ADMJ 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

Internet Crime Complaint Center

IC3 stands for:

National White Collar Crime Center

NW3C stands for:

a dynamic IP address fluctuates and is thus more secure

Which of the following statements is true?

trojan horse

a malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:

logic bomb

a secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a:

leave a "back door" open for later entry

a virus attack may replace or destroy data on the computer's hard drive and:

that has been taken over by another computer

a zombie is a computer:

obtaining a search warrant

common protocol for processing a crime scene involving electronic evidence includes which of the following?

magnetic fields

computer disks should be stored away from:

easy to destroy

computer evidence is:

a transnational problem

cybercrime is:

hard drives or CDs

digital evidence is often contained on:

sabotage

intentionally destroying computer information, programs, or hardware using a logic bomb is classified as:

not reported

most cyber crimes are:

looking for access into a computer

port scanning is:

a method in which a device is placed in a card reader to record sensitive information

skimming is defined as:

roving authority to the FBI and other law enforcement agents to serve orders on communications carriers

the USA PATRIOT Act, signed by President George W. Bush in 2001, grants:

fragility

the biggest difference between traditional evidence and computer evidence is the latter's:

involves the pirating of proprietary information and copyrighted material

theft of intellectual property:

paper bags

what type of material should be used when packaging electronic evidence?

hacker

which of the following is one of the three general categories of cybercriminals?

auditors

which of the following specialists are frequently consulted in the team approach to investigating computer crime?

the masterminds of reshipper schemes often initiate contact with their victims in chat rooms

which of the following statements about reshipper schemes is correct?

any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department

which of the following statements is true?

spoofing

which process is often considered synonymous with phishing and involves acquiring unauthorized access to a computer or network through a message using an IP address appearing to be from a trusted host, in an attempt to commit identity theft?


Conjuntos de estudio relacionados

Word Religions- Indigenous Religions

View Set

Essential Cell Biology, Chapter 11, Membrane Stricture

View Set

Chapter 16: Therapy and Treatment

View Set

Bone growth, remodeling and repair

View Set

6th Grade Chapter 5 Test Practice

View Set

PSY 242- Abnormal Psychology Final Exam

View Set

English Alphabet for Kindergarten

View Set

Chapter 9 Online Retail & Services Matching

View Set