Deck 16: Today Apos;s Challenges the Terrorist Threat Cyber Crime and White Collar Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/90
Play
Full screen (f)
Deck 16: Today Apos;s Challenges the Terrorist Threat Cyber Crime and White Collar Crime
1
Today,approximately border patrol agents are stationed at the Mexican border.
A)2,500
B)9,000
C)21,500
D)40,000
A)2,500
B)9,000
C)21,500
D)40,000
C
2
Corporate violence is physical harm to individuals or the environment that occurs as the result of corporate policies or decision making.
True
3
The sale of pornographic materials to a fifty-year old is always considered a crime against the community.
False
4
Terrorist suspects were detained indefinitely as enemy combatants in accordance with the
A)military model.
B)criminal justice model.
C)homeland security model.
D)intelligence model.
A)military model.
B)criminal justice model.
C)homeland security model.
D)intelligence model.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
5
One way white-collar criminals to carry out their crimes is through the use of deception.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
6
Terrorists are exploiting new communications technology,including the Internet,to mount global campaigns.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not organized under the Department of Homeland Security?
A)FEMA.
B)the FBI.
C)the U.S.Secret Service.
D)the U.S.Coast Guard.
A)FEMA.
B)the FBI.
C)the U.S.Secret Service.
D)the U.S.Coast Guard.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
8
A virus is a self-replicating software program that attaches itself to a host file to move from one computer to the next.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following have been successfully smuggled across U.S.borders,EXCEPT:
A)high-level terrorist suspects.
B)methamphetamine.
C)firearms.
D)illegal immigrants.
A)high-level terrorist suspects.
B)methamphetamine.
C)firearms.
D)illegal immigrants.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
10
Which response model treats terrorism like any other criminal offense?
A)Intelligence
B)Military
C)Justice
D)Criminal justice
A)Intelligence
B)Military
C)Justice
D)Criminal justice
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
11
Major differences between criminal court and military tribunals include all of the following EXCEPT
A)military tribunals do not use juries.
B)defendants are not entitled to representation by counsel in military tribunals.
C)military tribunals are not bound by the rules of evidence.
D)military tribunals do not require a unanimous verdict
A)military tribunals do not use juries.
B)defendants are not entitled to representation by counsel in military tribunals.
C)military tribunals are not bound by the rules of evidence.
D)military tribunals do not require a unanimous verdict
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
12
Jihad refers to all of the following except
A)the struggle against evil in oneself.
B)the struggle against evil outside of oneself.
C)the struggle against nonbelievers.
D)holy war.
A)the struggle against evil in oneself.
B)the struggle against evil outside of oneself.
C)the struggle against nonbelievers.
D)holy war.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
13
Jihad translates into "holy war."
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
14
A weapon of mass destruction has the capacity to cause large number of casualties or significant property damage.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
15
The military model regards terrorist activities as threats to the security of the state rather than as criminal acts.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
16
A worm cannot exist as a separate entity and must attach itself to another program to move through a network.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is an example of domestic terrorism?
A)The bombing of the U.S.S.Cole
B)The attempted bombing of Times Square by a U.S.citizen
C)The attacks on U.S.Embassies in Northern Africa
D)Aggression against U.S.soldiers living on a military base on Afghanistan
A)The bombing of the U.S.S.Cole
B)The attempted bombing of Times Square by a U.S.citizen
C)The attacks on U.S.Embassies in Northern Africa
D)Aggression against U.S.soldiers living on a military base on Afghanistan
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is true regarding today's terrorist organizations?
A)Terrorists have developed efficient organizations patterned after the small business model
B)Terror groups are usually led by a single,charismatic leader
C)Terror groups are tightly organized and centralized in structure
D)Individual terrorists rely on word of mouth between operatives
A)Terrorists have developed efficient organizations patterned after the small business model
B)Terror groups are usually led by a single,charismatic leader
C)Terror groups are tightly organized and centralized in structure
D)Individual terrorists rely on word of mouth between operatives
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
19
The homeland security presence on the Mexican border has never been greater than it is now.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
20
Which response model considers terrorism a threat to the security of the state rather than a criminal act?
A)Intelligence
B)Military
C)Justice
D)Criminal justice
A)Intelligence
B)Military
C)Justice
D)Criminal justice
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
21
In order to protect yourself from identity theft,the text suggests all of the following except
A)secure your mailbox.
B)remove your name from mailing lists.
C)do not enter chat rooms or join social networking sites.
D)share information only when necessary.
A)secure your mailbox.
B)remove your name from mailing lists.
C)do not enter chat rooms or join social networking sites.
D)share information only when necessary.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is NOT one of the three main techniques used by white collar criminals to carry out their crimes?
A)Deception.
B)Abuse of trust.
C)Concealment.
D)Violence.
A)Deception.
B)Abuse of trust.
C)Concealment.
D)Violence.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
23
A is a person who uses one computer to break into another.
A)hacker
B)electronic theif
C)piraate
D)spammer
A)hacker
B)electronic theif
C)piraate
D)spammer
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
24
is the criminal action of being involved in an organized effort to engage in illegal business transactions.
A)Extortion
B)Influence peddling
C)Racketeering
D)Insider trading
A)Extortion
B)Influence peddling
C)Racketeering
D)Insider trading
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
25
When consumers purchase merchandise online directly from an online auction site,and that merchandise is never delivered,this is
A)online auction fraud
B)identity theft
C)cyber theft
D)online retail fraud
A)online auction fraud
B)identity theft
C)cyber theft
D)online retail fraud
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
26
Which type of software program is capable of reproducing itself as it spreads from one computer to another?
A)Spam
B)Cookie
C)Worm
D)Botnet
A)Spam
B)Cookie
C)Worm
D)Botnet
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
27
By 2010,nearly 300 billion junk-emails,or spam messages were being sent each day,comprising of all emails.
A)97%
B)83%
C)52%
D)19%
A)97%
B)83%
C)52%
D)19%
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
28
All of the following are vulnerable to piracy except
A)books.
B)films.
C)stocks.
D)software.
A)books.
B)films.
C)stocks.
D)software.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
29
What percentage of all websites is estimated to have pornographic content.
A)2%
B)12%
C)23%
D)49%
A)2%
B)12%
C)23%
D)49%
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
30
In an effort to collect valuable data and consumer information many websites utilize
A)botnets.
B)worms.
C)cookies.
D)bytes.
A)botnets.
B)worms.
C)cookies.
D)bytes.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
31
Cyberstalking and cyberbullying are both examples of common offline behavior that has been exacerbated by all of the following except
A)emails.
B)chat rooms.
C)text messages.
D)bomb threats.
A)emails.
B)chat rooms.
C)text messages.
D)bomb threats.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
32
The Deepwater Horizon oil spill off the coast of Louisiana in April 2010,which caused a great deal harm,is an example of
A)deception
B)corporate violence.
C)racketeering.
D)fraud.
A)deception
B)corporate violence.
C)racketeering.
D)fraud.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
33
Cyberstalking occurs when
A)a person inadvertently views offensive material online.
B)a person inadvertently sends an unintended recipient an email.
C)a person uses a computer or electronic device to carry out his or her harassment.
D)a person sends pornographic material over the Internet and the recipient is not at least 18 years of age.
A)a person inadvertently views offensive material online.
B)a person inadvertently sends an unintended recipient an email.
C)a person uses a computer or electronic device to carry out his or her harassment.
D)a person sends pornographic material over the Internet and the recipient is not at least 18 years of age.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
34
The Internet is conducive to child pornography for all of the following reasons EXCEPT:
A)Low-cost.
B)Speed.
C)Security.
D)Anonymity..
A)Low-cost.
B)Speed.
C)Security.
D)Anonymity..
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
35
The unauthorized copying and use of the property is called
A)insider trading
B)cyber stealing
C)piracy
D)fraud
A)insider trading
B)cyber stealing
C)piracy
D)fraud
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is a form of identity theft?
A)Using digital currency
B)Software piracy
C)Hacking
D)Phishing
A)Using digital currency
B)Software piracy
C)Hacking
D)Phishing
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
37
About illegal aliens are living in the United States.
A)500,000
B)3,800,000
C)6,000,000
D)11,200,000
A)500,000
B)3,800,000
C)6,000,000
D)11,200,000
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
38
Illegal aliens can be removed from the United States at any time as the result of a legal proceeding called
A)compliance.
B)conviction.
C)removal.
D)revocation.
A)compliance.
B)conviction.
C)removal.
D)revocation.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
39
The main goal of cyber forensics is to .
A)Collect witness statements.
B)Gather digital evidence.
C)Facilitate investigations over multiple jurisdictions.
D)Elicit confessions.
A)Collect witness statements.
B)Gather digital evidence.
C)Facilitate investigations over multiple jurisdictions.
D)Elicit confessions.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
40
Today,the dominant strain of terrorism mixes political goals with very strong
A)ethnic affiliations.
B)religious affiliations.
C)affiliations to particular nations.
D)cultural affiliations.
A)ethnic affiliations.
B)religious affiliations.
C)affiliations to particular nations.
D)cultural affiliations.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
41
Khan's online magazine is most significantly an example of what recent trend in international terrorism?
A)exploitation of new communications technology
B)more efficient methods of financing
C)structural organization based on the small-business model
D)development of more efficient organizations
A)exploitation of new communications technology
B)more efficient methods of financing
C)structural organization based on the small-business model
D)development of more efficient organizations
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
42
China's online policy would lead to less
A)anonymity
B)speed
C)security
D)commerce
A)anonymity
B)speed
C)security
D)commerce
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
43
Given the venue where Shehadeh was convicted,which model would apply in this instance?
A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
44
The preface would suggest that the United States viewed Shehadeh as a(n)
A)American citizen with due process rights
B)enemy combatant
C)criminal combatant
D)civilian combatant
A)American citizen with due process rights
B)enemy combatant
C)criminal combatant
D)civilian combatant
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
45
In what venue was Shehadeh convicted?
A)military tribunal
B)criminal court
C)civil court
D)joint military-civilian court
A)military tribunal
B)criminal court
C)civil court
D)joint military-civilian court
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
46
Controlling the flow of good and services across U.S.borders is the responsibility of ,an agency located within the Department of Homeland Security.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
47
China's online policy would potentially diminish the need for people with skills in what field?
A)cyber forensics
B)DNA forensics
C)crime scene investigators
D)criminal investigation
A)cyber forensics
B)DNA forensics
C)crime scene investigators
D)criminal investigation
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
48
Terrorists have evolved into ,free of control by or allegiance to any nation.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
49
A court operated by the military rather than the criminal justice system is a .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
50
Shehadeh's desire to join a terrorist organization would likely be an example of
A)the exploitation of new communications technology
B)more efficient methods of financing
C)a philosophy of bigger means better
D)self-radicalization
A)the exploitation of new communications technology
B)more efficient methods of financing
C)a philosophy of bigger means better
D)self-radicalization
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
51
China's online policy would have little immediate effect on incidents of
A)corporate violence
B)phishing
C)spam
D)cyber fraud
A)corporate violence
B)phishing
C)spam
D)cyber fraud
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
52
In the criminal justice model, is treated like any other crime.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
53
Given the information in the preface,we can conclude that Shehadeh is a(n)
A)American citizen
B)enemy combatant
C)foreign national
D)There is not enough information to judge.
A)American citizen
B)enemy combatant
C)foreign national
D)There is not enough information to judge.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
54
A is official authorization allowing a person to travel within the authorizing country.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
55
The use of a drone strike suggests that the United States viewed Khan as
A)an American citizen with due process rights
B)an enemy combatant
C)a criminal combatant
D)a civilian combatant
A)an American citizen with due process rights
B)an enemy combatant
C)a criminal combatant
D)a civilian combatant
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
56
Khan was killed by an American drone strike in Yemen in 2011.Which model would apply in this instance?
A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
57
In terms of counter terrorism,Samir Khan's online magazine,Inspire,would suffer most from
A)a cyberattack
B)intellectual piracy
C)corporate violence
D)government regulation
A)a cyberattack
B)intellectual piracy
C)corporate violence
D)government regulation
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
58
Khan's magazine,Inspire,presumably would inspire individuals toward
A)jihad
B)religious pilgrimages
C)corporate sponsorship
D)government deregulation
A)jihad
B)religious pilgrimages
C)corporate sponsorship
D)government deregulation
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
59
American online policies would likely allow for more than China's.
A)cyber crime
B)cyberattacks
C)cyber fraud
D)All of these choices
A)cyber crime
B)cyberattacks
C)cyber fraud
D)All of these choices
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
60
Advocates of free speech would prefer which country's Internet policy?
A)United States
B)China
C)Both country's policies are about the same.
D)There is not enough information provided in the preface to make a conclusion.
A)United States
B)China
C)Both country's policies are about the same.
D)There is not enough information provided in the preface to make a conclusion.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
61
A is any wrongful act that is directed against computers and computer parts or that involves wrongful use or abuse of computers or software.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
62
The theft of a victim's personal information is .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
63
is fraud committed over the Internet.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
64
refers to three kinds of struggle,or exertion,required of the Muslim faithful.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
65
A crime that takes place in the virtual community of the Internet is a .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
66
The is legislation which makes it a crime to exchange .any material online that would cause another to believe than a minor is engaged in actual or simulated sex.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
67
The application of science for finding and utilizing evidence of cyber crime is .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
68
Books,films,and music are examples of .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
69
A virus is another form of _____.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
70
is the state of operating in accordance with governmental standards.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
71
Sending unsolicited e-mails that falsely claim to be from a legitimate organization in an attempt to acquire sensitive information from the recipient is called .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
72
A person who uses one computer to break into another is a(n) .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
73
An individual who has supported foreign terrorist organizations engaged in hostilities against the military operations of the United States is considered an .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
74
refers to acts of terror without direct foreign involvement that take place within the territorial jurisdiction of the United States.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
75
The goal of regulation is ,or the following of regulatory guidelines.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
76
A is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
77
occurs in the business world when somebody within a company sells influence,power,or information to a person outside the company who can benefit.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) is a person who is not a citizen of the country in which he or she is located.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
79
Terrorists have developed more efficient organizations based on the model.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
80
Under the model of homeland security,terrorism is treated like any other crime.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck