Deck 16: Today Apos;s Challenges the Terrorist Threat Cyber Crime and White Collar Crime

Full screen (f)
exit full mode
Question
Today,approximately border patrol agents are stationed at the Mexican border.

A)2,500
B)9,000
C)21,500
D)40,000
Use Space or
up arrow
down arrow
to flip the card.
Question
Corporate violence is physical harm to individuals or the environment that occurs as the result of corporate policies or decision making.
Question
The sale of pornographic materials to a fifty-year old is always considered a crime against the community.
Question
Terrorist suspects were detained indefinitely as enemy combatants in accordance with the

A)military model.
B)criminal justice model.
C)homeland security model.
D)intelligence model.
Question
One way white-collar criminals to carry out their crimes is through the use of deception.
Question
Terrorists are exploiting new communications technology,including the Internet,to mount global campaigns.
Question
Which of the following is not organized under the Department of Homeland Security?

A)FEMA.
B)the FBI.
C)the U.S.Secret Service.
D)the U.S.Coast Guard.
Question
A virus is a self-replicating software program that attaches itself to a host file to move from one computer to the next.
Question
All of the following have been successfully smuggled across U.S.borders,EXCEPT:

A)high-level terrorist suspects.
B)methamphetamine.
C)firearms.
D)illegal immigrants.
Question
Which response model treats terrorism like any other criminal offense?

A)Intelligence
B)Military
C)Justice
D)Criminal justice
Question
Major differences between criminal court and military tribunals include all of the following EXCEPT

A)military tribunals do not use juries.
B)defendants are not entitled to representation by counsel in military tribunals.
C)military tribunals are not bound by the rules of evidence.
D)military tribunals do not require a unanimous verdict
Question
Jihad refers to all of the following except

A)the struggle against evil in oneself.
B)the struggle against evil outside of oneself.
C)the struggle against nonbelievers.
D)holy war.
Question
Jihad translates into "holy war."
Question
A weapon of mass destruction has the capacity to cause large number of casualties or significant property damage.
Question
The military model regards terrorist activities as threats to the security of the state rather than as criminal acts.
Question
A worm cannot exist as a separate entity and must attach itself to another program to move through a network.
Question
Which of the following is an example of domestic terrorism?

A)The bombing of the U.S.S.Cole
B)The attempted bombing of Times Square by a U.S.citizen
C)The attacks on U.S.Embassies in Northern Africa
D)Aggression against U.S.soldiers living on a military base on Afghanistan
Question
Which of the following is true regarding today's terrorist organizations?

A)Terrorists have developed efficient organizations patterned after the small business model
B)Terror groups are usually led by a single,charismatic leader
C)Terror groups are tightly organized and centralized in structure
D)Individual terrorists rely on word of mouth between operatives
Question
The homeland security presence on the Mexican border has never been greater than it is now.
Question
Which response model considers terrorism a threat to the security of the state rather than a criminal act?

A)Intelligence
B)Military
C)Justice
D)Criminal justice
Question
In order to protect yourself from identity theft,the text suggests all of the following except

A)secure your mailbox.
B)remove your name from mailing lists.
C)do not enter chat rooms or join social networking sites.
D)share information only when necessary.
Question
Which of the following is NOT one of the three main techniques used by white collar criminals to carry out their crimes?

A)Deception.
B)Abuse of trust.
C)Concealment.
D)Violence.
Question
A is a person who uses one computer to break into another.

A)hacker
B)electronic theif
C)piraate
D)spammer
Question
is the criminal action of being involved in an organized effort to engage in illegal business transactions.

A)Extortion
B)Influence peddling
C)Racketeering
D)Insider trading
Question
When consumers purchase merchandise online directly from an online auction site,and that merchandise is never delivered,this is

A)online auction fraud
B)identity theft
C)cyber theft
D)online retail fraud
Question
Which type of software program is capable of reproducing itself as it spreads from one computer to another?

A)Spam
B)Cookie
C)Worm
D)Botnet
Question
By 2010,nearly 300 billion junk-emails,or spam messages were being sent each day,comprising of all emails.

A)97%
B)83%
C)52%
D)19%
Question
All of the following are vulnerable to piracy except

A)books.
B)films.
C)stocks.
D)software.
Question
What percentage of all websites is estimated to have pornographic content.

A)2%
B)12%
C)23%
D)49%
Question
In an effort to collect valuable data and consumer information many websites utilize

A)botnets.
B)worms.
C)cookies.
D)bytes.
Question
Cyberstalking and cyberbullying are both examples of common offline behavior that has been exacerbated by all of the following except

A)emails.
B)chat rooms.
C)text messages.
D)bomb threats.
Question
The Deepwater Horizon oil spill off the coast of Louisiana in April 2010,which caused a great deal harm,is an example of

A)deception
B)corporate violence.
C)racketeering.
D)fraud.
Question
Cyberstalking occurs when

A)a person inadvertently views offensive material online.
B)a person inadvertently sends an unintended recipient an email.
C)a person uses a computer or electronic device to carry out his or her harassment.
D)a person sends pornographic material over the Internet and the recipient is not at least 18 years of age.
Question
The Internet is conducive to child pornography for all of the following reasons EXCEPT:

A)Low-cost.
B)Speed.
C)Security.
D)Anonymity..
Question
The unauthorized copying and use of the property is called

A)insider trading
B)cyber stealing
C)piracy
D)fraud
Question
Which of the following is a form of identity theft?

A)Using digital currency
B)Software piracy
C)Hacking
D)Phishing
Question
About illegal aliens are living in the United States.

A)500,000
B)3,800,000
C)6,000,000
D)11,200,000
Question
Illegal aliens can be removed from the United States at any time as the result of a legal proceeding called

A)compliance.
B)conviction.
C)removal.
D)revocation.
Question
The main goal of cyber forensics is to .

A)Collect witness statements.
B)Gather digital evidence.
C)Facilitate investigations over multiple jurisdictions.
D)Elicit confessions.
Question
Today,the dominant strain of terrorism mixes political goals with very strong

A)ethnic affiliations.
B)religious affiliations.
C)affiliations to particular nations.
D)cultural affiliations.
Question
Khan's online magazine is most significantly an example of what recent trend in international terrorism?

A)exploitation of new communications technology
B)more efficient methods of financing
C)structural organization based on the small-business model
D)development of more efficient organizations
Question
China's online policy would lead to less

A)anonymity
B)speed
C)security
D)commerce
Question
Given the venue where Shehadeh was convicted,which model would apply in this instance?

A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
Question
The preface would suggest that the United States viewed Shehadeh as a(n)

A)American citizen with due process rights
B)enemy combatant
C)criminal combatant
D)civilian combatant
Question
In what venue was Shehadeh convicted?

A)military tribunal
B)criminal court
C)civil court
D)joint military-civilian court
Question
Controlling the flow of good and services across U.S.borders is the responsibility of ,an agency located within the Department of Homeland Security.
Question
China's online policy would potentially diminish the need for people with skills in what field?

A)cyber forensics
B)DNA forensics
C)crime scene investigators
D)criminal investigation
Question
Terrorists have evolved into ,free of control by or allegiance to any nation.
Question
A court operated by the military rather than the criminal justice system is a .
Question
Shehadeh's desire to join a terrorist organization would likely be an example of

A)the exploitation of new communications technology
B)more efficient methods of financing
C)a philosophy of bigger means better
D)self-radicalization
Question
China's online policy would have little immediate effect on incidents of

A)corporate violence
B)phishing
C)spam
D)cyber fraud
Question
In the criminal justice model, is treated like any other crime.
Question
Given the information in the preface,we can conclude that Shehadeh is a(n)

A)American citizen
B)enemy combatant
C)foreign national
D)There is not enough information to judge.
Question
A is official authorization allowing a person to travel within the authorizing country.
Question
The use of a drone strike suggests that the United States viewed Khan as

A)an American citizen with due process rights
B)an enemy combatant
C)a criminal combatant
D)a civilian combatant
Question
Khan was killed by an American drone strike in Yemen in 2011.Which model would apply in this instance?

A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
Question
In terms of counter terrorism,Samir Khan's online magazine,Inspire,would suffer most from

A)a cyberattack
B)intellectual piracy
C)corporate violence
D)government regulation
Question
Khan's magazine,Inspire,presumably would inspire individuals toward

A)jihad
B)religious pilgrimages
C)corporate sponsorship
D)government deregulation
Question
American online policies would likely allow for more than China's.

A)cyber crime
B)cyberattacks
C)cyber fraud
D)All of these choices
Question
Advocates of free speech would prefer which country's Internet policy?

A)United States
B)China
C)Both country's policies are about the same.
D)There is not enough information provided in the preface to make a conclusion.
Question
A is any wrongful act that is directed against computers and computer parts or that involves wrongful use or abuse of computers or software.
Question
The theft of a victim's personal information is .
Question
is fraud committed over the Internet.
Question
refers to three kinds of struggle,or exertion,required of the Muslim faithful.
Question
A crime that takes place in the virtual community of the Internet is a .
Question
The is legislation which makes it a crime to exchange .any material online that would cause another to believe than a minor is engaged in actual or simulated sex.
Question
The application of science for finding and utilizing evidence of cyber crime is .
Question
Books,films,and music are examples of .
Question
A virus is another form of _____.
Question
is the state of operating in accordance with governmental standards.
Question
Sending unsolicited e-mails that falsely claim to be from a legitimate organization in an attempt to acquire sensitive information from the recipient is called .
Question
A person who uses one computer to break into another is a(n) .
Question
An individual who has supported foreign terrorist organizations engaged in hostilities against the military operations of the United States is considered an .
Question
refers to acts of terror without direct foreign involvement that take place within the territorial jurisdiction of the United States.
Question
The goal of regulation is ,or the following of regulatory guidelines.
Question
A is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
Question
occurs in the business world when somebody within a company sells influence,power,or information to a person outside the company who can benefit.
Question
A(n) is a person who is not a citizen of the country in which he or she is located.
Question
Terrorists have developed more efficient organizations based on the model.
Question
Under the model of homeland security,terrorism is treated like any other crime.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/90
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Today Apos;s Challenges the Terrorist Threat Cyber Crime and White Collar Crime
1
Today,approximately border patrol agents are stationed at the Mexican border.

A)2,500
B)9,000
C)21,500
D)40,000
C
2
Corporate violence is physical harm to individuals or the environment that occurs as the result of corporate policies or decision making.
True
3
The sale of pornographic materials to a fifty-year old is always considered a crime against the community.
False
4
Terrorist suspects were detained indefinitely as enemy combatants in accordance with the

A)military model.
B)criminal justice model.
C)homeland security model.
D)intelligence model.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
5
One way white-collar criminals to carry out their crimes is through the use of deception.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
6
Terrorists are exploiting new communications technology,including the Internet,to mount global campaigns.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not organized under the Department of Homeland Security?

A)FEMA.
B)the FBI.
C)the U.S.Secret Service.
D)the U.S.Coast Guard.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
8
A virus is a self-replicating software program that attaches itself to a host file to move from one computer to the next.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following have been successfully smuggled across U.S.borders,EXCEPT:

A)high-level terrorist suspects.
B)methamphetamine.
C)firearms.
D)illegal immigrants.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
10
Which response model treats terrorism like any other criminal offense?

A)Intelligence
B)Military
C)Justice
D)Criminal justice
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
11
Major differences between criminal court and military tribunals include all of the following EXCEPT

A)military tribunals do not use juries.
B)defendants are not entitled to representation by counsel in military tribunals.
C)military tribunals are not bound by the rules of evidence.
D)military tribunals do not require a unanimous verdict
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
12
Jihad refers to all of the following except

A)the struggle against evil in oneself.
B)the struggle against evil outside of oneself.
C)the struggle against nonbelievers.
D)holy war.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
13
Jihad translates into "holy war."
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
14
A weapon of mass destruction has the capacity to cause large number of casualties or significant property damage.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
15
The military model regards terrorist activities as threats to the security of the state rather than as criminal acts.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
16
A worm cannot exist as a separate entity and must attach itself to another program to move through a network.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is an example of domestic terrorism?

A)The bombing of the U.S.S.Cole
B)The attempted bombing of Times Square by a U.S.citizen
C)The attacks on U.S.Embassies in Northern Africa
D)Aggression against U.S.soldiers living on a military base on Afghanistan
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is true regarding today's terrorist organizations?

A)Terrorists have developed efficient organizations patterned after the small business model
B)Terror groups are usually led by a single,charismatic leader
C)Terror groups are tightly organized and centralized in structure
D)Individual terrorists rely on word of mouth between operatives
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
19
The homeland security presence on the Mexican border has never been greater than it is now.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
20
Which response model considers terrorism a threat to the security of the state rather than a criminal act?

A)Intelligence
B)Military
C)Justice
D)Criminal justice
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
21
In order to protect yourself from identity theft,the text suggests all of the following except

A)secure your mailbox.
B)remove your name from mailing lists.
C)do not enter chat rooms or join social networking sites.
D)share information only when necessary.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is NOT one of the three main techniques used by white collar criminals to carry out their crimes?

A)Deception.
B)Abuse of trust.
C)Concealment.
D)Violence.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
23
A is a person who uses one computer to break into another.

A)hacker
B)electronic theif
C)piraate
D)spammer
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
24
is the criminal action of being involved in an organized effort to engage in illegal business transactions.

A)Extortion
B)Influence peddling
C)Racketeering
D)Insider trading
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
25
When consumers purchase merchandise online directly from an online auction site,and that merchandise is never delivered,this is

A)online auction fraud
B)identity theft
C)cyber theft
D)online retail fraud
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
26
Which type of software program is capable of reproducing itself as it spreads from one computer to another?

A)Spam
B)Cookie
C)Worm
D)Botnet
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
27
By 2010,nearly 300 billion junk-emails,or spam messages were being sent each day,comprising of all emails.

A)97%
B)83%
C)52%
D)19%
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
28
All of the following are vulnerable to piracy except

A)books.
B)films.
C)stocks.
D)software.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
29
What percentage of all websites is estimated to have pornographic content.

A)2%
B)12%
C)23%
D)49%
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
30
In an effort to collect valuable data and consumer information many websites utilize

A)botnets.
B)worms.
C)cookies.
D)bytes.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
31
Cyberstalking and cyberbullying are both examples of common offline behavior that has been exacerbated by all of the following except

A)emails.
B)chat rooms.
C)text messages.
D)bomb threats.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
32
The Deepwater Horizon oil spill off the coast of Louisiana in April 2010,which caused a great deal harm,is an example of

A)deception
B)corporate violence.
C)racketeering.
D)fraud.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
33
Cyberstalking occurs when

A)a person inadvertently views offensive material online.
B)a person inadvertently sends an unintended recipient an email.
C)a person uses a computer or electronic device to carry out his or her harassment.
D)a person sends pornographic material over the Internet and the recipient is not at least 18 years of age.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
34
The Internet is conducive to child pornography for all of the following reasons EXCEPT:

A)Low-cost.
B)Speed.
C)Security.
D)Anonymity..
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
35
The unauthorized copying and use of the property is called

A)insider trading
B)cyber stealing
C)piracy
D)fraud
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is a form of identity theft?

A)Using digital currency
B)Software piracy
C)Hacking
D)Phishing
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
37
About illegal aliens are living in the United States.

A)500,000
B)3,800,000
C)6,000,000
D)11,200,000
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
38
Illegal aliens can be removed from the United States at any time as the result of a legal proceeding called

A)compliance.
B)conviction.
C)removal.
D)revocation.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
39
The main goal of cyber forensics is to .

A)Collect witness statements.
B)Gather digital evidence.
C)Facilitate investigations over multiple jurisdictions.
D)Elicit confessions.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
40
Today,the dominant strain of terrorism mixes political goals with very strong

A)ethnic affiliations.
B)religious affiliations.
C)affiliations to particular nations.
D)cultural affiliations.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
41
Khan's online magazine is most significantly an example of what recent trend in international terrorism?

A)exploitation of new communications technology
B)more efficient methods of financing
C)structural organization based on the small-business model
D)development of more efficient organizations
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
42
China's online policy would lead to less

A)anonymity
B)speed
C)security
D)commerce
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
43
Given the venue where Shehadeh was convicted,which model would apply in this instance?

A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
44
The preface would suggest that the United States viewed Shehadeh as a(n)

A)American citizen with due process rights
B)enemy combatant
C)criminal combatant
D)civilian combatant
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
45
In what venue was Shehadeh convicted?

A)military tribunal
B)criminal court
C)civil court
D)joint military-civilian court
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
46
Controlling the flow of good and services across U.S.borders is the responsibility of ,an agency located within the Department of Homeland Security.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
47
China's online policy would potentially diminish the need for people with skills in what field?

A)cyber forensics
B)DNA forensics
C)crime scene investigators
D)criminal investigation
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
48
Terrorists have evolved into ,free of control by or allegiance to any nation.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
49
A court operated by the military rather than the criminal justice system is a .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
50
Shehadeh's desire to join a terrorist organization would likely be an example of

A)the exploitation of new communications technology
B)more efficient methods of financing
C)a philosophy of bigger means better
D)self-radicalization
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
51
China's online policy would have little immediate effect on incidents of

A)corporate violence
B)phishing
C)spam
D)cyber fraud
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
52
In the criminal justice model, is treated like any other crime.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
53
Given the information in the preface,we can conclude that Shehadeh is a(n)

A)American citizen
B)enemy combatant
C)foreign national
D)There is not enough information to judge.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
54
A is official authorization allowing a person to travel within the authorizing country.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
55
The use of a drone strike suggests that the United States viewed Khan as

A)an American citizen with due process rights
B)an enemy combatant
C)a criminal combatant
D)a civilian combatant
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
56
Khan was killed by an American drone strike in Yemen in 2011.Which model would apply in this instance?

A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
57
In terms of counter terrorism,Samir Khan's online magazine,Inspire,would suffer most from

A)a cyberattack
B)intellectual piracy
C)corporate violence
D)government regulation
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
58
Khan's magazine,Inspire,presumably would inspire individuals toward

A)jihad
B)religious pilgrimages
C)corporate sponsorship
D)government deregulation
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
59
American online policies would likely allow for more than China's.

A)cyber crime
B)cyberattacks
C)cyber fraud
D)All of these choices
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
60
Advocates of free speech would prefer which country's Internet policy?

A)United States
B)China
C)Both country's policies are about the same.
D)There is not enough information provided in the preface to make a conclusion.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
61
A is any wrongful act that is directed against computers and computer parts or that involves wrongful use or abuse of computers or software.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
62
The theft of a victim's personal information is .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
63
is fraud committed over the Internet.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
64
refers to three kinds of struggle,or exertion,required of the Muslim faithful.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
65
A crime that takes place in the virtual community of the Internet is a .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
66
The is legislation which makes it a crime to exchange .any material online that would cause another to believe than a minor is engaged in actual or simulated sex.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
67
The application of science for finding and utilizing evidence of cyber crime is .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
68
Books,films,and music are examples of .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
69
A virus is another form of _____.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
70
is the state of operating in accordance with governmental standards.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
71
Sending unsolicited e-mails that falsely claim to be from a legitimate organization in an attempt to acquire sensitive information from the recipient is called .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
72
A person who uses one computer to break into another is a(n) .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
73
An individual who has supported foreign terrorist organizations engaged in hostilities against the military operations of the United States is considered an .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
74
refers to acts of terror without direct foreign involvement that take place within the territorial jurisdiction of the United States.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
75
The goal of regulation is ,or the following of regulatory guidelines.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
76
A is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
77
occurs in the business world when somebody within a company sells influence,power,or information to a person outside the company who can benefit.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) is a person who is not a citizen of the country in which he or she is located.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
79
Terrorists have developed more efficient organizations based on the model.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
80
Under the model of homeland security,terrorism is treated like any other crime.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 90 flashcards in this deck.