Deck 14: Criminal Justice in the New Millennium
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 14: Criminal Justice in the New Millennium
1
One of the largest and fastest growing problems is the disposal of many tons of obsolete high-tech electronics.
True
2
Cyber stalking usually pertains to threatening or harassing e-mail messages, instant messages, or blog entries dedicated solely to tormenting an individual.
False
3
In the case of the massive BP oil spill, to prove a felony the government has to show that company officials knew in advance that their actions would lead to the explosion/oil spill and chose to ignore the danger.
True
4
Market manipulation is one of the three major types of Internet securities fraud that is common today.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
The USAPA expands the use of racial and ethnic profiling in transportation hubs such as airports and train stations.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
It is estimated that more than half of all logging activities in the most vulnerable forest regions is conducted illegally.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000, and a second-time offender will be incarcerated for 15 years.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Many computer crimes are prosecuted under traditional criminal statutes such as larceny and fraud.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Civil libertarians are concerned that the USAPA permits investigations of a broad range of activities involving legitimate political dissent, not just terroristic activity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Fraud may occur in both public and private organizations.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Cyber vandalism occurs when a perpetrator carefully skims small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Carding and spoofing are concepts associated with mortgage fraud.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Retributive terrorism promotes the interests of a minority ethnic or religious group that believes it has been persecuted under majority or colonial rule.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Data shows that since 2000, the number of deaths from terrorism has increased 500 percent.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
A Trojan horse is a benign application that contains illicit codes that can damage system operations.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
To be considered illegal dumping, the wastes have to contain hazardous materials.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Bernie Madoff, the mastermind behind the largest criminal conspiracy in history, has been sentenced to death and is currently awaiting execution in a New York prison.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
The conflict in the Ukraine between the Russian-backed separatists and government forces is an example of revolutionary terrorism.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Cyber terrorism may result in a battered economy, requiring the government to spend more on the military and cut back on social programs and education.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Law enforcement and the courts have traditionally been reluctant to throw corporate executives in jail.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Enforcement of environmental laws, such as the Clean Water Act of 1972, is done by:
A) local governmental environmental agencies.
B) the US Environmental Protection Agency (EPA).
C) nonprofit environmental agencies.
D) the Public Works Administration (PWA).
A) local governmental environmental agencies.
B) the US Environmental Protection Agency (EPA).
C) nonprofit environmental agencies.
D) the Public Works Administration (PWA).
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
The process of creating a global economy through transnational markets and political and legal systems is referred to as transnationalism.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
The detection and enforcement of large-scale corporate crime is primarily in the hands of
A) US Securities and Exchange Commission (SEC)
B) US Postal Service (USPS)
C) Drug Enforcement Administration (DEA)
D) US Secret Service (USSS)
A) US Securities and Exchange Commission (SEC)
B) US Postal Service (USPS)
C) Drug Enforcement Administration (DEA)
D) US Secret Service (USSS)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
__________ terrorism uses violence as a method of influence, persuasion, or intimidation to get people to accept their social, religious, or political views.
A) Revolutionary
B) Political
C) National
D) Retributive
A) Revolutionary
B) Political
C) National
D) Retributive
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
A recent trend among Asian criminal enterprises is cooperation across ethnic and racial lines.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Most efforts to control cyber crime are at the federal level.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
Worldwide estimates for illegal logging activities account for products worth at least ______ per year
A)$1 billion
B)$5 billion
C)$10 billion
D)$15 billion
A)$1 billion
B)$5 billion
C)$10 billion
D)$15 billion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
Yakuza is a prolific African transnational crime gang.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Human trafficking is a global problem, with an estimated 12 million adults and children in forced labor, bonded labor, and commercial sexual servitude at any given time.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Russian crime groups make extensive use of the state governmental apparatus to protect and promote their illegal activities.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Illegal fishing is criminalized because fishermen are:
A) catching the fish before they have a chance to reproduce.
B) not paying the appropriate processing fees for the amount they catch.
C) discharging toxic materials back into the waterways after catching the fish.
D) destroying the chances for other fisherman to share in the profits.
A) catching the fish before they have a chance to reproduce.
B) not paying the appropriate processing fees for the amount they catch.
C) discharging toxic materials back into the waterways after catching the fish.
D) destroying the chances for other fisherman to share in the profits.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
__________ terrorism uses violence to frighten those in power and their supporters and seek to replace the existing government with a regime that holds acceptable political or religious views.
A) Revolutionary
B) Political
C) National
D) Retributive
A) Revolutionary
B) Political
C) National
D) Retributive
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
A _______ is an investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investors
A) Ponzi scheme
B) RICO scheme
C) Phishing scheme
D) denial-of-service attack
A) Ponzi scheme
B) RICO scheme
C) Phishing scheme
D) denial-of-service attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Globalization can be a device for criminal cartels to avoid prosecution and regulation and expand their markets and profits.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Racketeer Influenced and Corrupt Organizations (RICO) Act is designed to limit patterns of organized criminal activity by prohibiting involvement in acts intended to derive income from racketeering.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
Shifting alliances, change of location, and willingness of transnational gangs to use violence makes the fight against global crime difficult.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Efforts to control transnational organized crime are typically handled by local and state agencies working together.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Bernard Madoff, Bear Stearn, and Lehman Brothers all have committed this type of crime.
A) Globalization
B) Transnational
C) Green
D) Corporate Enterprise
A) Globalization
B) Transnational
C) Green
D) Corporate Enterprise
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Approximately ____ percent of all deaths from terrorist attacks occur in Iraq, Afghanistan, Pakistan, Nigeria, and Syria.
A)20
B)40
C)60
D)80
A)20
B)40
C)60
D)80
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
_______are violations of existing criminal laws designed to protect people, the environment, or both.
A) Denial-of-service attacks
B) Habitat violations
C) Green crimes
D) Mortgage fraud schemes
A) Denial-of-service attacks
B) Habitat violations
C) Green crimes
D) Mortgage fraud schemes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
The United States Criminal Code provides penalties for a first-time illegal copyright offender of ____ years incarceration and a fine of $250,000.
A)3
B)5
C)7
D)10
A)3
B)5
C)7
D)10
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
A ____ is one type of malicious software program that disrupts or destroys existing programs and networks.
A) computer worm
B) computer virus
C) Trojan horse
D) cyber bully
A) computer worm
B) computer virus
C) Trojan horse
D) cyber bully
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
_____ are the underground criminal societies based in Hong Kong that control secret markets, bus routes, and are often involved in money laundering and drug trafficking.
A) Asian Gangs
B) Yakuza
C) Red Dragons
D) Triads
A) Asian Gangs
B) Yakuza
C) Red Dragons
D) Triads
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Which United Nations agency is charged with addressing labor standards, employment and social protection issues, and often finds themselves dealing with human trafficking issues
A) International Labor Organization
B) Global Trafficking Committee
C) Asian Gangs task force
D) None of the above
A) International Labor Organization
B) Global Trafficking Committee
C) Asian Gangs task force
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
In what type of cyber crime are small amounts of money subtracted from customers' bank accounts and added to the account of the thief
A) Phishing
B) Chiseling
C) Salami slice fraud
D) Trojan horse
A) Phishing
B) Chiseling
C) Salami slice fraud
D) Trojan horse
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Cyber ____ is the use of computer networks for undermining the social, economic, and political systems of an enemy through the destruction of infrastructure.
A) theft
B) vandalism
C) terrorism
D) movement
A) theft
B) vandalism
C) terrorism
D) movement
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
The United Nations estimates that immigrant smugglers earn about ____ per year smuggling an estimated 3 million people.
A)$7 million
B)$70 million
C)$7 billion
D)$70 billion
A)$7 million
B)$70 million
C)$7 billion
D)$70 billion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
Transnational crime groups are often involved in:
A) human trafficking.
B) gambling.
C) prostitution.
D) all of these.
A) human trafficking.
B) gambling.
C) prostitution.
D) all of these.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following types of cyber crime was not discussed in the text
A) Cyber terrorism
B) Phishing
C) E-tailing
D) Chiseling
A) Cyber terrorism
B) Phishing
C) E-tailing
D) Chiseling
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
One reason it has proven difficult for law enforcement to combat drug cartels is because:
A) they work in conjunction with transnational crime groups like the Russian mob.
B) the property where drugs are grown is disguised as migrant farms.
C) they employ gangs to protect them and intimidate enemies.
D) the RICO Act has backfired on the US government.
A) they work in conjunction with transnational crime groups like the Russian mob.
B) the property where drugs are grown is disguised as migrant farms.
C) they employ gangs to protect them and intimidate enemies.
D) the RICO Act has backfired on the US government.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
Federal legislation that enables prosecutors to bring additional criminal or civil charges against people engaged in two or more acts prohibited by 24 existing federal and 8 state laws is termed _____.
A) the enhancement penalty
B) RICO
C) the Travel Act
D) the Federation
A) the enhancement penalty
B) RICO
C) the Travel Act
D) the Federation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.
A) Warez
B) Denial-of-service attack
C) Market manipulation
D) Cyber theft
A) Warez
B) Denial-of-service attack
C) Market manipulation
D) Cyber theft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Cyber crime is challenging because:
A) it is difficult to detect through traditional law enforcement channels.
B) it is rapidly evolving.
C) its control demands that agents of the justice system develop technical skills.
D) all of these make cyber crime challenging.
A) it is difficult to detect through traditional law enforcement channels.
B) it is rapidly evolving.
C) its control demands that agents of the justice system develop technical skills.
D) all of these make cyber crime challenging.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
____is the illegal acquisition of personal information such as bank passwords and credit card numbers by masquerading as a trustworthy person/business in what appears to be an official electronic communication.
A) E-tailing fraud
B) Phishing
C) Cyber theft
D) Touting
A) E-tailing fraud
B) Phishing
C) Cyber theft
D) Touting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
Which type of cyber vandalism appears as a benign application that actually contains codes that can damage the system operations
A) Mydoom
B) Trojan horse
C) Malware
D) Chiseling
A) Mydoom
B) Trojan horse
C) Malware
D) Chiseling
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
An estimated ____ percent of cocaine enters the United States through Mexico.
A)60
B)70
C)80
D)90
A)60
B)70
C)80
D)90
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Congress has struggled to create legislation that will restrict objectionable use of Internet pornography without violating _____ Amendment freedoms.
A) First
B) Fifth
C) Sixth
D) Eighth
A) First
B) Fifth
C) Sixth
D) Eighth
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
____ is the term used to describe the illegal use of the Internet to buy or sell merchandise online.
A) Cyber theft
B) E-tailing fraud
C) Market manipulation
D) Denial-of-service attack
A) Cyber theft
B) E-tailing fraud
C) Market manipulation
D) Denial-of-service attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Cyber ____ involves hacking secure computer networks at the enemy's most sensitive military bases, defense contractors, and aerospace companies to steal important data or to access their defenses.
A) terrorism
B) espionage
C) bullying
D) stalking
A) terrorism
B) espionage
C) bullying
D) stalking
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is not a type of Internet securities fraud
A) Identity theft
B) Market manipulation
C) Fraudulent offerings of securities
D) Illegal touting
A) Identity theft
B) Market manipulation
C) Fraudulent offerings of securities
D) Illegal touting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
Laura picked up her phone one evening to find that the Microsoft help desk was calling. She had been having trouble with a slow running computer for a while but hadn't yet contacted Microsoft to get help for the problem. She was so pleased to hear that they saw her IP address online and found malware on her computer and they were calling all of their clients to assist them in removing it. Laura had previously been a victim of a phishing scheme so she was prepared not to give any information to the help desk just in case they weren't legitimate but they didn't ask for her credit card information or social security number. She figured they were really going to help.
About a month ago, Laura ordered an autographed Star Wars poster from a memorabilia Web site but she hasn't received it yet despite checking with the company and inquiring with United Parcel Service (UPS). The company says they shipped the poster. What type of crime might Laura be a victim of
A) Phishing
B) E-tailing fraud
C) E-piracy
D) Cyber war
About a month ago, Laura ordered an autographed Star Wars poster from a memorabilia Web site but she hasn't received it yet despite checking with the company and inquiring with United Parcel Service (UPS). The company says they shipped the poster. What type of crime might Laura be a victim of
A) Phishing
B) E-tailing fraud
C) E-piracy
D) Cyber war
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Hamas is an example of _____ terrorism.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
In 2006, QXQ opened their doors to finance home mortgages. One of the easiest loans for potential homeowners to obtain was called a stated income loan. These loans were money in the bank to QXQ because people just had to fill in the forms with their current salary, there was little documentation required, and everybody won. The buyers got their house and QXQ got paid.
Andrew works for QXQ as an investor. He only takes clients that have at least $500,000 to invest. He has been touting this new hedge fund that he himself has invested in. It is promising 20 percent returns every year. He just signed up the Jones family. If this scenario is too good to be true, what will likely happen to the Jones's money
A) It will be invested.
B) It will be used to pay previous investors.
C) It will be used for securitization.
D) It has just provided QXQ a big kickback.
Andrew works for QXQ as an investor. He only takes clients that have at least $500,000 to invest. He has been touting this new hedge fund that he himself has invested in. It is promising 20 percent returns every year. He just signed up the Jones family. If this scenario is too good to be true, what will likely happen to the Jones's money
A) It will be invested.
B) It will be used to pay previous investors.
C) It will be used for securitization.
D) It has just provided QXQ a big kickback.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ is cyber crime with malicious intent, by the desire for revenge, and to inflict wanton destruction.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
Global criminal conspiracies designed to obtain power and influence or monetary gains that cross nation states and legal jurisdictions are termed ____________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people that had ties to Al Qaeda, but he doesn't speak with them anymore. Recently, Abraham's father seems to do a lot of business on the computer and telephone at night, but his uncle has just arrived for a visit so they are probably just catching up with old friends. One day as Abraham is driving to school, he notices two men in a nondescript car that seems to be following him. The next week, he notices some kind of tracking device hanging from the underside of the car bumper.
Before Abraham was born, his father came to the United States for a job with Microsoft. He remembers when he was a youth the death squads and the terror that was felt by all where he grew up. What type of terrorism did Abraham's father likely experience
A) State-sponsored terrorism
B) Evolutionary terrorism
C) Nationalist terrorism
D) Political terrorism
Before Abraham was born, his father came to the United States for a job with Microsoft. He remembers when he was a youth the death squads and the terror that was felt by all where he grew up. What type of terrorism did Abraham's father likely experience
A) State-sponsored terrorism
B) Evolutionary terrorism
C) Nationalist terrorism
D) Political terrorism
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
Examples of ______ include illegal dumping, polluting, illegal fishing, and illegal logging.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Once subprime loans have been issued, the vendors typically bundle them into large pools and sell them as securities in a process known as _____________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
_______________ is slang for the processes used to acquire personal information used for identifying theft and other fraudulent activities.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
______________ is a type of cyber vandalism that occurs when a computer hacker intrudes on another person's Web site by inserting or substituting codes that expose visitors to the site to misleading or provocative information
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people that had ties to Al Qaeda, but he doesn't speak with them anymore. Recently, Abraham's father seems to do a lot of business on the computer and telephone at night, but his uncle has just arrived for a visit so they are probably just catching up with old friends. One day as Abraham is driving to school, he notices two men in a nondescript car that seems to be following him. The next week, he notices some kind of tracking device hanging from the underside of the car bumper.
If Abraham's father is back in touch with the people that have ties to Al Qaeda, and may even be working with them, which goal of terrorism do they most likely align with
A) Retributive terrorism
B) Nationalist terrorism
C) State-sponsored terrorism
D) Revolutionary terrorism
If Abraham's father is back in touch with the people that have ties to Al Qaeda, and may even be working with them, which goal of terrorism do they most likely align with
A) Retributive terrorism
B) Nationalist terrorism
C) State-sponsored terrorism
D) Revolutionary terrorism
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Laura picked up her phone one evening to find that the Microsoft help desk was calling. She had been having trouble with a slow running computer for a while but hadn't yet contacted Microsoft to get help for the problem. She was so pleased to hear that they saw her IP address online and found malware on her computer and they were calling all of their clients to assist them in removing it. Laura had previously been a victim of a phishing scheme so she was prepared not to give any information to the help desk just in case they weren't legitimate but they didn't ask for her credit card information or social security number. She figured they were really going to help.
Laura just got a new laptop but was unaware that it didn't come loaded with Adobe reader. Her boyfriend gives her access to his employee homepage and suggests that she use one of the licenses from his office because sometimes he does work at home. What crime has Laura committed
A) Identity theft
B) Software piracy
C) Copyright infringement
D) Internet fraud
Laura just got a new laptop but was unaware that it didn't come loaded with Adobe reader. Her boyfriend gives her access to his employee homepage and suggests that she use one of the licenses from his office because sometimes he does work at home. What crime has Laura committed
A) Identity theft
B) Software piracy
C) Copyright infringement
D) Internet fraud
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people that had ties to Al Qaeda, but he doesn't speak with them anymore. Recently, Abraham's father seems to do a lot of business on the computer and telephone at night, but his uncle has just arrived for a visit so they are probably just catching up with old friends. One day as Abraham is driving to school, he notices two men in a nondescript car that seems to be following him. The next week, he notices some kind of tracking device hanging from the underside of the car bumper.
Abraham knows the Federal Bureau of Investigation (FBI) is tailing him, but he doesn't know why and believes it is illegal. What recourse does he have as an American citizen
A) He can file a petition that his Fourth Amendment rights have been violated.
B) None. Conducting surveillance of "lone wolves" is legal under the USAPA.
C) Confront the FBI. USAPA is only allowed to monitor computers and phones.
D) File a complaint with the police and get a restraining order.
Abraham knows the Federal Bureau of Investigation (FBI) is tailing him, but he doesn't know why and believes it is illegal. What recourse does he have as an American citizen
A) He can file a petition that his Fourth Amendment rights have been violated.
B) None. Conducting surveillance of "lone wolves" is legal under the USAPA.
C) Confront the FBI. USAPA is only allowed to monitor computers and phones.
D) File a complaint with the police and get a restraining order.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
Lone wolves fall into the category of ______ terrorists.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and processed by computer networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
The ____________________ is a computer program that appears benign but actually contains something harmful.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Laura picked up her phone one evening to find that the Microsoft help desk was calling. She had been having trouble with a slow running computer for a while but hadn't yet contacted Microsoft to get help for the problem. She was so pleased to hear that they saw her IP address online and found malware on her computer and they were calling all of their clients to assist them in removing it. Laura had previously been a victim of a phishing scheme so she was prepared not to give any information to the help desk just in case they weren't legitimate but they didn't ask for her credit card information or social security number. She figured they were really going to help.
The Microsoft Help desk has asked Laura to go to a Web site and verify her information so they can help fix her computer. She sees all of her information on that web page and she doesn't have to give them any information. What type of crime has Laura become a victim of
A) E-tailing fraud
B) E-piracy
C) Phishing
D) Warez
The Microsoft Help desk has asked Laura to go to a Web site and verify her information so they can help fix her computer. She sees all of her information on that web page and she doesn't have to give them any information. What type of crime has Laura become a victim of
A) E-tailing fraud
B) E-piracy
C) Phishing
D) Warez
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
In 2006, QXQ opened their doors to finance home mortgages. One of the easiest loans for potential homeowners to obtain was called a stated income loan. These loans were money in the bank to QXQ because people just had to fill in the forms with their current salary, there was little documentation required, and everybody won. The buyers got their house and QXQ got paid.
Steve and Jennie got a stated income loan in 2008 from QXQ. As it turns out, they lied on their application and said they made more money than they actually do and just a couple of months later they couldn't make their payments and defaulted on their mortgage. Who or what is at fault
A) Steve and Jennie
B) Securitization
C) Management fraud
D) QXQ, the mortgage company
Steve and Jennie got a stated income loan in 2008 from QXQ. As it turns out, they lied on their application and said they made more money than they actually do and just a couple of months later they couldn't make their payments and defaulted on their mortgage. Who or what is at fault
A) Steve and Jennie
B) Securitization
C) Management fraud
D) QXQ, the mortgage company
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
The USAPA was passed in ____ to give sweeping new powers to domestic law enforcement and international intelligence to fight terrorism.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
____________________ occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck