Deck 1: Law Enforcement, Privacy, and Security in Dealing With Cybercrime; Technology and Cybercrime

Full screen (f)
exit full mode
Question
Which of the following agencies have the primary responsibility for the investigation of transnational cybercrimes in the United States?

A) local police
B) state police
C) federal law enforcement
D) sheriffs
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following crimes do local law enforcement agencies investigate the least in the US?

A) prostitution
B) computer hacking
C) child sexual exploitation
D) stalking and harassment
Question
Which of the following levels of law enforcement in the US investigate crimes when jurisdictional conflicts exist between local agencies?

A) state police
B) sheriffs' offices
C) local police
D) federal law enforcement
Question
Which form of law is used to resolve disputes between private parties including individuals and businesses?

A) criminal
B) civil
Question
What term is used to refer to an individual who conducts investigations, including forensic examinations, on behalf of private citizens or businesses?

A) police officer
B) civil servant
C) constable
D) private investigator
Question
Computer hacking would be placed under which category in Wall's typology of cybercrime?

A) cyber-trespass
B) cyber-deception
C) cyber-porn
D) cyber-violence
Question
Any act that violates codified legal statutes is considered what?

A) deviance
B) crime
C) terror
D) warfare
Question
When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be ____ to the offense.

A) incidental
B) evidentiary
C) unrelated
D) tertiary
Question
A group with its own norms and values that exists in opposition to the dominant culture is called what?

A) gang
B) clique
C) subculture
D) none of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/9
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Law Enforcement, Privacy, and Security in Dealing With Cybercrime; Technology and Cybercrime
1
Which of the following agencies have the primary responsibility for the investigation of transnational cybercrimes in the United States?

A) local police
B) state police
C) federal law enforcement
D) sheriffs
C
2
Which of the following crimes do local law enforcement agencies investigate the least in the US?

A) prostitution
B) computer hacking
C) child sexual exploitation
D) stalking and harassment
B
3
Which of the following levels of law enforcement in the US investigate crimes when jurisdictional conflicts exist between local agencies?

A) state police
B) sheriffs' offices
C) local police
D) federal law enforcement
A
4
Which form of law is used to resolve disputes between private parties including individuals and businesses?

A) criminal
B) civil
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
5
What term is used to refer to an individual who conducts investigations, including forensic examinations, on behalf of private citizens or businesses?

A) police officer
B) civil servant
C) constable
D) private investigator
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
6
Computer hacking would be placed under which category in Wall's typology of cybercrime?

A) cyber-trespass
B) cyber-deception
C) cyber-porn
D) cyber-violence
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
7
Any act that violates codified legal statutes is considered what?

A) deviance
B) crime
C) terror
D) warfare
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
8
When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be ____ to the offense.

A) incidental
B) evidentiary
C) unrelated
D) tertiary
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
9
A group with its own norms and values that exists in opposition to the dominant culture is called what?

A) gang
B) clique
C) subculture
D) none of the above
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 9 flashcards in this deck.