Deck 17: Cyber Crime and the Future of Criminal Justice
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 17: Cyber Crime and the Future of Criminal Justice
1
In which U.S. Supreme Court case did the Court ruling provide film and music companies with the ability to file piracy lawsuits against Internet file-sharing Web sites that market software used primarily to illegally download intellectual property?
A) Napster v. Illinois
B) MGM Studios v. Grokster.
C) Maxx v. Milnes
D) Roker v. Leaper
A) Napster v. Illinois
B) MGM Studios v. Grokster.
C) Maxx v. Milnes
D) Roker v. Leaper
B
2
When cyber criminals want to take their money-laundering operations one step
Further and avoid legitimate banks altogether, they can make use of
_______________.
A) digital banking
B) cyber money mules
C) laundering mules
D) digital currency
Further and avoid legitimate banks altogether, they can make use of
_______________.
A) digital banking
B) cyber money mules
C) laundering mules
D) digital currency
B
3
A person who uses one computer to break into another is called a:
A) cyberbully
B) hacker
C) botnet
D) cyberstalking
A) cyberbully
B) hacker
C) botnet
D) cyberstalking
B
4
Buying and selling that takes place in cyberspace is called:
A) online auction fraud
B) e-commerce
C) online retail fraud
D) hacking
A) online auction fraud
B) e-commerce
C) online retail fraud
D) hacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Most parents are concerned more about pedophiles online than they are about __________, which is much more prevalent among children.
A) cyberbullying
B) hacking
C) cyberstalking
D) spyware
A) cyberbullying
B) hacking
C) cyberstalking
D) spyware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is one of the major challenges for law enforcement in dealing with cyber crime?
A) the limited amount of crime that is occurring
B) the difficulty of gathering evidence
C) the ease of dealing with jurisdictional issues
D) the multitude of resources that are available at the local level
A) the limited amount of crime that is occurring
B) the difficulty of gathering evidence
C) the ease of dealing with jurisdictional issues
D) the multitude of resources that are available at the local level
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a computer program that can automatically replicate itself over a network such as the Internet and interfere with the normal use of a computer?.
A) virus
B) botnet
C) hacker
D) worm
A) virus
B) botnet
C) hacker
D) worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not something a worm or virus is typically programmed to do?
A) prompting host computers to continually crash
B) prompting host computers to continually reboot
C) steal someone's identity
D) infect the system
A) prompting host computers to continually crash
B) prompting host computers to continually reboot
C) steal someone's identity
D) infect the system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Studies have shown that nearly __________ of American teenagers who use the Internet report being targets of cyberbullying.
A) one in five
B) one in ten
C) one in fifteen
D) one in seventeen
A) one in five
B) one in ten
C) one in fifteen
D) one in seventeen
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
In which of the following crimes do consumers order and pay for items that are never delivered?
A) online auction fraud
B) cybertheft
C) cyberhacking
D) online retail fraud
A) online auction fraud
B) cybertheft
C) cyberhacking
D) online retail fraud
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT one of the three roles a computer can take on in a criminal act?
A) object
B) subject
C) instrument
D) model
A) object
B) subject
C) instrument
D) model
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
There are _____ state laws that target cyberbulling in the United States.
A) 24
B) 36
C) 44
D) 49
A) 24
B) 36
C) 44
D) 49
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
About __________ of the approximately 3.4 million Americans who are stalked each year are victims of cyberstalking.
A) one in ten
B) one in eight
C) one in six
D) one in four
A) one in ten
B) one in eight
C) one in six
D) one in four
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Bulk e-mails, particularly of commercial advertising, sent in large quantities without the consent of the recipient are called:
A) malware
B) spam
C) viruses
D) worms
A) malware
B) spam
C) viruses
D) worms
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following private efforts is NOT one of the efforts used to combat cyber crime?
A) the creation of laws
B) encryption
C) firewalls
D) patches
A) the creation of laws
B) encryption
C) firewalls
D) patches
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet is called a(n):
A) virus
B) botnet
C) hacker
D) worm
A) virus
B) botnet
C) hacker
D) worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The introduction of illegally gained funds into the legal financial system with the
Goal of covering up the funds' true origin is known as:
A) money laundering
B) digital currency
C) online banking
D) denial of service attack
Goal of covering up the funds' true origin is known as:
A) money laundering
B) digital currency
C) online banking
D) denial of service attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What protections ensure that a person who writes a book or a song or creates a software program is financially rewarded if that product is sold in the marketplace?
A) software and hardware
B) piracy and hacking
C) copyrights and patents
D) duplicates and rulings
A) software and hardware
B) piracy and hacking
C) copyrights and patents
D) duplicates and rulings
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
In what type of crime do the perpetrators try to get financial data and passwords from consumers by posing as a legitimate business such as a bank or credit-card company?
A) cyberbullying
B) hacking
C) phishing
D) cybertheft
A) cyberbullying
B) hacking
C) phishing
D) cybertheft
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
By 2010 nearly 300 billion spam messages were being sent each year, accounting for about ___ percent of all e-mails.
A) 97
B) 68
C) 35
D) 10
A) 97
B) 68
C) 35
D) 10
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Digital currency is the introduction of illegally gained funds into the legal financial system with the goal of covering up the funds' true origin.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is one of the main weaknesses of using encryption to protect material on computers?
A) the ease with which iencryptiont can be hacked
B) the rate at which encryption it becomes obsolete
C) the rate at which spam overrides encryptionit
D) the ease with which viruses obstruct encryptionit
A) the ease with which iencryptiont can be hacked
B) the rate at which encryption it becomes obsolete
C) the rate at which spam overrides encryptionit
D) the ease with which viruses obstruct encryptionit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Research suggests that the greatest threats to children and teenagers on the Internet are other children and teenagers, not adult pedophiles.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The crime of stalking, committed in cyberspace though the use of the Internet, e-mail, or another form of electronic communication is called __________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Many experts believe that Internet-enabled crime is going to increase dramatically in the near future.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Malware is a term that refers to any program that is harmful to a computer or, by extension, a computer user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
U.S. law requires that banks "know their customers"-that is, a banks is not required to know the source of a customer's funds.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is NOT one of the reasons why the Internet is conductive to child pornography?
A) speed
B) security
C) regulation
D) anonymity
A) speed
B) security
C) regulation
D) anonymity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is NOT a federal law regarding cybercrime?
A) it is a crime to gain unauthorized entry into a government computer and thereby discover information which is intended to remain confidential
B) it is a crime to transport child pornography in interstate or foreign commerce
C) it is a crime to use a computer to transmit adult pornography in interstate or foreign commerce
D) it is a crime to employ a minor or induce a minor to participate in making a visual depiction of a sexually explicit act
A) it is a crime to gain unauthorized entry into a government computer and thereby discover information which is intended to remain confidential
B) it is a crime to transport child pornography in interstate or foreign commerce
C) it is a crime to use a computer to transmit adult pornography in interstate or foreign commerce
D) it is a crime to employ a minor or induce a minor to participate in making a visual depiction of a sexually explicit act
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Businesses sometimes fail to report cybercrimes for fear of losing customer confidence.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A __________ is a person who uses one computer to break into another.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The Internet has been a boon to the pornography industry.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
__________ is the willful and repeated emotional harm inflicted on another individual through the use of electronic devices such as computers and cell phones.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Cybercrime is a crime that occurs online, in the virtual community of the __________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Today, cyber crime is the FBI's __________ priority, and each of the bureau's fifty-six field divisions has at least one agent who focuses solely on crimes committed on the Internet.
A) top
B) second-highest
C) third-highest
D) fourth-highest
A) top
B) second-highest
C) third-highest
D) fourth-highest
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The illegal production and sales of material depicting sexually explicit conduct involving a child is called:
A) statutory rape
B) child sex trade
C) sex trafficking
D) child pornography
A) statutory rape
B) child sex trade
C) sex trafficking
D) child pornography
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
All states have laws criminalizing aggressive behavior perpetrated through technology.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The condition of not being recognized or having a traceable name or identity on
the Internet is known as _________.
the Internet is known as _________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Every day, as many as 60,000 malicious programs circulate on the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Twelve percent of all Web sites have pornographic content, and these sites
generate $4.2 billion in revenue a year.
generate $4.2 billion in revenue a year.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
The unauthorized copying and use of the intellectual property is called __________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
A __________ is a network of computers that have been appropriated without the
knowledge of their owners and used to spread harmful programs via the Internet.
knowledge of their owners and used to spread harmful programs via the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain the difference between cyberbullying and cyberstalking and what states are doing to counteract these issues.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Information or data of value to a criminal investigation that is either stored or transmitted by electronic means is called __________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Explain at least two of the issues with the use of credit cards on the Internet in relation to cyber
crime.
crime.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
_______________ is tThe application of computer technology to finding and utilizeing evidence of cyber crimes. is called __________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Explain two some of the trends for the future of criminal justice.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
__________ is property resulting from intellectual, creative processes, such as books, films, or music.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck