ADMJ 12
Internet Crime Complaint Center
IC3 stands for:
National White Collar Crime Center
NW3C stands for:
a dynamic IP address fluctuates and is thus more secure
Which of the following statements is true?
trojan horse
a malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:
logic bomb
a secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a:
leave a "back door" open for later entry
a virus attack may replace or destroy data on the computer's hard drive and:
that has been taken over by another computer
a zombie is a computer:
obtaining a search warrant
common protocol for processing a crime scene involving electronic evidence includes which of the following?
magnetic fields
computer disks should be stored away from:
easy to destroy
computer evidence is:
a transnational problem
cybercrime is:
hard drives or CDs
digital evidence is often contained on:
sabotage
intentionally destroying computer information, programs, or hardware using a logic bomb is classified as:
not reported
most cyber crimes are:
looking for access into a computer
port scanning is:
a method in which a device is placed in a card reader to record sensitive information
skimming is defined as:
roving authority to the FBI and other law enforcement agents to serve orders on communications carriers
the USA PATRIOT Act, signed by President George W. Bush in 2001, grants:
fragility
the biggest difference between traditional evidence and computer evidence is the latter's:
involves the pirating of proprietary information and copyrighted material
theft of intellectual property:
paper bags
what type of material should be used when packaging electronic evidence?
hacker
which of the following is one of the three general categories of cybercriminals?
auditors
which of the following specialists are frequently consulted in the team approach to investigating computer crime?
the masterminds of reshipper schemes often initiate contact with their victims in chat rooms
which of the following statements about reshipper schemes is correct?
any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department
which of the following statements is true?
spoofing
which process is often considered synonymous with phishing and involves acquiring unauthorized access to a computer or network through a message using an IP address appearing to be from a trusted host, in an attempt to commit identity theft?