Deck 14: Todays Challenges in Criminal Justice

Full screen (f)
exit full mode
Question
_____ is the act of helping a terrorist organization by engaging in a wide range of activity that includes providing financial assistance, training, and expert advice.

A) Material support
B) Red flagging
C) Identity theft
D) Spear phishing
Use Space or
up arrow
down arrow
to flip the card.
Question
Hector is a member of a terrorist organization that hacks into the traffic control system of the state of Greenville, United States. He disrupts the traffic in the state for a day, leading to many automobile accidents. This is an example of _____.

A) phishing
B) true threat
C) identity theft
D) cyberattack
Question
Cyberattack is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
Question
Which of the following terms refers to an attempt to damage or disrupt computer systems or electronic networks operated by computers?

A) Cyber fraud
B) Identity theft
C) Cyberattack
D) Corporate violence
Question
The Foreign Intelligence Surveillance Act requires permission from a special court to engage in surveillance, if the target is a(n):

A) employee of the armed forces of the United States.
B) individual associated with the state government.
C) foreign agent operating within the United States.
D) individual with a previous felony conviction.
Question
Less than 10 percent of identity theft involves the misappropriation of an existing credit-card account.
Question
The Brady Bill prohibits all persons from acquiring a firearm for personal purposes.
Question
National security letters can be used to collect:

A) records of individuals that own a federally licensed firearm.
B) medical records of individuals targeted for surveillance.
C) funds as a reparation for damages done as a result of a war.
D) financial records such as money transfers and bank accounts.
Question
Identity theft involves:

A) stealing personal information from a victim and using it to access his or her financial resources.
B) using one's position in an organization to steal his or her employer's funds.
C) creating a fake account in websites in order to solicit members for a donation.
D) listing a product in an auction site and refusing to send the product to the customer despite payment.
Question
Cyber sleuths can create a digital duplicate of a targeted hard drive, enabling them to break access codes, determine passwords, and search files.
Question
Which of the following examples best illustrates advance fee fraud?

A) Scott sends a fraudulent mail to hundreds of people claiming that they have won 20 million dollars in a lottery.
B) Sabina creates a fake account on a networking site and collects funds for a fictitious charitable organization.
C) Frederick lists a Van Gogh painting for auction on his website and refuses to send the product upon receiving payment.
D) Deliwear, an online shopping portal, does not deliver clothes that are ordered online by customers despite receiving payment.
Question
Tax evasion occurs when taxpayers underreport their taxable income.
Question
The preferred method of phishing is through the use of a worm.
Question
Which of the following is true of the Foreign Intelligence Surveillance Court?

A) It comprises eleven federal judges assigned by the chief justice of the Supreme Court.
B) It gathers records of surveillance carried out by foreign agents in the United States.
C) It prohibits electronic monitoring of suspected individuals or national security threats.
D) It comprises two federal judges assigned by the President of the United States.
Question
The main goal of cyber forensics is to gather digital evidence.
Question
A technique called keystroke logging relies on software that embeds itself in a victim's computer and records every keystroke made on that computer.
Question
Which of the following Supreme Court cases involved the police's warrantless seizure of phone numbers dialed from the home of a robbery suspect?

A) Muller v. Oregon
B) Browder v. Gayle
C) Smith v. Maryland
D) Batson v. Kentucky
Question
In the context of the Brady Bill, an applicant can be prohibited from purchasing a firearm if evidence of illegal drug addiction is uncovered.
Question
In which of the following Supreme Court cases did the Court strike down part of a Virginia law that prohibited all forms of cross burning?

A) Virginia v. Loving
B) Boynton v. Virginia
C) Virginia v. Black
D) Morgan v. Virginia
Question
Different types of malware are used to prevent a computer from being infested with viruses.
Question
The Brady Bill requires background checks:

A) only for those who purchase guns from gun shows or from private citizens.
B) for applicants who wish to become federally licensed firearms dealers.
C) for applicants who have a history of procuring firearms.
D) only for those who purchase guns from federally licensed firearms dealers.
Question
Which of the following terms refers to sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information from the recipient?

A) Phishing
B) Encryption
C) Corporate violence
D) Cyberstalking
Question
_____ is a practice wherein companies hire outside experts to act as hackers and attempt to gain access to their systems.

A) Smishing
B) Cyberstalking
C) Penetration testing
D) Spear phishing
Question
Which of the following is true of pilferage?

A) It is a more serious form of employee fraud.
B) It involves individuals stealing items from their workplaces.
C) It involves individuals resorting to illegal activity in the stock market.
D) It is a more serious form of consumer fraud.
Question
Which of the following is a form of phishing that is done via a phone?

A) Vishing
B) Pharming
C) Cyberstalking
D) Flagging
Question
Cyber stalking involves:

A) using electronic communication to cause a victim to fear for her or his safety.
B) stealing personal information from a victim and using it to access his or her financial resources.
C) faking an identity of a law enforcement officer in order to defraud victims into paying money.
D) creating a fake account in websites in order to solicit members for a donation.
Question
Lee receives an email from an unknown account claiming that his debit card details need to be confirmed along with the password for the purpose of verification. The details are sent, after which he then contacts the bank, which denies sending any such email. After a few days, he notices that there have been a lot of unknown transactions from his bank account. This is an example of _____.

A) cyberstalking
B) phishing
C) hacking
D) flagging
Question
Which of the following illustrates spear phishing?

A) Tanya clicks on a link that appears to have been emailed by her colleague that downloads a harmful software.
B) Margaret receives an email from an unknown account claiming that she has won the state lottery and asks her for her credit card information.
C) Parker receives an email from an unknown account claiming to be from a charitable organization and requests him to transfer money as a donation.
D) George opens a pornographic website on his office computer without the knowledge of his coworkers.
Question
_____ refers to any program that is harmful to a computer or, by extension, a computer user.

A) A glitch
B) A bug
C) Spam
D) Malware
Question
Which of the following is a similarity between a virus and a worm?

A) Both can replicate themselves.
B) Both need to be attached to an existing file in the computer.
C) Both can exist as independent entities.
D) Both do not affect the normal use of a computer.
Question
Which of the following is a problem with the background check system for the purchase of firearms?

A) It is unreliable, as it is carried out by licensed firearms dealers.
B) It relies on states to provide the federal government with mental-health information about their citizens.
C) It allows people with prior felony convictions to purchase firearms, which is dangerous to the society.
D) It makes it easier to purchase semiautomatic weapons and easier to keep firearms in the hands of the mentally ill.
Question
The _____ requires a person wishing to purchase a gun from a licensed firearms dealer to apply for the privilege of doing so.

A) Brady Handgun Violence Prevention Act
B) Undetectable Firearms Act
C) National Firearms Act
D) Protection of Lawful Commerce in Arms Act
Question
Unlike "regular" crimes, white-collar crimes:

A) are non-bailable.
B) do not involve deception.
C) do not involve physical force.
D) are not punishable.
Question
AAsoft, a software company, encodes all the files in its system in such a way that only its employees can access it with an automatically generated password. This is an example of _____.

A) transcription
B) encryption
C) diversion
D) surveillance
Question
Mike is a businessman in the state of Lakaster, United States. He is worried that his business rivals might murder him, and so, he decides to purchase a revolver in order to defend himself. When he approaches a licensed firearms dealer to apply for the privilege of owning a firearm, he is informed that the process includes a thorough background check by the FBI. Which of the following, if true, is most likely to cause the FBI to prohibit Mike from purchasing the revolver?

A) Mike has worked with the FBI in the past.
B) Mike has a history of felony conviction.
C) Mike has purchased a licensed firearm in the past.
D) Mike has faced significant losses in his business.
Question
A website named freegoodz.com allows users to download computer software for free. This has resulted in significant losses for several companies that sell these software legally. This is an example of _____.

A) smishing
B) piracy
C) cyberstalking
D) hacking
Question
Which of the following is a form of cyberbullying that involves nonconsensual online publication of explicit images?

A) Spamming
B) Cyberstalking
C) Spear phishing
D) Revenge porn
Question
Unlike a worm, a virus:

A) is not a software program.
B) does not interfere with the normal use of a computer.
C) cannot replicate itself.
D) cannot exist as a separate entity.
Question
Piracy involves:

A) the unauthorized copying and use of someone's intellectual property.
B) sending emails to targets in order to acquire sensitive information.
C) the unauthorized sending of bulk emails to victims.
D) creating fake accounts in websites in order to solicit members for a donation.
Question
Botnets are networks of computers that have been appropriated by _____ without the knowledge of their owners.

A) cyberstalkers
B) spammers
C) hackers
D) cyber sleuths
Question
_________ is an act of speech or expression that is not protected by the First Amendment because it is done with the intention of placing a specific victim or group of victims in fear of unlawful violence.
A. True threat
B. Identity theft
C. Cyberattack
D. Corporate Violence ​
Question
_________ is the illegal production and sale of material depicting sexually explicit conduct involving a child.
A. Child pornography
B. Child abduction
C. Child-selling
D. Child neglect ​
Question
The _________ requires background checks for private gun transactions and for the sale of ammunition.
A. Undetectable Firearms Act
B. New York Secure Firearms Enforcement Act
C. Protection of Lawful Commerce in Arms Act
D. Gun-Free School Zones Act ​
Question
Which of the following is true of the Occupational Safety and Health Administration (OSHA)?

A) It improves the quality of rehabilitation centers.
B) It enforces workplace health and safety standards.
C) It ensures fair operation of financial markets.
D) It regulates air quality, water quality, and toxic waste.
Question
A(n) _________ is a financial activity characterized by deceit and concealment that do not involve physical force or violence.
A. homicide
B. white-collar crime
C. inchoate crime
D. burglary ​
Question
_____ occurs when somebody within a company or government sells influence, power, or information to a person outside the company or government who can benefit.

A) Influence peddling
B) Insider trading
C) Consumer fraud
D) Spear phishing
Question
_________ are legal notices that compel the disclosure of customer records held by banks, telephone companies, Internet service providers, and other companies to the agents of the federal government.
A. Bills of attainder
B. Non-disclosure agreements
C. National security letters
D. Creativity trust orders ​
Question
Explain cyber forensics.
Question
Which of the following is true of corporate violence?

A) It occurs as a result of policies or actions undertaken by an establishment.
B) It involves stalking in cyberspace through the use of e-mail or text messages.
C) It involves sending emails to corporations in order to acquire sensitive information.
D) It occurs as a result of unauthorized copying and use of a victim's intellectual property.
Question
Explain how cyberattacks impact the regular operations of a state.
Question
Which of the following is an example of a white-collar crime?

A) Homicide
B) Arson
C) Bribery
D) Battery
Question
_____ involves buying or selling securities on the basis of information that has not been made available to the public.

A) Pilferage
B) Influence peddling
C) Insider trading
D) Embezzlement
Question
Odometer fraud involves:

A) manipulating odometers in taxis in order to charge higher prices to customers.
B) stealing odometers from cars and smuggling them to other countries.
C) manipulating odometers of used cars in order to charge higher prices.
D) removing odometers from used cars and inserting them in new cars.
Question
Which of the following is true of the Securities and Exchange Commission (SEC)?

A) It ensures fair operation of financial markets.
B) It regulates air quality, water quality, and toxic waste.
C) It helps improve the work environment in corporations.
D) It enforces workplace health and safety standards.
Question
Explain the role of the regulatory justice system in fighting white-collar crime.
Question
The term _____ refers to dishonest practices relating to home loans.

A) cyberstalking
B) corporate violence
C) mortgage fraud
D) phishing
Question
Describe the term intellectual property.
Question
Which of the following is an example of corporate violence?

A) A dye-manufacturing company releases toxic waste into a river, which causes the death of a majority of the river's fish population.
B) Bensen smashes his manager's computer with a hammer after a discussion about the former's performance.
C) Jamie sends confidential information from her office computer to a rival company.
D) A group of hackers break into the traffic control system in their city and manipulate it, resulting in a number of automobile accidents.
Question
Which of the following is true of the Environmental Protection Agency (EPA)?

A) It regulates air quality, water quality, and toxic waste.
B) It helps improve the work environment in corporations.
C) It enforces workplace health and safety standards.
D) It ensures fair operation of financial markets.
Question
Describe the "Zero Days" problem.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Todays Challenges in Criminal Justice
1
_____ is the act of helping a terrorist organization by engaging in a wide range of activity that includes providing financial assistance, training, and expert advice.

A) Material support
B) Red flagging
C) Identity theft
D) Spear phishing
A
2
Hector is a member of a terrorist organization that hacks into the traffic control system of the state of Greenville, United States. He disrupts the traffic in the state for a day, leading to many automobile accidents. This is an example of _____.

A) phishing
B) true threat
C) identity theft
D) cyberattack
D
3
Cyberattack is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
True
4
Which of the following terms refers to an attempt to damage or disrupt computer systems or electronic networks operated by computers?

A) Cyber fraud
B) Identity theft
C) Cyberattack
D) Corporate violence
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
5
The Foreign Intelligence Surveillance Act requires permission from a special court to engage in surveillance, if the target is a(n):

A) employee of the armed forces of the United States.
B) individual associated with the state government.
C) foreign agent operating within the United States.
D) individual with a previous felony conviction.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
6
Less than 10 percent of identity theft involves the misappropriation of an existing credit-card account.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
7
The Brady Bill prohibits all persons from acquiring a firearm for personal purposes.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
8
National security letters can be used to collect:

A) records of individuals that own a federally licensed firearm.
B) medical records of individuals targeted for surveillance.
C) funds as a reparation for damages done as a result of a war.
D) financial records such as money transfers and bank accounts.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
9
Identity theft involves:

A) stealing personal information from a victim and using it to access his or her financial resources.
B) using one's position in an organization to steal his or her employer's funds.
C) creating a fake account in websites in order to solicit members for a donation.
D) listing a product in an auction site and refusing to send the product to the customer despite payment.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
10
Cyber sleuths can create a digital duplicate of a targeted hard drive, enabling them to break access codes, determine passwords, and search files.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following examples best illustrates advance fee fraud?

A) Scott sends a fraudulent mail to hundreds of people claiming that they have won 20 million dollars in a lottery.
B) Sabina creates a fake account on a networking site and collects funds for a fictitious charitable organization.
C) Frederick lists a Van Gogh painting for auction on his website and refuses to send the product upon receiving payment.
D) Deliwear, an online shopping portal, does not deliver clothes that are ordered online by customers despite receiving payment.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
12
Tax evasion occurs when taxpayers underreport their taxable income.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
13
The preferred method of phishing is through the use of a worm.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true of the Foreign Intelligence Surveillance Court?

A) It comprises eleven federal judges assigned by the chief justice of the Supreme Court.
B) It gathers records of surveillance carried out by foreign agents in the United States.
C) It prohibits electronic monitoring of suspected individuals or national security threats.
D) It comprises two federal judges assigned by the President of the United States.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
15
The main goal of cyber forensics is to gather digital evidence.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
16
A technique called keystroke logging relies on software that embeds itself in a victim's computer and records every keystroke made on that computer.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following Supreme Court cases involved the police's warrantless seizure of phone numbers dialed from the home of a robbery suspect?

A) Muller v. Oregon
B) Browder v. Gayle
C) Smith v. Maryland
D) Batson v. Kentucky
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
18
In the context of the Brady Bill, an applicant can be prohibited from purchasing a firearm if evidence of illegal drug addiction is uncovered.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
19
In which of the following Supreme Court cases did the Court strike down part of a Virginia law that prohibited all forms of cross burning?

A) Virginia v. Loving
B) Boynton v. Virginia
C) Virginia v. Black
D) Morgan v. Virginia
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
20
Different types of malware are used to prevent a computer from being infested with viruses.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
21
The Brady Bill requires background checks:

A) only for those who purchase guns from gun shows or from private citizens.
B) for applicants who wish to become federally licensed firearms dealers.
C) for applicants who have a history of procuring firearms.
D) only for those who purchase guns from federally licensed firearms dealers.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following terms refers to sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information from the recipient?

A) Phishing
B) Encryption
C) Corporate violence
D) Cyberstalking
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
23
_____ is a practice wherein companies hire outside experts to act as hackers and attempt to gain access to their systems.

A) Smishing
B) Cyberstalking
C) Penetration testing
D) Spear phishing
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is true of pilferage?

A) It is a more serious form of employee fraud.
B) It involves individuals stealing items from their workplaces.
C) It involves individuals resorting to illegal activity in the stock market.
D) It is a more serious form of consumer fraud.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is a form of phishing that is done via a phone?

A) Vishing
B) Pharming
C) Cyberstalking
D) Flagging
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
26
Cyber stalking involves:

A) using electronic communication to cause a victim to fear for her or his safety.
B) stealing personal information from a victim and using it to access his or her financial resources.
C) faking an identity of a law enforcement officer in order to defraud victims into paying money.
D) creating a fake account in websites in order to solicit members for a donation.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
27
Lee receives an email from an unknown account claiming that his debit card details need to be confirmed along with the password for the purpose of verification. The details are sent, after which he then contacts the bank, which denies sending any such email. After a few days, he notices that there have been a lot of unknown transactions from his bank account. This is an example of _____.

A) cyberstalking
B) phishing
C) hacking
D) flagging
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following illustrates spear phishing?

A) Tanya clicks on a link that appears to have been emailed by her colleague that downloads a harmful software.
B) Margaret receives an email from an unknown account claiming that she has won the state lottery and asks her for her credit card information.
C) Parker receives an email from an unknown account claiming to be from a charitable organization and requests him to transfer money as a donation.
D) George opens a pornographic website on his office computer without the knowledge of his coworkers.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
29
_____ refers to any program that is harmful to a computer or, by extension, a computer user.

A) A glitch
B) A bug
C) Spam
D) Malware
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is a similarity between a virus and a worm?

A) Both can replicate themselves.
B) Both need to be attached to an existing file in the computer.
C) Both can exist as independent entities.
D) Both do not affect the normal use of a computer.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is a problem with the background check system for the purchase of firearms?

A) It is unreliable, as it is carried out by licensed firearms dealers.
B) It relies on states to provide the federal government with mental-health information about their citizens.
C) It allows people with prior felony convictions to purchase firearms, which is dangerous to the society.
D) It makes it easier to purchase semiautomatic weapons and easier to keep firearms in the hands of the mentally ill.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
32
The _____ requires a person wishing to purchase a gun from a licensed firearms dealer to apply for the privilege of doing so.

A) Brady Handgun Violence Prevention Act
B) Undetectable Firearms Act
C) National Firearms Act
D) Protection of Lawful Commerce in Arms Act
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
33
Unlike "regular" crimes, white-collar crimes:

A) are non-bailable.
B) do not involve deception.
C) do not involve physical force.
D) are not punishable.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
34
AAsoft, a software company, encodes all the files in its system in such a way that only its employees can access it with an automatically generated password. This is an example of _____.

A) transcription
B) encryption
C) diversion
D) surveillance
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
35
Mike is a businessman in the state of Lakaster, United States. He is worried that his business rivals might murder him, and so, he decides to purchase a revolver in order to defend himself. When he approaches a licensed firearms dealer to apply for the privilege of owning a firearm, he is informed that the process includes a thorough background check by the FBI. Which of the following, if true, is most likely to cause the FBI to prohibit Mike from purchasing the revolver?

A) Mike has worked with the FBI in the past.
B) Mike has a history of felony conviction.
C) Mike has purchased a licensed firearm in the past.
D) Mike has faced significant losses in his business.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
36
A website named freegoodz.com allows users to download computer software for free. This has resulted in significant losses for several companies that sell these software legally. This is an example of _____.

A) smishing
B) piracy
C) cyberstalking
D) hacking
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is a form of cyberbullying that involves nonconsensual online publication of explicit images?

A) Spamming
B) Cyberstalking
C) Spear phishing
D) Revenge porn
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
38
Unlike a worm, a virus:

A) is not a software program.
B) does not interfere with the normal use of a computer.
C) cannot replicate itself.
D) cannot exist as a separate entity.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
39
Piracy involves:

A) the unauthorized copying and use of someone's intellectual property.
B) sending emails to targets in order to acquire sensitive information.
C) the unauthorized sending of bulk emails to victims.
D) creating fake accounts in websites in order to solicit members for a donation.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
40
Botnets are networks of computers that have been appropriated by _____ without the knowledge of their owners.

A) cyberstalkers
B) spammers
C) hackers
D) cyber sleuths
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
41
_________ is an act of speech or expression that is not protected by the First Amendment because it is done with the intention of placing a specific victim or group of victims in fear of unlawful violence.
A. True threat
B. Identity theft
C. Cyberattack
D. Corporate Violence ​
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
42
_________ is the illegal production and sale of material depicting sexually explicit conduct involving a child.
A. Child pornography
B. Child abduction
C. Child-selling
D. Child neglect ​
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
43
The _________ requires background checks for private gun transactions and for the sale of ammunition.
A. Undetectable Firearms Act
B. New York Secure Firearms Enforcement Act
C. Protection of Lawful Commerce in Arms Act
D. Gun-Free School Zones Act ​
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is true of the Occupational Safety and Health Administration (OSHA)?

A) It improves the quality of rehabilitation centers.
B) It enforces workplace health and safety standards.
C) It ensures fair operation of financial markets.
D) It regulates air quality, water quality, and toxic waste.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) _________ is a financial activity characterized by deceit and concealment that do not involve physical force or violence.
A. homicide
B. white-collar crime
C. inchoate crime
D. burglary ​
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
46
_____ occurs when somebody within a company or government sells influence, power, or information to a person outside the company or government who can benefit.

A) Influence peddling
B) Insider trading
C) Consumer fraud
D) Spear phishing
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
47
_________ are legal notices that compel the disclosure of customer records held by banks, telephone companies, Internet service providers, and other companies to the agents of the federal government.
A. Bills of attainder
B. Non-disclosure agreements
C. National security letters
D. Creativity trust orders ​
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
48
Explain cyber forensics.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is true of corporate violence?

A) It occurs as a result of policies or actions undertaken by an establishment.
B) It involves stalking in cyberspace through the use of e-mail or text messages.
C) It involves sending emails to corporations in order to acquire sensitive information.
D) It occurs as a result of unauthorized copying and use of a victim's intellectual property.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
50
Explain how cyberattacks impact the regular operations of a state.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is an example of a white-collar crime?

A) Homicide
B) Arson
C) Bribery
D) Battery
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
52
_____ involves buying or selling securities on the basis of information that has not been made available to the public.

A) Pilferage
B) Influence peddling
C) Insider trading
D) Embezzlement
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
53
Odometer fraud involves:

A) manipulating odometers in taxis in order to charge higher prices to customers.
B) stealing odometers from cars and smuggling them to other countries.
C) manipulating odometers of used cars in order to charge higher prices.
D) removing odometers from used cars and inserting them in new cars.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is true of the Securities and Exchange Commission (SEC)?

A) It ensures fair operation of financial markets.
B) It regulates air quality, water quality, and toxic waste.
C) It helps improve the work environment in corporations.
D) It enforces workplace health and safety standards.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
55
Explain the role of the regulatory justice system in fighting white-collar crime.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
56
The term _____ refers to dishonest practices relating to home loans.

A) cyberstalking
B) corporate violence
C) mortgage fraud
D) phishing
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
57
Describe the term intellectual property.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is an example of corporate violence?

A) A dye-manufacturing company releases toxic waste into a river, which causes the death of a majority of the river's fish population.
B) Bensen smashes his manager's computer with a hammer after a discussion about the former's performance.
C) Jamie sends confidential information from her office computer to a rival company.
D) A group of hackers break into the traffic control system in their city and manipulate it, resulting in a number of automobile accidents.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is true of the Environmental Protection Agency (EPA)?

A) It regulates air quality, water quality, and toxic waste.
B) It helps improve the work environment in corporations.
C) It enforces workplace health and safety standards.
D) It ensures fair operation of financial markets.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
60
Describe the "Zero Days" problem.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 60 flashcards in this deck.