SOC 3420 Criminology 12-14

¡Supera tus tareas y exámenes ahora con Quizwiz!

40. Which of the following is not true in regard to drug distribution and the Internet? a. While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of Pharmacy. b. Often drugs sold on the Internet are adulterated, expired, or the wrong dose. c. Numerous websites provide prescriptions written by cyber doctors. d. There are no controls for preventing children from ordering drugs.

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

50. Prostitution is illegal in all states except Nevada where licensed and highly regulated brothels can operate as business enterprises in ______. a. rural counties b. hotel casinos c. Las Vegas and Reno d. private residences

ANSWER: a REFERENCES: Prostitution

54. The Internet Crime Complaint Center, based in Fairmont, WV, is run by the National White Collar Crime Center and which federal agency? a. DEA b. FBI c. CIA d. INS

ANSWER: b REFERENCES: Controlling Cybercrime

34. People who seek to control or criminalize deviant behaviors in accordance with their own way of thinking are called ______. a. moralists. b. moral entrepreneurs c. power seekers d. social activists

ANSWER: b REFERENCES: The Theory of Social Harm

57. Which of the following is false in regard to Russian organized crime groups in the United States? a. They are involved primarily in frauds and scams. b. They are involved in health care fraud. c. They are primary players in drug trafficking. d. They are believed to be a major player in credit card fraud.

ANSWER: c REFERENCES: Transnational Organized Crime

46. Extorting money from an Internet service user by threatening to prevent the user from having access to the service is known as ______. a. denial-retrial b. Trojan horse c. warez d. denial-of-service attack

ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit

58. Problem behavior syndrome contends that ______. a. genetics hold the key to addiction b. the neighborhood is the primary determinant of substance abuse c. substance abuse is linked to impaired cognitive functioning d. substance abuse is just one of many problem behaviors

ANSWER: d REFERENCES: Substance Abuse

52. What was the significance of the Counterfeit Access Device and Computer Fraud and Abuse Law? a. It protected classified U.S defense and foreign relations information. b. It made identity theft a separate crime against the individual whose identity was stolen. c. It created a federal insurance program to assist victims of computer fraud. d. All of the above

ANSWER: a REFERENCES: Controlling Cybercrime

53. Which of the following is true about the Convention on Cybercrime, ratified in 2006? a. It was the first international treaty to address the definition and enforcement of cybercrime b. It has been signed by 70 nations c. It fails to address a common legal framework to eliminate jurisdictional hurdles d. All of the above

ANSWER: a REFERENCES: Controlling Cybercrime

31. The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet. a. Cybercrime b. Organized crime c. Connected crime d. Technology crime

ANSWER: a REFERENCES: Crime in the Cyber Age

32. Which of the following is not true about the "cyber age" according to the text? a. Facebook reached 10 million users in 2015. b. There are over 500 million tweets a day. c. Nearly 4 billion industries use email. d. Over 190 billion email messages are sent daily.

ANSWER: a REFERENCES: Crime in the Cyber Age

33. Malicious attacks aimed at disrupting, defacing, and destroying technology. a. Cybervandalism b. Cyberwar c. Cyberterrorism d. Cyber malware

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

34. A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection. a. Warez b. Phishing c. Suarez d. Salami slice

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

35. The federal government has actively pursued members of the warez community through new legislation. Which of the following is one of these acts? a. Computer Fraud and Abuse Act b. Federal Lautenberg Act c. RICO Act d. Copyright Infringement Act

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

38. A type of computer crime which includes the unauthorized obtaining of information from a computer (hacking), including software that is copied for profit. a. Theft of information b. Manipulation c. Corporate espionage d. Skimming

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

41. Which of the following is false in regard to denial-of-service (DoS) attacks? a. DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party b. Even respectable businesspeople have been accused of launching DoS attacks against rival businesses c. Online, offshore, gambling sites are particularly vulnerable to DoS attacks d. Many U.S organizations have been affected by DoS attacks, including New York City email accounts and Rutgers University

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

42. Which of the following would be an example of a cyber smear scam? a. Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase b. Jenny sends emails with embedded worms to random Gmail users to obtain personal information in attempt to make a quick profit c. Ryan steals the identity of his biology professors and using his credit card information to purchase his books for the system; afterward he quickly dumps the card to eliminate the trace d. Frank spreads rumors about his ex-girlfriend Diana, including her promiscuity, sexual orientation, and prior drug use on Instagram

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

45. Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to the service desk to get a refund. Becky has just committed _______. a. shoplisting b. entail fraud c. phishing d. mass marketing fraud

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

47. The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information a. phishing b. warez c. dumpster diving d. spearing

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

62. Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend, David, and the two are set to graduate next May with degrees in criminal justice. ANSWER the following questions: One of Jody's friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______. a. file sharing b. salami slicing c. warez d. skimming

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

63. After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide to use the university listserv to email all students and faculty at the university notifying them that their account has been hacked and to email their name and password back to the sender. This is an example of ______. a. phishing b. cyber smear c. a pump and dump d. spear-phishing

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

64. Jody and David begin an etailing fraud scam on campus with the rest of Jody's friends on the volleyball team. Which of the following scenarios would most likely be considered etailing fraud? a. Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a full refund b. Jody obtains legitimate receipts for merchandise and enters a store, taking from the shelf the same merchandise and returns the stolen product for cash c. Jody has her friends purchase stock in a company and after purchasing at a low rate, she spread information via an online blog about the success of the company, increasing the stock price, and having her friends sell at an inflated rate d. David spread negative information about the university online in an attempt to hold the university ransom unless they agree to pay an agreed-upon sum of money for David to remove the slanderous information

ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit

48. David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his 80 million dollar cyber attack in the form of a ______. a. computer worm b. Trojan horse c. slag code d. logic bomb

ANSWER: a REFERENCES: Cybervandalism: Cybercrime with Malicious Intent

49. Which of the following is false in regard to cyberbullying? a. Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors. b. Adolescent girls are significantly more likely to have experienced cyberbullying than boys. c. Cyberbullying can happen via the computer or cellphone. d. 17 percent of students in a recent survey say they have harassed someone online.

ANSWER: a REFERENCES: Cybervandalism: Cybercrime with Malicious Intent

51. Lockhead Martin, the world's largest aerospace company, announced it detected a significant cyber attack against its information systems that was thwarted. According to the text, this is an example of _______. a. cyberespionage b. cyberspying c. cybervandalism d. cyberterrorism

ANSWER: a REFERENCES: Cyberwarfare: Cybercrime with Political Motives

38. Of all the commonly practiced paraphilias, which causes the general public the most concern? a. Pedophilia b. Frotteurism c. Sadomasochism d. Exhibitionism

ANSWER: a REFERENCES: Paraphilias

63. One of Gloria's regular clients likes to participate in an outlawed paraphilia that involves deriving pleasure from receiving pain from Gloria and inflicting pain on her as well. This is called _______. a. sadomasochism b. exhibitionism c. frotteurism d. voyeurism

ANSWER: a REFERENCES: Paraphilias

54. Which of the following is not true about pornography a. Legal restrictions have made the prosecution of possession of pornography difficult especially for material involving children b. The scientific evidence linking pornography to violence is mixed. c. Sexually explicit films make up 15-30 percent of the home rental market. d. The Court redefined its measure of obscenity in the case of Miller v. California.

ANSWER: a REFERENCES: Pornography

56. The __________ Amendment right to free speech makes legal control of pornography quite difficult. a. First b. Second c. Fourth d. Sixth

ANSWER: a REFERENCES: Pornography

45. International trafficking in prostitution flourishes. Hundreds of thousands of children and women, primarily from _________, are abducted or lured by the promise of good jobs and, instead, end up in the sex trade in industrialized countries including the United States. a. Southeast Asia and Eastern Europe b. Western Europe and South Africa c. South Africa and Southeast Asia d. Eastern Europe and South Africa

ANSWER: a REFERENCES: Prostitution

48. What was the significance of the Mann Act of 1925? a. It prohibited bringing women into the country for the purpose of prostitution. b. It made the possession and distribution of cocaine, a drug previously used as a pain reliever, a federal crime. c. It set the standard for obscenity in cases involving pornography. d. It made prostitution legal in three counties within the state of Nevada.

ANSWER: a REFERENCES: Prostitution

62. Gloria is a 22-year-old woman from Florida who is attempting to finish college. She is studying to become a nurse. She began dancing as an exotic dancer at a gentlemen's club when she turned 20 to help pay for her tuition. ANSWER the following questions. After dancing for roughly a year, Gloria heard several of the other girls talk about prostitution. Gloria believed she could make more money by being both an exotic dancer and as an escort. Her belief most likely fits the view of prostitution called the ___________. a. free choice view b. sexual equality view c. sexual inequality view d. rational choice view

ANSWER: a REFERENCES: Prostitution

35. The movement to ban gay marriage in California that led to the passage of Proposition 8 is an example of a/an _____. a. moral crusade. b. religious policy. c. ethical mandate. d. social campaign.

ANSWER: a REFERENCES: The Theory of Social Harm

55. Which of the following is false about transnational organized crime? a. It usually does not include drug sales but is more inclined to commit business-related crimes. b. It is usually structured along hierarchical lines. c. Groups are quick and effective in controlling and disciplining members. d. They do not include terror organizations.

ANSWER: a REFERENCES: Transnational Organized Crime

56. Passed in 1970, the _______________________ act is federal legislation that enables prosecutors to bring additional criminal and civil charges against people whose multiple criminal acts constitute a conspiracy. a. RICO b. G.R.E.A.T. c. Federal Lautenberg d. Transnational Anti-Criminal Organization (TACO) Act

ANSWER: a REFERENCES: Transnational Organized Crime

58. Latin American and Mexican cartels primary method of income is through ______. a. drug sales and drug smuggling b. human trafficking c. gambling d. loan sharking

ANSWER: a REFERENCES: Transnational Organized Crime

61. Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand? a. Red Wa b. Jao Pho c. Triads d. Fuk Ching

ANSWER: a REFERENCES: Transnational Organized Crime

37. Catherine is a college professor who was recently appointed to chair of the department. As chair, she illegally removes small sums of money from a large number of accounts associated with the department and uses the money to fund her lavish vacations to the Africa, Asia, and Europe. This is an example of a______. a. Trojan horse b. salami slice fraud c. Ponzi scheme d. warez scheme

ANSWER: b REFERENCES: Cybertheft: Cybercrime for Profit

44. Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud. a. theft of information b. manipulation of accounts c. corporate espionage d. warez

ANSWER: b REFERENCES: Cybertheft: Cybercrime for Profit

37. __________ refers to the rubbing against or touching of a nonconsenting adult in a crowd. a. Exhibitionism b. Frotteurism c. Pedophilia d. Voyeurism

ANSWER: b REFERENCES: Paraphilias

40. Attaining sexual pleasure through sexual activity with prepubescent children is referred to as ______. a. frotteurism b. pedophilia c. voyeurism d. sadomasochism

ANSWER: b REFERENCES: Paraphilias

55. Obscenity is derived from the Latin word caenum that means _____________. a. perversion b. filth c. illegal d. twisted

ANSWER: b REFERENCES: Pornography

42. Modern commercial sex appears to have its roots in ancient _____ where Solon established licensed brothels in 500 BC. a. Rome b. Greece c. Mesopotamia d. Persia

ANSWER: b REFERENCES: Prostitution

47. Which category of prostitute is considered the least attractive, lowest paid, and most vulnerable, regardless of whether the prostitute is male or female? a. Brothel prostitutes b. Streetwalkers c. Escorts d. Circuit travelers

ANSWER: b REFERENCES: Prostitution

59. Border patrols are examples of ________ strategies aimed at stopping drug use. a. rehabilitation b. interdiction c. restorative d. diversion

ANSWER: b REFERENCES: Substance Abuse

61. Ethan Nadelmann argues that drugs should be legalized because ______. a. legalization will increase the price of drugs making it too costly for people to use drugs. b. the use of mood-altering substances is customary in almost all human societies. c. taxes the government could charge on drugs would help pay for drug prevention and treatment. d. we should be free.

ANSWER: b REFERENCES: Substance Abuse

33. According to the theory of social harm, immoral acts can be distinguished from crimes on the basis of the ____they cause. a. social outrage b. injury c. financial loss d. depravity

ANSWER: b REFERENCES: The Theory of Social Harm

36. Which of the following statements is accurate? a. Societies usually encourage behaviors that lawmakers consider dangerous. b. The line between behaviors that are immoral and those that are criminal are often blurred. c. People with religious beliefs rarely engage in moral crusades. d. Most behaviors are declared criminal before they are deemed immoral.

ANSWER: b REFERENCES: The Theory of Social Harm

43. Which of the following best depicts a phishing scheme? a. Cassandra writes a fictional column about the university he works for in an attempt to hurt enrollment after failing to earn tenure b. Jennifer spreads negative information about a company online in an attempt to draw down stock prices for her colleagues c. Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the season in an attempt to ascertain personal information for his use d. Tammy places deceptive information online to get unsuspecting investors interested in a stock, thus driving up the price, and allowing her to sell her shares at an inflated price

ANSWER: c REFERENCES: Cybertheft: Cybercrime for Profit

32. According to legal scholar, Morris Cohen, why should victimless crimes be criminally prohibited? a. Because then moral crusaders would not get to define the law b. Because victimless crimes are highly immoral just like "street crimes." c. Because one of the functions of criminal law is to express the public's shared sense of morality d. Because victimless crimes cause social harm and all acts that cause social harm are criminally prohibited

ANSWER: c REFERENCES: Law and Morality

41. _________is a disturbing behavior whereby men travel overseas to places such as Thailand in order to engage in illicit sexual behavior with young girls who have been sold into prostitution. a. Pedophilia tourism b. Pedophilia trafficking c. Sex tourism d. Sex trafficking

ANSWER: c REFERENCES: Prostitution

43. Which of the following is not a condition present in a commercial sexual transaction? a. Activity that has sexual significance for the customer b. Economic transaction c. Felonious violence d. Emotional indifference

ANSWER: c REFERENCES: Prostitution

52. Feminists' sexual equality view considers the prostitute a victim of ______. a. child sexual abuse b. economic circumstances c. male dominance d. personal choices

ANSWER: c REFERENCES: Prostitution

64. Gloria would most likely fit into which category of prostitute? a. Bar girl b. Brothel prostitute c. Call girl d. Street walker

ANSWER: c REFERENCES: Prostitution

57. Tying drug use to factors such as racial prejudice, low self-esteem, poor socioeconomic status, and the high levels of mistrust, negativism, and defiance found in impoverished areas describes which causal explanation of drug use? a. Social learning b. Psychological view c. Subcultural view d. Problem behavior syndrome

ANSWER: c REFERENCES: Substance Abuse

59. Which of the following is most true about the group known as the Surenos? a. They originated in Latin America, first as a protective force for Pablo Escobar, and later became a major player in the distribution of cocaine and heroin along border towns in Texas. b. They are one of the largest groups in the world involved in human trafficking, preying on the young women in the poorest regions and eventually selling them into sexual slavery. c. They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by selling drugs within prisons. d. None of the above

ANSWER: c REFERENCES: Transnational Organized Crime

36. Which of the following is a form of computer crime? a. Theft of information b. Corporate espionage c. Manipulation of accounts d. All of the above are computer crimes

ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit

39. Which of the following is true about ATM skimming crimes? a. Devices are typically undetectable b. Devices are usually placed only for a short time c. Phony keyboards are sometimes attached d. All of the above

ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit

50. The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______. a. cyberbullying b. cyberspying c. cyberabuse d. cyberstalking

ANSWER: d REFERENCES: Cybervandalism: Cybercrime with Malicious Intent

39. Your neighbor obtains sexual pleasure from spying on strangers while they disrobe. This neighbor is a/an ______. a. exhibitionist. b. frotteurist. c. pedophile. d. voyeur.

ANSWER: d REFERENCES: Paraphilias

53. Which of the following is a contention of opponents of pornography? a. Pornography has increased racism in the United States. b. Pornography is allowable if sold only in adult book stores. c. Pornography serves to encourage women to enter pornographic industries. d. Pornography degrades both the people who are participants and the public who are sometimes forced to see it.

ANSWER: d REFERENCES: Pornography

44. Which category of prostitute is believed to be responsible for the recent upsurge in prostitution? a. Bar girls b. Tooters c. Call girls d. Cyberprostitutes

ANSWER: d REFERENCES: Prostitution

46. The aristocrats of prostitution are _____ who charge customers thousands of dollars per night and who may net over 200,000 dollars per year. a. streetwalkers b. circuit travelers c. Ehookers d. call girls

ANSWER: d REFERENCES: Prostitution

49. After World War I, prostitution became associated with ____, and the desire to protect young servicemen from harm helped to end all experiments with legalization in the United States. a. organized crime b. immorality c. violence d. disease

ANSWER: d REFERENCES: Prostitution

51. What does research indicate about the effects of legalizing prostitution? a. Legalization leads to zoned areas where prostitution is cordoned off from suburban neighborhoods. b. Legalization results in lower pay but increased freedom for prostitutes. c. Legalization protects women from violence, verbal abuse, and physical injuries. d. Legalization leads to massive expansion of the trade, both legal and illegal.

ANSWER: d REFERENCES: Prostitution

60. Which issue presents an obstacle to controlling drugs via source control strategies? a. The drug trade is an important source of foreign revenue and source control undermines third-world economies. b. The amount of foreign grown narcotics is so vast that even if 75 percent of the opium market were destroyed, the United States would still require only 10 percent of the remainder to sustain its drug trade. c. Even if the government of one nation were willing to cooperate in vigorous drug suppression efforts, other nations would be eager to cash in on the drug trade void. d. These are all issues that present obstacles to controlling drugs via source control strategies.

ANSWER: d REFERENCES: Substance Abuse

60. Which of the following is true about Asian transnational crime groups? a. Chinese gangs are primarily involved in human trafficking, especially the shipment of young, poor, Asian women to Eastern Europe and Thailand for the sex trade b. The heijin is Thailand's #1 criminal group, involved primarily in the manufacturing and distribution of methamphetamines c. The Jao Pho, the Philippines largest gang, is often involved in street crime and prostitution and are now one of the largest growing groups on the west coast of the United States d. In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business sectors and politics

ANSWER: d REFERENCES: Transnational Organized Crime


Conjuntos de estudio relacionados

Lecture 19: Altruism/Kin Identification

View Set

PATHOPHYSIOLOGY and PHARMACOLOGY Alzheimer's Disease (AD)

View Set

Improving Sentence Structure, Part 4

View Set

Geometry Chapter 7 Theorems and Postulates

View Set

Chapter 5: Test Yourself Review Questions

View Set