Criminology Ch. 15/16 (Final)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following best describe the average hacker? A) A 20-year-old man living in San Francisco B) A 23-year-old woman living in Chicago C) A 35-year-old woman living in Paris D) A 45-year-old man living in New York

A) A 20-year-old man living in San Francisco

_________ attempt to duplicate the decision-making processes used by skilled investigators in evidence analysis. A) Expert systems B) TEMPEST C) Audit trails D) DNA systems

A) Expert systems

Lawsuits challenging the constitutionality of the Communications Decency Act claimed that provisions of the act contravened __________ Amendment guarantees. A) First B) Fourth C) Fifth D) Sixth

A) First

Planting a virus is an example of which category of cybercrime? A) Internal cybercrime B) Computer-manipulation crime C) Support of criminal enterprises D) Telecommunications crimes

A) Internal cybercrime

__________ terrorists want to replace economies based on free enterprise with socialist or communist economic systems. A) Left-wing B) Right-wing C) State-sponsored D) Nationalist

A) Left-wing

____________ is a system used to match a suspect's fingerprints against stored records. A) NCIS B) AFIS C) METAPOL D) VICAP

B) AFIS

__________ is any violation of a federal or state computer-crime statute. A) Computer-facilitated crime B) Cybercrime C) Computer abuse D) Computer-related crime

B) Cybercrime

What does President Obama consider one of the most serious economic and national security challenges facing the US today? A) White-collar crime B) Cybersecurity C) Violent crime D) Constitutional protections

B) Cybersecurity

In the case of ____________, the U.S. Supreme Court rejected an earlier standard for the admissibility of scientific evidence and said that all relevant evidence is admissible unless otherwise provided by the U.S. Constitution or other relevant legal rules. A) Frye v. .U.S. B) Daubert v. Merrell Dow Pharmaceuticals, Inc. C) Buck v. Bell D) Reno v. ACLU

B) Daubert v. Merrell Dow Pharmaceuticals, Inc

Hackers who are excited about breaking into geographically distant computer systems fall into which category? A) Game players B) Explorers C) Vandals D) Scamps

B) Explorers

Which of the following foreign government has been designated a state sponsor of international terrorism by the State Department? A) Iraq B) Iran C) Afghanistan D) Somalia

B) Iran

Which organization has pledged to work with the President and law enforcement to ensure that civil liberties in the U.S. are not eroded as a result of the USA PATRIOT Act? A) The U.S. Supreme Court B) The ACLU C) The Department of Homeland Security D) The 9/11 Commission

B) The ACLU

Ethnocentrism involves A) comparing crime rates in different countries and cultures B) culture-centeredness C) human smuggling D) trafficking in persons

B) culture-centeredness

The Obama administration's official National Strategy for Counterterrorism maintains a focus on A) preventing domestic terrorism B) deterring Islamic-inspired terrorism C) expanding the USA PATRIOT Act D) expanding the Department of Homeland Security

B) deterring Islamic-inspired terrorism

The terrorist bombing of the Alfred P. Murrah Federal Building on Oklahoma City was an example of A) international terrorism B) domestic terrorism C) cyberterrorism D) bioterrorism

B) domestic terrorism

The primary motivation of the average hacker is to A) profit financially by hacking B) gain access to computer networks C) demonstrate network vulnerability D) create a computer security system

B) gain access to computer networks

An assessment of the potential disasters facing an organization is known as A) data encryption B) threat analysis C) an expert system D) an audit trail

B) threat analysis

__________ is defined as any illegal act for which knowledges of computer technology is involved for its investigation, perpetration, or prosecution. A) Cybercrime B) Computer crime C) Computer-related crime D) Computer abuse

C) Computer-related crime

__________ is a form of terrorism that uses high technology in the planning and carrying out of terrorist attacks. A) GovNet B) Bioterrorism C) Cyberterrorism D) Cyberspace

C) Cyberterrorism

Which Act establish the Human Smuggling and Trafficking Center within the U.S. State Department? A) The Homeland Security Act B) The Trafficking Victims Protection Act C) The Intelligence Reform and Terrorism Prevention Act D) The Immigration and Nationality Act

C) The Intelligence Reform and Terrorism Prevention Act

Which of the following is an element of human smuggling? A) The person being smuggled is usually coerced B) The person being smuggled is exploited or forced to perform some type of labor C) The person being smuggled is generally cooperating D) The person being smuggled does not have to cross a border

C) The person being smuggled is generally cooperating

For comparative criminologists, __________ create the biggest problem in reporting crime. A) diverse crime-reporting practices. B) economic influences on the reporting of crime statistics to international agencies. C) definitional differences. D) social and political contexts that are reflected in crime statistics.

C) definitional differences.

An act of terrorism is distinguished from a violent criminal act by A) the location of the act B) the type of behavior involved C) the motivation of the offender D) All of the above

C) the motivation of the offender

Which type of hacker is most likely to use illicit drugs? A) Scamps B) Vandals C) Explorers D) Addicts

D) Addict

Which of the following is not a reason why it is difficult to compare the crime rates of different nations? A) Diverse crime-reporting practices B) Political influences on the reporting of crime statistics to other agencies C) Differences in definitions of a given crime D) Differing population sizes in various countries

D) Differing population sizes in various countries

________ terrorism refers only to acts of terrorism that occur outside the United States. A) Domestic B) International C) Anarchist D) Foreign

D) Foreign

Which of the following statements about trafficking in persons is false? A) Trafficking contains an element of fraud, force, or coercion B) Persons being trafficked are victims C) Persons being trafficked are exploited for involved in forced labor D) Persons being trafficked are free to leave or to change jobs

D) Persons being trafficked are free to leave or to change jobs

The ___________ is a citizens' group that focuses on refining notions of privacy and legality as they relate to telecommunications and other communications-based media. A) The Computer Security Institute B) The Cybersecurity Center C) The National Computer Security Association D) The Electronic Frontier Foundation

D) The Electronic Frontier Foundation

A(n) __________ records the activities of computer operators surrounding each event in a transaction. A) expert systems analysis B) data encryption C) threat analysis D) audit trail

D) audit trail

A(n) ___________ criminologist is involved in the cross-national study of crime. A) ethnocentric B) classical C) biosocial D) comparative

D) comparative


Kaugnay na mga set ng pag-aaral

Section #3 - US Laws and Regulations

View Set

Chapter 31: Caring for Clients with Disorders of the Hematopoietic System

View Set

Vascular Practice Questions-Angie

View Set

Vocabulary Comptia A+ 220-1101 & 220-1102

View Set