be used when packaging electronic evidence?
A)cellophane
B)aluminum
C)plastic materials
D)paper bags
A)cellophane
B)aluminum
C)plastic materials
D)paper bags
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
Keystroke logging is used in espionage to bypass security measures and obtain passwords.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
Adware is a covert way to advertise on Web sites without having to pay a fee.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Viruses are more powerful and destructive than worms.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
A search warrant is needed to search a computer connected to the Internet.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
The terms Internet and Web are basically interchangeable.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
Transmission of computer viruses and worms may be prosecuted under the federal provisions of the computer fraud and abuse statute relating to damage to computer systems and files.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
Computer disks should be stored away from:
A)magnetic fields
B)metal.
C)partials.
D)light.
A)magnetic fields
B)metal.
C)partials.
D)light.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
Electronic evidence is fragile.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
The USA PATRIOT Act, signed by President George W.Bush in 2001, grants:
A)roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.
B)total authority to the FBI for wiretapping the communication lines of any U.S.citizen.
C)total authority to the FBI to arrest any noncitizen who is under suspicion of using communication lines to plan a terrorist attack.
D)roving authority to the FBI for wiretapping the communication lines of any American.
A)roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.
B)total authority to the FBI for wiretapping the communication lines of any U.S.citizen.
C)total authority to the FBI to arrest any noncitizen who is under suspicion of using communication lines to plan a terrorist attack.
D)roving authority to the FBI for wiretapping the communication lines of any American.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
An attempt to get victims to disclose personal, sensitive information such as passwords and bank account numbers is referred to as phishing.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
The suffixes ".com," ".gov," and ".int" are common examples of ISPs.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
If a computer is left on at crime scene, the first responder should leave the computer on.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following statements is true?
A)Because most police departments have limited reliance on computers, a cyberattack is unlikely to have significant consequences.
B)Security of the police department's computers is basically a nonissue, because most police departments have highly trained computer specialists on staff.
C)Systems that control computer-aided dispatch, records management applications and offender databases are a low priority for security.
D)Any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department.
A)Because most police departments have limited reliance on computers, a cyberattack is unlikely to have significant consequences.
B)Security of the police department's computers is basically a nonissue, because most police departments have highly trained computer specialists on staff.
C)Systems that control computer-aided dispatch, records management applications and offender databases are a low priority for security.
D)Any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
What is the 2014 U.S.State of Cybercrime Survey and what were its results?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
The Privacy Protection Act establishes that investigators are allowed to seize drafts of newsletters or Web pages if there is reason to believe that the seizure is necessary in order to prevent death or serious bodily injury.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
_______________ is any procedure used in cryptography to convert plain text into cipher-text to prevent anyone but the intended recipient from reading the data.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
What did the Supreme Court decide in the case of Ashcroft v.Free Speech Coalition (2002) where the
issue involved the use of "virtual" child pornography?
issue involved the use of "virtual" child pornography?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
Child pornography, fraud, and gambling are examples of crimes in which the computer is used as a(n)
_______________.
_______________.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
It may be possible to retrieve electronic memory devices within cell phones.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
Data is the residual physical representation of data that have been erased.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
When unsolicited commercial e-mail, also known as _______________, is distributed on a massive scale with malicious or contentious content or with intent to defraud, it becomes criminal.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
Most e-crimes are handled without involving legal action or law enforcement.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
Discuss some of the difficulties in reporting, investigating, and prosecuting Internet crimes that are transnational in scope.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
Because successful criminal prosecution of intellectual property theft requires reliable investigative resources, the Cyber Division and the Intellectual Property Rights Division were created by the _______________ to investigate intellectual property theft and fraud.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
Perverted Justice is an Internet-based organization that is committed to assisting victims of cybercrime.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
Very few states have enacted computer crime statutes.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
Computer crimes can also include hidden messages or images, which may appear as an innocent cover message
or picture.The Greek word for "hidden writing" refers to this process as .
or picture.The Greek word for "hidden writing" refers to this process as .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
_______________ involves the hijacking of a domain name in order to redirect online traffic toward a bogus Web site.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
Most computer crimes against businesses and organizations are committed by outsiders.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
Define the "ON/OFF rule" and explain why it is imperative in any cybercrime investigation.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
Describe the basic elements of a "reshipper scheme."
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
A computer program such as Google Chrome that accesses and displays data from the Internet or other networks is called a(n) ______________.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
What are the elements of common protocol for processing a crime scene involving electronic evidence?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
List and briefly describe the various resources (agencies or organizations) available to help law enforcement investigate computer crimes.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
Outline the NetSmartz program, including its mission and how it has been implemented.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
Outline some examples of the type of computer crime evidence that may be found in an investigation.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
Discuss some of the challenges of investigating a business environment versus a stand-alone computer.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
Describe the three general categories of cybercriminals and their respective motivations.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
How could the Privacy Protection Act (PPA) impact a computer crime investigation? What issues should be considered?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
How can computer crimes be prevented? Who is primarily responsible for putting new policies into place?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
What are some of the guidelines investigators must adhere to when dealing with physical evidence in a computer crime case?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
What are some of the essential questions that investigators should ask when interviewing employees and staff at a business or organization that has been the victim of computer crime?
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck