Deck 10: The Electronic Crime Scene
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/11
Play
Full screen (f)
Deck 10: The Electronic Crime Scene
1
Internet protocol (IP) addresses are assigned to specific users each time they sign online.
True
2
Spyware is a self-installing software program that exploits infected computers by monitoring the Internet activities of the computer user and providing data to third parties.
True
3
In 2011, identity theft topped the list for consumer complaints filed with the Federal Trade Commission.
True
4
The PROTECT Act of 2003 modified federal pornography laws to define the possession of child pornography as being in possession of contraband.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
5
Cybertailing is the process of following a perpetrator through various computer networks in an attempt to identify a suspect.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
6
The type of evidence the CSI gets from the investigation of a computer crime scene is
A) analog
B) electronic
C) digital
D) fingerprint
A) analog
B) electronic
C) digital
D) fingerprint
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
7
Which is not a type of digital crime?
A) identify theft
B) cyberstalking
C) pornography
D) cybertailing
A) identify theft
B) cyberstalking
C) pornography
D) cybertailing
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
8
Identify theft comprises approximately _____ of all fraud complaints filed with the Federal Trade Commission.
A) 50 percent
B) 40 percent
C) 60 percent
D) 70 percent
A) 50 percent
B) 40 percent
C) 60 percent
D) 70 percent
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
9
Crimes covered by the Identity Theft and Assumption Deterrence Act of 1998 include
A) bank fraud, credit card fraud, loans, and government documents
B) government documents, bank fraud, Internet shopping, and credit card fraud
C) credit card fraud, loans, mortgage shopping, and government documents
D) bank fraud, credit card fraud, loans, and mail fraud
A) bank fraud, credit card fraud, loans, and government documents
B) government documents, bank fraud, Internet shopping, and credit card fraud
C) credit card fraud, loans, mortgage shopping, and government documents
D) bank fraud, credit card fraud, loans, and mail fraud
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
10
Self-installing software programs that exploit infected computers by monitoring and providing the Internet activities of the computer user to third parties are called:
A) monitoring software
B) analyzing software
C) spyware
D) phishing software
A) monitoring software
B) analyzing software
C) spyware
D) phishing software
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
11
The PROTECT Act of 2003 deals with what kind of crime?
A) bank fraud
B) government documents
C) phishing
D) child pornography
A) bank fraud
B) government documents
C) phishing
D) child pornography
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck