Deck 19: Computers and Technological Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 19: Computers and Technological Crime
1
Which of the following is not one of the more common types of crime using information technology?
A) illegal drug activity
B) prostitution
C) arson
D) gambling
E) identity theft
A) illegal drug activity
B) prostitution
C) arson
D) gambling
E) identity theft
C
2
At the heart of virtually all information technology lies a computer system or ___________.
A) central processing unit (CPU)
B) ROM file
C) hard drive
D) Global Positioning System (GPS)
E) all of the above
A) central processing unit (CPU)
B) ROM file
C) hard drive
D) Global Positioning System (GPS)
E) all of the above
A
3
Police may sometimes pose as children in chat rooms in an effort to identify child molesters. In such cases, it is important to avoid _____________, which is a common defense.
A) obtaining a search warrant
B) detection
C) failure to obtain a warrant
D) entrapment
E) enticing
A) obtaining a search warrant
B) detection
C) failure to obtain a warrant
D) entrapment
E) enticing
D
4
The investigator facing a crime scene involving computers should:
A) turn off all computers and peripherals
B) call for a component service technician
C) request assistance from the computer owner in recovering data
D) all of the above
E) none of the above
A) turn off all computers and peripherals
B) call for a component service technician
C) request assistance from the computer owner in recovering data
D) all of the above
E) none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
One of the most common types of electronic fraud involves the use of:
A) stolen or forged credit cards
B) homemade software programs
C) viruses
D) commercial software programs
E) straw buyers
A) stolen or forged credit cards
B) homemade software programs
C) viruses
D) commercial software programs
E) straw buyers
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
One of the most fastest growing crimes in the United States is:
A) cracking
B) identity theft
C) hacking
D) sexual exploitation of children
E) none of the above
A) cracking
B) identity theft
C) hacking
D) sexual exploitation of children
E) none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
______________ is a term that refers to one who enters a computer system illegally for the purpose of destroying, changing, or stealing data.
A) Software disabler
B) Hacker
C) Cracker
D) Clipper
E) Flipper
A) Software disabler
B) Hacker
C) Cracker
D) Clipper
E) Flipper
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
To date, the computer has not come close to the potential it offers as an investigative tool because of:
A) concerns about the right to privacy
B) a lack of trained technicians
C) entrenched resistance by officers who have little understanding of the computer's capabilities
D) all of the above
E) none of the above
A) concerns about the right to privacy
B) a lack of trained technicians
C) entrenched resistance by officers who have little understanding of the computer's capabilities
D) all of the above
E) none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Clipper chips, encryption, logic bombs, pinging, remailers, trapdoors, Trojan horses, viruses, and worms are all cited as examples of _______________ used to accomplish or conceal crime in cyberspace.
A) computer sabotage
B) documents
C) threads
D) strings
E) CPUs
A) computer sabotage
B) documents
C) threads
D) strings
E) CPUs
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
The Rapid Start Team, a team of experts who assist federal and local law enforcement with a quick mobilization capacity for investigating serious crimes, is an elite unit of the:
A) Bureau of Alcohol, Tobacco, and Firearms
B) Central Intelligence Agency
C) Secret Service
D) National Association of Computer Crime Investigators
E) Federal Bureau of Investigation
A) Bureau of Alcohol, Tobacco, and Firearms
B) Central Intelligence Agency
C) Secret Service
D) National Association of Computer Crime Investigators
E) Federal Bureau of Investigation
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is not one of the more common types of crime using information technology?
A) child pornography
B) gambling
C) identity theft
D) illegal drug activity
E) arson
A) child pornography
B) gambling
C) identity theft
D) illegal drug activity
E) arson
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
To date, the computer has not come close to the potential it offers as an investigative tool because of which of the following?
A) concerns about the right to privacy
B) lack of sufficient funding
C) a lack of trained technicians
D) entrenched resistance by officers who have little understanding of the computer's capabilities
E) all of the above
A) concerns about the right to privacy
B) lack of sufficient funding
C) a lack of trained technicians
D) entrenched resistance by officers who have little understanding of the computer's capabilities
E) all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
When dealing with a high-tech crime scene, which of the following investigation steps are recommended by the NIJ?
A) observe and document the crime scene
B) document the condition and location of the computer system
C) identify and document related electronic components
D) photograph the entire scene
E) all of the above
A) observe and document the crime scene
B) document the condition and location of the computer system
C) identify and document related electronic components
D) photograph the entire scene
E) all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Although statutes differ by states, the elements of computer fraud make it unlawful for any person to use a computer or computer network without permission with the intent to:
A) embezzle or commit larceny
B) obtain property or services by false pretenses
C) convert the property of another
D) all of the above
E) none of the above
A) embezzle or commit larceny
B) obtain property or services by false pretenses
C) convert the property of another
D) all of the above
E) none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
A number of federal agencies monitor web sites of suspected violent groups, primarily as a means of keeping track of:
A) adult visitors to the site
B) potential criminal activity
C) where members are living
D) child visits to the site
E) none of the above
A) adult visitors to the site
B) potential criminal activity
C) where members are living
D) child visits to the site
E) none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Computers have improved the capacity of law enforcement to collect, analyze, and store large volumes of essential information.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
On an individual basis, most investigators working at a crime scene have found that the computer does not serve any useful purpose.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
According to the authors, a criminal investigator should, at a minimum, know the difference between various types of computers, as well as have some understanding of their capabilities.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
In the field of criminal investigation, the computer has been found to be useful only in the area of text-based information.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
According to the text, a criminal investigator confronted with a crime scene involving computers should protect the area and call for a component service technician.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
If an activated computer is a part of the criminal investigation, it should be immediately turned off to prevent any software from destroying the data on the hard drive.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Home computers and other personal and portable devices fall under the purview of the Fourth Amendment, which protects citizens from unreasonable searches and seizures.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
According to the authors, the proper investigation of computer-related crime can be performed by any criminal investigator regardless of training and experience.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
According to the text, crimes involving sabotage of computers or data processing systems are frequently carried out by disgruntled employees.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
According to the text, some social networking sites have agreed to remove from their sites those individuals who have a criminal record involving children.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck