Deck 10: The Electronic Crime Scene

Full screen (f)
exit full mode
Question
Internet protocol (IP) addresses are assigned to specific users each time they sign online.
Use Space or
up arrow
down arrow
to flip the card.
Question
Spyware is a self-installing software program that exploits infected computers by monitoring the Internet activities of the computer user and providing data to third parties.
Question
In 2011, identity theft topped the list for consumer complaints filed with the Federal Trade Commission.
Question
The PROTECT Act of 2003 modified federal pornography laws to define the possession of child pornography as being in possession of contraband.
Question
Cybertailing is the process of following a perpetrator through various computer networks in an attempt to identify a suspect.
Question
The type of evidence the CSI gets from the investigation of a computer crime scene is

A) analog
B) electronic
C) digital
D) fingerprint
Question
Which is not a type of digital crime?

A) identify theft
B) cyberstalking
C) pornography
D) cybertailing
Question
Identify theft comprises approximately _____ of all fraud complaints filed with the Federal Trade Commission.

A) 50 percent
B) 40 percent
C) 60 percent
D) 70 percent
Question
Crimes covered by the Identity Theft and Assumption Deterrence Act of 1998 include

A) bank fraud, credit card fraud, loans, and government documents
B) government documents, bank fraud, Internet shopping, and credit card fraud
C) credit card fraud, loans, mortgage shopping, and government documents
D) bank fraud, credit card fraud, loans, and mail fraud
Question
Self-installing software programs that exploit infected computers by monitoring and providing the Internet activities of the computer user to third parties are called:

A) monitoring software
B) analyzing software
C) spyware
D) phishing software
Question
The PROTECT Act of 2003 deals with what kind of crime?

A) bank fraud
B) government documents
C) phishing
D) child pornography
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/11
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: The Electronic Crime Scene
1
Internet protocol (IP) addresses are assigned to specific users each time they sign online.
True
2
Spyware is a self-installing software program that exploits infected computers by monitoring the Internet activities of the computer user and providing data to third parties.
True
3
In 2011, identity theft topped the list for consumer complaints filed with the Federal Trade Commission.
True
4
The PROTECT Act of 2003 modified federal pornography laws to define the possession of child pornography as being in possession of contraband.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
5
Cybertailing is the process of following a perpetrator through various computer networks in an attempt to identify a suspect.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
6
The type of evidence the CSI gets from the investigation of a computer crime scene is

A) analog
B) electronic
C) digital
D) fingerprint
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
7
Which is not a type of digital crime?

A) identify theft
B) cyberstalking
C) pornography
D) cybertailing
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
8
Identify theft comprises approximately _____ of all fraud complaints filed with the Federal Trade Commission.

A) 50 percent
B) 40 percent
C) 60 percent
D) 70 percent
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
9
Crimes covered by the Identity Theft and Assumption Deterrence Act of 1998 include

A) bank fraud, credit card fraud, loans, and government documents
B) government documents, bank fraud, Internet shopping, and credit card fraud
C) credit card fraud, loans, mortgage shopping, and government documents
D) bank fraud, credit card fraud, loans, and mail fraud
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
10
Self-installing software programs that exploit infected computers by monitoring and providing the Internet activities of the computer user to third parties are called:

A) monitoring software
B) analyzing software
C) spyware
D) phishing software
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
11
The PROTECT Act of 2003 deals with what kind of crime?

A) bank fraud
B) government documents
C) phishing
D) child pornography
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 11 flashcards in this deck.