Chapter 17 Computer Crimes CJ 1340
Which of the following statements is true?
A dynamic IP address fluctuates and is thus more secure.
Which of the following is not one of the three general categories of cybercriminals?
IT professionals
IC3 stands for
Internet Crime Complaint Center.
NW3C stands for
National White Collar Crime Center.
Common protocol for processing a crime scene involving electronic evidence includes which of the following?
Obtaining a search warrant.
Which of the following statements is not true?
Security of the police department's computers is basically a nonissue, because most police departments have highly trained computer specialists on staff.
Which of the following statements about reshipper schemes is correct?
The masterminds of reshipper schemes often initiate contact with their victims in chat rooms
A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a
Trojan horse
Skimming is defined as
a method in which a device is placed in a card reader to record sensitive information
Cybercrime is
a transnational problem.
Computer disks should be stored away from
all of these choices (Strong light, magnetic fields, dust)
Electronic evidence and other computer crime evidence may take the form of
all of these choices. (printers and scanners, VCRs and GPS devices, telephones and fax machines.)
Which of the following specialists are frequently consulted in the team approach to investigating computer crime?
all these choices (the victim who owns the equipment, database processing technicians, auditors)
A zombie is a
computer that has been taken over by another computer.
Computer evidence is
easy to destroy
The biggest difference between traditional evidence and computer evidence is the latter's
fragility
Theft of intellectual property
involves the pirating of proprietary information and copyrighted material.
A virus attack may replace or destroy data on the computer's hard drive and
leave a "back door" open for later entry.
A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a
logic bomb.
Port scanning is
looking for access into a computer.
Most computer crimes are
not reported
What type of material should not be used when packaging electronic evidence?
plastic materials
The USA PATRIOT Act, signed by President George W. Bush in 2001, grants
roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.
Intentionally destroying computer information, programs or hardware using a logic bomb is classified as
sabotage
What is the name for the process, often considered synonymous with phishing, that involves acquiring unauthorized access to a computer or network through a message using an IP address which appears to be from a trusted host, in an attempt to commit identity theft?
spoofing