Reference no: EM131006770
Question 1: Congress has treated computer-related crime as a distinct federal offense since the passage of what legislation?
the National Information Infrastructure Protection Act in 1996
the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984
the Crime Identification Technology Act in 1998
the Identity Theft and Assumption Deterrence Act in 1998
Question 2: Cyber crime is a new breed of offenses that involves the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, and the Internet.
True
False
Question 3: Some spam can simply be an unwanted advertisement. Under what circumstance can spam become a crime?
when it causes emotional distress to a victim
when it involves pornography
when it causes serious harm to a computer or network
when it involves an organized group of spammers
Question 4: What type of cyber threat is represented by Titan Rain?
a cyber fraud threat
a cyber terrorism threat
a cyber espionage threat
Titan Rain does not represent a threat; it is security software.
Question 5: The new phenomenon or form of cyber "entertainment" called ______ involves the use of spoofing technology to call 9-1-1 in order to fake a critical emergency, such as hostage situation, that draws a real-life response from law enforcement.
swatting
pigging
cuffing
copping
Question 6: Because cyber crime is essentially global, international cooperation is required for its control. Which of the following reflects this fact?
the International Information Infrastructure Protection Act
the Family Entertainment and Copyright Act
the Convention on Cybercrime
the Digital Millennium Copyright Act
Question 7: Currently, the Mexican drug cartels are the greatest global drug concern.
True
False
Question 8: When pornography websites send consumers to other sites involuntarily, it is known in the industry as:
tripping
mousetrapping
slagging
ping-ponging
Question 9: Information technology (IT) is the key to the _____ system and is responsible for creating the globalization phenomenon.
political
Internet
economic
social
Question 10: An estimated ____ of cocaine entering the United States transits Mexico.
20%
50%
70%
90%
Question 11: Which of the following statements best reflects cyber crime?
As information technology evolves cyber criminals are rapidly replacing non-cyber offenders.
Innovation brings change and with it new opportunities to commit crime.
Despite the rapid evolution of cyber crime, the justice system has managed to keep pace.
Cyber criminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.
Question 12: "Shadowcrew" was a cyber-terrorism ring whose members allegedly trafficked in 4.5 million stolen credit card numbers and caused total losses in excess of $3 million - money that was used to fund terrorist activities.
False
True
Question 13: It is difficult to prosecute and control Internet pornography because:
Federal legislation has been successfully challenged in the courts under the First Amendment.
As soon as one website is shutdown, another emerges to fill the gap.
Nearly all Internet porn sites are based in foreign countries.
Federal legislation has lagged behind the Internet porn industry.
Question 14: Not all instances of computer theft and computer fraud fall under existing statues because the property stolen:
may be difficult to recover
may be intangible
may be difficult to identify
may be shipped overseas
Question 15: File sharing is a type of illegal copyright infringement that allows users to download music and other copyrighted materials without paying royalties to the copyright holder.
True
False
Question 16: Which type of offenses involves the perpetrator carefully skimming small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection?
financial fraud
theft of information
salami fraud
software fraud
Question 17: Etailing is Internet jargon for the crime of cyber stalking.
False
True
Question 18: The premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents is termed:
cyber espionage
cyber spying
cyber terrorism
cyber stalking
Question 19: What are "cyber smears" and "pump and dumps?"
forms of illegal file sharing
forms of cyber stalking
forms of market manipulation
forms of denial-of-service attacks
Question 20: When an identity thief creates false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:
spamming
phishing
mousetrapping
warez
Question 21: Cyber vandalism is motivated more by profit than a cyber criminal's urge to seek revenge.
False
True
Question 22: The crimes included in RICO:
include state crimes only
include federal crimes only
include both state and federal crimes
include civil liabilities
Question 23: Why do cyber crimes present a compelling challenge for the justice system and law enforcement community?
Cyber crime is rapidly evolving.
Cyber crime is difficult to detect through traditional law enforcement channels.
Cyber crime demands that agents of the justice system develop technical skills that match those of the perpetrators.
Cyber crime presents a compelling challenge for all these reasons.
Question 24: RICO only includes federal crimes.
False
True
Question 25: The FBI uses which model as their standard investigative tool for organized crime groups?
enterprise theory of investigation
organized crime investigation
theory of organized crime investigation
new organized crime investigation
Question 26: The number of websites that advertise or sell prescription drugs is booming. The majority of these sites require that a patient provide a prescription from his or her doctor.
False
True
Question 27: The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.
True
False
Question 28: What is the most common form of spam?
e-mail
instant messaging
mobile phone messaging
Usenet newsgroups
Question 29: Why do cyber crimes present a significant challenge for criminologists?
Because cyber crimes predominately occur only in industrialized countries.
Because, unlike non-cyber crimes, cyber crimes defy accurate measurement.
Because cyber crimes defy long-held assumptions about the cause of crime.
Because cyber crimes are a function of the social environment.
Question 30: The Digital Millennium Copyright Act made it a crime to:
plant slag code into a computer system
steal or attempt to steal someone's identity via the Internet
access computer systems without authorization
circumvent antipiracy measures in most commercial software
Question 31: The Melissa virus (1999) disrupted e-mail around the world causing more than ____ in damage.
$500,000
$1 million
$25 million
$80 million
Question 32: Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984.
True
False
Question 33: Computer worms are similar to viruses except that they use computer networks or the Internet to do what?
"swat" or "shoplist" merchandise
"rip" or "crack" security codes
crash websites
self-replicate
Question 34: This crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions:
illegal touting
fraudulent offerings
market manipulation
deceptive priming
Question 35: What is the difference between a Trojan horse and a virus?
Trojan horses are benign applications.
Trojan horses do not replicate themselves.
Trojan horses are not as destructive.
Trojan horses can penetrate firewalls.
Question 36: A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.
True
False
Question 37: Sharing files with friends who did not pay for them is an example of:
cyber copying
cloning
deceptive copying
copyright infringement
Question 38: Commercial cyber spies target upcoming bids, customer lists, product designs, software source code, voice mail messages, and confidential e-mail messages.
True
False
Question 39: Terrorists groups have used the Internet to fund their operations. How is such funding accomplished?
through fraudulent charitable organizations
through bogus or "shell" companies
through intellectual property crime
Terrorist groups achieve funding via all these mechanisms.
Question 40: ________ is designed to harass or extort money from legitimate users of an Internet service by threatening to prevent the user having access to the service.
theft of service
hijack of service attack
denial-of-service attacks
cheating attacks