Deck 7: Cyber Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
Play
Full screen (f)
Deck 7: Cyber Crime
1
The appropriate location for a trial can be a key issue in a case involving a cyber crime.
True
2
Any crime that requires knowledge of computer technology for its prosecution is a computer crime.
True
3
Because embezzlement is considered a white-collar crime,it cannot be considered a computer crime.
False
4
Any crime that requires knowledge of computer technology for its investigation is a computer crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
Most cyber crimes are new crimes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
Any crime committed with a computer is a computer crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
Many Web sites use "cookies" to collect data on those who visit their sites.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
Fraud has occurred online but not by e-mail.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
Impersonating a victim to make provocative comments online is vishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
Unlike stalking in the "real" world,cyberstalking requires an "incredible threat."
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
Phishing occurs when a criminal poses as a member of the rock group Phish.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
The full extent of cyber crime is well known.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
A cyberstalker must act from a location near the victim.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
Identity theft occurs when a wrongdoer steals another's form of identification.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
A stolen credit card is more likely to hurt a consumer than a merchant.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
Vishing is phishing that involves voice communication.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
It is not identity theft to use a fabricated identity to access online funds.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
In cyberspace,thieves are as subject to physical limits as they are in the "real" world.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
Courts have no difficulty applying traditional laws to crimes committed in cyberspace.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
Cyber criminals who steal persons' identities normally do not use them.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
Federal law encourages the use of electronic payments at Internet gambling sites.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
Hackers sometimes rent their "crimeware" as a service.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
Doyle steals Carmen's computer and its software.This is computer crime in which the computer is
A)the object of the crime.
B)the subject of the crime.
C)the instrument of the crime.
D)irrelevant to the crime.
A)the object of the crime.
B)the subject of the crime.
C)the instrument of the crime.
D)irrelevant to the crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
Elisa steals Filbert's personal information from Filbert's computer.This is computer crime in which the computer is
A)the object of the crime.
B)the subject of the crime.
C)the instrument of the crime.
D)irrelevant to the crime.
A)the object of the crime.
B)the subject of the crime.
C)the instrument of the crime.
D)irrelevant to the crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
The anonymous nature of technology helps in the prosecution of cyber crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
A complex criminal scheme cannot be initiated on a personal computer in a person's home.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
Federal agencies cannot share information with foreign agencies investigating spamming.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
Digital pirates may be prosecuted under state,but not federal,law.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
Julio meets Inez on Hello!,a social networking Web site.Inez asks Julio to pay her expenses to travel to meet him in Center City.He sends the funds,but she does not make the date.This is
A)online embarrassment but not fraud.
B)online date-dumping but not fraud.
C)an online wake-up call but not fraud.
D)online fraud.
A)online embarrassment but not fraud.
B)online date-dumping but not fraud.
C)an online wake-up call but not fraud.
D)online fraud.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
States' authority to regulate Internet gambling is limited to their physical boundaries.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
Computer fraud is a state,not a federal,crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
Swinborn sells "Tyger" steroids over the Internet.He is arrested and charged with the sale of a controlled substance.This is cyber crime,which is
A)a crime in which the letter "y" is used in the misspelling of a word.
B)a crime .that occurs in the virtual community of the Internet.
C)a crime that is less real than the same crime in the physical world.
D)no crime.
A)a crime in which the letter "y" is used in the misspelling of a word.
B)a crime .that occurs in the virtual community of the Internet.
C)a crime that is less real than the same crime in the physical world.
D)no crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
Stopping crime requires only that it be prohibited.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
A cyberterrorist might target a government agency,but not a business.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
Hacking is not widespread.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
Federal law allows the use of unsolicited commercial e-mail.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
Through a series of e-mail messages,Hudson convinces Gwen to transfer funds to Hudson to invest in Fried Critter Company stock on Gwen's behalf.Fired Critter stock does not exist.This is computer crime in which the computer is
A)the object of the crime.
B)the subject of the crime.
C)the instrument of the crime.
D)irrelevant to the crime.
A)the object of the crime.
B)the subject of the crime.
C)the instrument of the crime.
D)irrelevant to the crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
A hacker is someone who uses one computer to break into another.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
Most states regulate spam.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
A business takes a risk by electronically storing its customers' credit account numbers.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
Iggy uses his computer to break into Hye Technology Company's computer.Iggy is
A)a hacker.
B)a bot.
C)a botnet.
D)a worm.
A)a hacker.
B)a bot.
C)a botnet.
D)a worm.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
Jean sends e-mail to Irwin promising a percentage of the amount in an African bank account for assistance in transferring the funds to a U.S.bank account.Irwin forwards his account number,but the funds are never sent.Instead,Jean quickly withdraws the funds in Irwin's account.This is
A)online greed but not fraud.
B)an online "fool-me-once,shame on you" occurrence but not fraud.
C)online gambling but not fraud.
D)online fraud.
A)online greed but not fraud.
B)an online "fool-me-once,shame on you" occurrence but not fraud.
C)online gambling but not fraud.
D)online fraud.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
Posing as Platinum Bank,Oswald e-mails Nadia,asking her to update her personal banking information through a link in the e-mail.She clicks on the link and types in the data,which Oswald promptly sells to Moe.This is
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
In cyberspace,Bret attempts to steal consumers' credit card numbers stored in the networked computers of Cinco Corporation,a financial payments service provider.The quantity of data that can be stolen is limited by
A)the distance between the computers of Bret and Cinco.
B)the discrepancy in time between the locations of Bret and Cinco.
C)the speed of the connection between the computers of Bret and Cinco.
D)the same physical limits that exist in the "real" world.
A)the distance between the computers of Bret and Cinco.
B)the discrepancy in time between the locations of Bret and Cinco.
C)the speed of the connection between the computers of Bret and Cinco.
D)the same physical limits that exist in the "real" world.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
Harvey puts up a guitar for bids on eWay,a Web auction site.Faith makes the highest bid and sends the payment,which Harvey receives,but he does not send the guitar to her.This is online
A)auction fraud.
B)puffery.
C)retail fraud.
D)frustration but not fraud.
A)auction fraud.
B)puffery.
C)retail fraud.
D)frustration but not fraud.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
Via e-mail,Vern makes repeated credible threats to Ursula that put her in reasonable fear for her safety.This is
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
Omar sends Nell an e-mail ad touting software that will cloak its user in "the anonymity of the Internet." Nell pays Omar for the software,which is never delivered to her.This is online
A)auction fraud.
B)puffery.
C)retail fraud.
D)frustration but not fraud.
A)auction fraud.
B)puffery.
C)retail fraud.
D)frustration but not fraud.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
Travis sends Una a link to a purported e-birthday card that when clicked on downloads software to her computer to record her keystrokes and send the data to Travis.He uses the data to obtain her personal information and access her financial resources.This is
A)identity theft.
B)birthday bashing.
C)regifting.
D)Windows shopping.
A)identity theft.
B)birthday bashing.
C)regifting.
D)Windows shopping.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
Posing as a representative of Global Games Company,Ferris e-mails Evan,a job seeker,asking him to forward personal banking information so that if he is hired,payroll checks can be deposited directly into his account.Evan supplies the data,which Ferris promptly sells to Dixie.This is
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
Minka uses her computer to secretly install software on hundreds of personal computers without their owners' knowledge.
Refer to Fact Pattern 7-1.Minka's software is harmful to the computers on which she installed it.This program is
A)malware.
B)badware.
C)harmware.
D)infectware.
Refer to Fact Pattern 7-1.Minka's software is harmful to the computers on which she installed it.This program is
A)malware.
B)badware.
C)harmware.
D)infectware.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
Minka uses her computer to secretly install software on hundreds of personal computers without their owners' knowledge.
Refer to Fact Pattern 7-1.Each of the computers that Minka has appropriated and installed software on is
A)a hacker.
B)a bot.
C)a botnet.
D)a worm.
Refer to Fact Pattern 7-1.Each of the computers that Minka has appropriated and installed software on is
A)a hacker.
B)a bot.
C)a botnet.
D)a worm.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
Minka uses her computer to secretly install software on hundreds of personal computers without their owners' knowledge.
Refer to Fact Pattern 7-1.Minka's secretly installed software allows her to forward transmissions from her unauthorized network to even more systems.This network is
A)a hacker.
B)a bot.
C)a botnet.
D)a worm.
Refer to Fact Pattern 7-1.Minka's secretly installed software allows her to forward transmissions from her unauthorized network to even more systems.This network is
A)a hacker.
B)a bot.
C)a botnet.
D)a worm.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
Rossi uses cyber tools to steal the personal information of unsuspecting consumers online.Like other cyber thieves,Rossi is most likely to
A)sell the data to other thieves online.
B)use the data to make purchases online.
C)use the data in retail outlets in the "real" world.
D)sell the data on a street corner in the "real" world.
A)sell the data to other thieves online.
B)use the data to make purchases online.
C)use the data in retail outlets in the "real" world.
D)sell the data on a street corner in the "real" world.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
Impersonating Sophie,Ralph makes provocative comments online that deceive others into threatening Sophie,putting her in reasonable fear for her safety.Under federal law,this is
A)a crime only if a person who believes the comments acts on them.
B)a crime only if Sophie and Ralph are in the same jurisdiction.
C)not a crime.
D)a crime.
A)a crime only if a person who believes the comments acts on them.
B)a crime only if Sophie and Ralph are in the same jurisdiction.
C)not a crime.
D)a crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
In posts in online chat-rooms,Ramona makes repeated credible threats to Pierce that put him in reasonable fear for his safety.This is a crime in
A)most states.
B)only a few states.
C)no state.
D)California only.
A)most states.
B)only a few states.
C)no state.
D)California only.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
Jared uses his computer to secretly install software on thousands of personal computers without their owners' knowledge.The program can reproduce itself and spread from one computer to another via any USB port.This program is
A)a hacker.
B)a bot.
C)a virus.
D)a worm.
A)a hacker.
B)a bot.
C)a virus.
D)a worm.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
Posing as Sterling Bank,Roxanne e-mails Quentin,asking him to update his personal banking information by calling a certain phone number.He makes the call and supplies the data,which Roxanne promptly sells to Porcio.This is
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
Boris programs software to prompt a computer to continually crash and reboot.Boris's goal is to install this program on various companies' computer systems without the companies' knowledge.The program can reproduce itself,but must be attached to a host file to travel from one computer network to another.This program is
A)a hacker.
B)a bot.
C)a virus.
D)a worm.
A)a hacker.
B)a bot.
C)a virus.
D)a worm.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
Nestor establishes a phony account in Meet+Greet,a social network,and creates a fictitious persona to cyberbully Leona.This is
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
A)cyber stalking.
B)employment fraud.
C)phishing.
D)vishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
Via the Internet,Rocky sabotages the computer system of Quik Chik'n Company,a food manufacturer,with the purpose of altering the levels of ingredients of the company's products so that consumers of the food become ill.Rocky is
A)a cyberterrorist.
B)a botnet.
C)a virus.
D)a worm.
A)a cyberterrorist.
B)a botnet.
C)a virus.
D)a worm.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Good Health & Life Insurance Corporation suffers a security breach in its computer network.Before the company discovers the breach,the perpetrator obtains corporate financial records and other confidential data,including marketing plans.Is this a crime If so,what are its elements What steps might Good Health & Life take to ensure that going forward only authorized users access the data on its computers Whose efforts-those of the federal government or Good Health & Life-are most important in securing the company's computer infrastructure and why
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
Gladstone regularly sends unsolicited commercial e-mail to hundreds of millions of recipients.This e-mail is prohibited or regulated in
A)most states.
B)only a few states.
C)no state.
D)California only.
A)most states.
B)only a few states.
C)no state.
D)California only.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
An unknown individual launches a series of attacks against the Web sites of Prime Sales Corporation.The attacks significantly slow the sites,leading to $100 million in damage in terms of lost work time,lost revenue,site repair costs,and other expenses.The attacker does not intend to profit from the onslaught and in fact does not realize any financial benefit from the effects.How is this attack most likely orchestrated Who is most likely to engage in this act-that is,whose habits and limitations are clearly suited to such conduct-and why
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
Taylor digitally copies business software without the authorization of the owners and sells the copies to others via the Internet.Under federal law,this is
A)a crime only if the copies are not the same as,or close to,the original.
B)a crime only if Taylor and the buyers are in different jurisdictions.
C)not a crime.
D)a crime.
A)a crime only if the copies are not the same as,or close to,the original.
B)a crime only if Taylor and the buyers are in different jurisdictions.
C)not a crime.
D)a crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
Dinsmore Corporation employs Coolwater Cyberspace Security,Inc.to protect the integrity of Dinsmore's computer system.Coolwater assigns Brigit and each of Dinsmore's other authorized users an individualized password.A serious security problem would most likely exist if Brigit
A)does not change the password.
B)changes the password immediately.
C)changes the password on a regular basis.
D)changes the password at irregular intervals.
A)does not change the password.
B)changes the password immediately.
C)changes the password on a regular basis.
D)changes the password at irregular intervals.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
Sierra digitally copies "Rampage" and other recent films without the authorization of the owners and transfers those copies freely to others via file-sharing Web sites.This is
A)piracy.
B)spamming.
C)phishing.
D)vishing.
A)piracy.
B)spamming.
C)phishing.
D)vishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
Jaime operates Internet gambling sites in countries where this is legal.Jaime accepts e-payments at the sites and pays winnings through foreign-based banks.U.S.federal law bars
A)using e-payments at online gambling sites.
B)placing bets in countries where Internet gambling is legal.
C)paying gambling winnings through foreign-based banks.
D)none of the choices.
A)using e-payments at online gambling sites.
B)placing bets in countries where Internet gambling is legal.
C)paying gambling winnings through foreign-based banks.
D)none of the choices.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
Maksum floods virtual mailboxes with unsolicited junk e-mail,consisting of ads and other messages.This e-mail is
A)spam.
B)bot.
C)piracy.
D)phish.
A)spam.
B)bot.
C)piracy.
D)phish.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
Rashad accesses Quant Company's computer system without authority to obtain protected financial data.Under federal law,this is
A)a felony if it is committed for a commercial purpose.
B)a felony if Quant brings a civil suit against Rashad.
C)not a crime.
D)a crime,but not a felony.
A)a felony if it is committed for a commercial purpose.
B)a felony if Quant brings a civil suit against Rashad.
C)not a crime.
D)a crime,but not a felony.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
Patricia commits an act via e-mail against Othman Finance Company,a business in California,where the act is a cyber crime.Patricia resides in New York where the act is not a crime.Prosecution of Patricia in California involves questions of
A)jurisdiction.
B)"maximum contacts."
C)the immunity of Internet service providers.
D)encryption.
A)jurisdiction.
B)"maximum contacts."
C)the immunity of Internet service providers.
D)encryption.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
In Las Vegas,Nevada,Kurt places a bet on a football game with a bookmaker via a Web site based in Las Vegas.In Cleveland,Ohio,Dorothy places a bet on the same game with a bookmaker via a Web site based in Cleveland.Gambling is regulated in
A)all states.
B)only a few states.
C)no state.
D)Ohio only.
A)all states.
B)only a few states.
C)no state.
D)Ohio only.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
Ollie transmits unsolicited ads to millions of virtual mailboxes,using misleading and deceptive information,including false return addresses.Under federal law,this is
A)a crime only if the recipients previously asked to be "opted out."
B)a crime only if HHH and the recipients are in foreign jurisdictions.
C)not a crime.
D)a crime.
A)a crime only if the recipients previously asked to be "opted out."
B)a crime only if HHH and the recipients are in foreign jurisdictions.
C)not a crime.
D)a crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck