Shared Flashcard Set

Details

Cyber Crime Multiple Choice Chapter 1
the following multiple chosice questions are as follows
22
Criminal Justice
Undergraduate 2
10/16/2014

Additional Criminal Justice Flashcards

 


 

Cards

Term

Which of the following is true of the Digital Revolution?

 

 
It has prompted private citizens to embrace sophisticated measures of cyber protection.

 

 
It has eliminated vulnerabilities of government institutions and personal residences.

 

It has resulted in decreased interconnectivity.

 

It has created a new forum for both terrorist activity and criminal behavior.

 

Definition
It has created a new forum for both terrorist activity and criminal behavior.
Term

________ has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.


 
Digital Crime
 
 
Computer-related crime
 
 
Cybercrime
 
 
Computer crime
Definition
 
Cybercrime
Term

________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.


 
Cybercrime
 
 
Computer-related crime
 
 
Computer crime
 
 
Digital crime
Definition
 
Digital crime
Term

Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?

 
 
The presence of traditional jurisdictional demarcations
 
exact_answer none 97566
           
The lack of physical boundaries
exact_answer none 37595
 
 
An extensive array of equipment or tools
exact_answer none 8890
 
 
The widespread acceptance of world passports
 
Definition
 
The lack of physical boundaries
exact_answer none 37595
 
 
 
 
Term

Which of the following, according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?

 
 
financial institutions
exact_answer none 99041
 
 
individuals
 
exact_answer none 21148
             
businesses
 
exact_answer none 65559
 
educational institutions
Definition
 
businesses
exact_answer none 65559
 
 
 
 
Term

Which of the following is NOT a problem in the investigation of cybercrime?

 
perceived insignificance of cybercrime
exact_answer none 63662
  
prosecutorial reluctance to pursue cyber criminals
exact_answer none 19213
 
untrained investigators
exact_answer none 84163
            
a widespread perception of cybercrime as worse than “traditional” crime
 
Definition

 

 

a widespread perception of cybercrime as worse than “traditional” crime

 

Term

Which of the following is NOT a reason why many businesses and corporations underreport computer crimes?

    
            
consumers don’t care about confidentiality
exact_answer none 64156
 
 
 
   
 
exposure to financial losses
exact_answer none 31932
 
 
   
 
data
    
 
damage to brand
 
Definition

 

 

consumers don’t care about confidentiality

 

Term

welcome federal assistance to help catch a cyber criminal?<br></span></p>

0 multiple_choice_question   2622960

Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?

    
 
Government investigations of corporate cybercrime can boost consumer/client confidence.
exact_answer none 93414
 
 
   
            
Criminals access different services to disguise their location.
exact_answer none 70489
 
 
 
    
 
The U.S. judicial system lets corporations hide the results of law enforcement investigations.
exact_answer none 95187
 
 
    
 
Government agencies have the advantage of being able to ignore the chain of custody.
Definition

 

 

Criminals access different services to disguise their location.
 

 

Term

Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.

    
 
nerds or geeks
exact_answer none 82229
 
 
    
 
forensic predators
exact_answer none 25885
 
 
    
       
friendly vendors
exact_answer none 77480
 
 
 
    
 
electronic purses
Definition

 

 

friendly vendors
 

 

Term

Expenditures on which area represent a nonrecurring expense for a computer crime unit?

    
 
staffing
exact_answer none 66360
 
 
   
 
training
exact_answer none 71644
 
 
    
 
acquiring and updating equipment
exact_answer none 64625
 
 
    
            
establishing a computer laboratory
Definition

 

 

establishing a computer laboratory
 

 

Term

Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________.

   
             
First and Fourth Amendments
exact_answer none 52733
 
 
 
    
 
First and Second Amendments
exact_answer none 35904
 
 
   
 
Second and Third Amendments
exact_answer none 88471
 
 
   
 
Third and Fourth Amendments
Definition

 

 

First and Fourth Amendments
 

 

Term

What did the Fifth Circuit Court of Appeals rule in U.S. v. Finley?

    
 
The post-arrest search of a suspect’s cell phone was unconstitutional.
exact_answer none 20163
 
 
    
             
The post-arrest search of a suspect’s cell phone was constitutional.
exact_answer none 9563
 
 
 
   
 
The pre-arrest search of a suspect’s cell phone was unconstitutional.
exact_answer none 14741
 
 
    
 
The pre-arrest search of a suspect’s cell phone was constitutional.
Definition

 

 

The post-arrest search of a suspect’s cell phone was constitutional.
 

 

Term

Which of the following is an example of computer-initiated criminal activity?

    
 
spreading viruses
exact_answer none 69233
 
 
    
 
stealing home addresses
exact_answer none 62939
 
 
    
             
wire transfers
exact_answer none 88209
 
 
 
    
 
spamming
 
Definition

 

 

wire transfers

 

Term

One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.

   
            
phreaking
exact_answer none 68367
 
 
 
    
 
spamming
exact_answer none 10677
 
 
    
 
hacking
exact_answer none 75475
 
 
   
 
cracking
 
Definition

 

 

phreaking

 

Term

Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?

    
 
closed system cards
exact_answer none 4198
 
 
    
 
digital precious metals
exact_answer none 2986
 
 
    
             
Internet payment services
exact_answer none 57666
 
 
 
   
 
stored value cards
 
Definition

 

 

Internet payment services

 

Term

Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?

    
            
anonymity in transactions
exact_answer none 7188
 
 
 
   
 
increased competition
exact_answer none 94853
 
 
   
 
lower cost
exact_answer none 69413
 
 
   
 
lower interest rates
Definition

 

 

anonymity in transactions

 

 

 
 

 

Term

Closed system cards and open system cards are two primary types of ________.

    
 
stored value cards
exact_answer none 49090
 
 
    
            
prepaid cards
exact_answer none 84769
 
 
 
    
 
digital precious metals
exact_answer none 670
 
 
    
 
mobile payments
 
Definition

 

 

prepaid cards

 

Term

Which of the following e-payment methods stores funds on an integrated circuit chip in the card?

    
 
mobile payment
exact_answer none 53100
 
 
    
 
prepaid card
exact_answer none 36459
 
 
    
             
stored value card
exact_answer none 18688
 
 
 
    
 
Internet payment
Definition

    

 
stored value card

 

Term

Which payment method is typically associated with a card payment network such as Visa or MasterCard?

 
 
digital precious metals
exact_answer none 93718
 
 
   
 
mobile payment
exact_answer none 86953
 
 
   
 
electronic purse
exact_answer none 68428
 
 
    
             
prepaid card
 
Definition

 

 

prepaid card

 

Supporting users have an ad free experience!