Online quiz questions from Chapts 6, 7, 8, 9, 11, 14, 15

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is MOST true regarding victims of cyberbullying? A. Victims are often bullied by their current or former friends. B. Victims do not often report their experiences. C. Whites are less likely to be bullied than minorities. D. Most victims will talk about their experiences with friends.

C

Which of the following is MOST true? A. Hate crimes affect only the direct victim. B. All states define a "hate crime" in the same manner. C. Victims of hate crimes are hurt physically and emotionally. D. Police officers are adequately trained in investigating hate crimes.

C

Which of the following is NOT a characteristic of intelligence? A. Proactive B. Arrests are rarely made. C. Sources are known and open. D. Reports are closed.

C

Which of the following is NOT a primary federal agency that combats Internet exploitation, cyber stalking, and obscenity? A. FBI B. ICE C. The Secret Service D. The Postal Inspective Service

C

Which of the following is NOT one of the ways a person can be cyber stalked? A. E-mail harassment B. Chat room threats C. Virus attacks D. Hacking into a computer for personal information

C

Which of the following is not a role of the FBI in fighting computer crime? A. Capture criminals behind serious computer intrusions and the spread of malicious code B. Stop online sexual predators who produce or share child pornography C. Prosecute crimes related to encryption, e-commerce, and intellectual property crimes D. Dismantle national and transnational organized crime groups engaging in Internet fraud

C

Which of the following is true? A. Virus hoaxes are annoying, but cost little in terms or time or resources. B. Virus hoaxes are just as potentially costly as the real thing. C. Virus hoaxes can cause no real damage. D. Virus hoaxes are not as prevalent today as they were in the last decade.

C

Which of the following would not be an example of cyberbullying? A. Using Facebook to spread rumors about someone B. Sending nasty e-mail messages constantly C. Posting embarrassing photos of someone in a school bathroom D. Sending hurtful text messages

C

ELF emerged from a group called:

Earth First!

The "Monkey Wrench Gang," a 1975 book written by Edward Abbey inspired the development of what group:

Earth/Environmental Liberation Front

Which crime is essentially a theft in violation of trust?

Embezzlement

Macro viruses are most commonly associated with:

Correct A. typical business software applications. B. e-mail programs. C. Internet browser programs. D. floppy disks. A

Which of the following is NOT true regarding the type of youths targeted for sexual solicitations and approaches? A. Girls are targeted at almost twice the rate of boys. B. Most youths targeted met the aggressor online. C. Most youths targeted were 14 or older. D. Most report the incidents to local law enforcement.

D

Which of the following was NOT a limitation in risk analysis for early computing? A. Storage and processing speed B. Rudimentary networking C. Lack of operating memory D. All were limitations to risk analysis for early computing.

D

Which federal agency collaborates with the Computer Incident Advisory Capability (CIAC)?

DOE

Which federal agency houses CCIPS?

DOJ

A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to legitimate users wishing to log on or utilize the attacked server.

Denial-of-Service attack

The category of stalkers that believe the victim is in love with him or her is called:

Erotomaniacs

Domestic spies hired by corporate competitors that are intent on gaining a competitive advantage over American firms are what type of corporate spies?

Outsiders

A liberal mainstream site, operated by PETA, that is youth oriented is called:

PETA 2.

_____________ attempt to lure potential victims to fraudulent websites for the purpose of gathering sensitive personal information.

Phishing schemes

A __________________ has no constant section of code.

Polymorphic virus

Unless a computer system holds a particular interest, the most likely threat comes from:

Script kiddies

Which agency has primary jurisdiction in cases involving access device fraud?

Secret Service

According to the Sans Institute, the number-one cyber threat is:

increasingly sophisticated website attacks that exploit browser vulnerabilities.

The unique feature of a worm is that it:

is self-replicating.

The National Cyber Response Coordination Group is composed of how many federal agencies that respond to cyber-attacks?

13

During what decade did electronic funds transfers (EFTs) begin to expand money laundering opportunities?

1960's

The CSSS arrests and prosecutes the sale and distribution of counterfeit pharmaceuticals and controlled substances over the Internet through:

Operation Apothecary.

The Supreme Court decided that two sections of the Child Pornography Prevention Act were unconstitutional in: A. In re John Doe B. Ashcroft v. NAMBLE C. Ashcroft v. Free Speech Coalition D. None of the above

C

The Bank Secrecy Act of 1970 requires that financial institutions keep records of cash transactions over what amount?

$10,000

The FBI has estimated that over a five-year period, ALF and ELF have committed more than 600 criminal acts in the United States, which have resulted in damages that exceeded:

$43 million.

weaknesses in counterterrorism efforts that were identified after September 11, 2001

- Failure to place an emphasis on traditional human intelligence gathering and analysis - Failure to provide timely, accurate, and specific intelligence information to law enforcement agencies - Outdated and obsolete computer systems

Child pornography is used by a pedophile to:

- Feed and create sexual fantasies - Lower the inhibitions of the child whom they are planning to molest - Blackmail a child into remaining silent

What factors have limited the ability of local law enforcement agencies to respond to the growing threat of computer crime?

- Lack of training - Lack of diagnostic equipment - Lack of specialized personnel

What factors make some groups more vulnerable than others to online victimization?

- Regular use and access to a computer with Internet capability - People who actively participate in chat rooms - Troubled or rebellious teens seeking emancipation from parental authority

The original U.S. Patriot Act had effectively increased law enforcement power in which areas?

- Wiretaps - Court orders and subpoenas - Trap and trace orders

According to federal law, a criminal offense is a hate crime when such crime is motivated by:

- race. - sexual orientation. - religion.

According to surveys, what percentage of local law enforcement agencies do not have adequate capabilities to read encrypted evidence:

50%

According to a recent survey, what percentage of local police agencies has experienced a "measurable increase" in the reporting of computer and electronic crimes?

80%

Which of the following best describes the link between child pornography and pedophilia? A. Child pornography serves as a primary facilitator for pedophilia. B. Viewing child pornography causes pedophilia. C. Viewing child pornography is not linked to pedophilia. D. The use of child pornography is necessary before a person can offend.

A

Which of the following is NOT a characteristic of investigation? A. Proactive B. Reports are generally open. C. Sources are known and open. D. Arrests are made based on evidence and facts.

A

Which of the following is not an offense or definition of offense created by the Protection of Children from Sexual Predators Act? A. Definition of sex tourism B. Use of interstate facilities to transmit information about a minor C. Transfer of obscene materials to minors D. Definition of sexual activity

A

Corporate espionage schemes may target which of the following?

A. Customer lists B. Product specifications C. Research and development data

Which of the following is NOT a low-tech means identity thieves use to steal personal information?

A. Dumpster diving B. Shoulder surfing Correct C. Skimming devices D. Direct theft of mail C

Which of the following is NOT one of the four primary environments viruses operate in?

A. Microviruses B. Macroviruses C. Network viruses D. Boot viruses A

Which of the following is a trigger for a virus?

A. Opening an e-mail attachment B. Downloading a peer-to-peer file C. Self-execution on a certain date Correct D. All of the above D

Traditional money laundering techniques include all of the following except which one.

A. Physical transport of cash from one location to another Correct B. Electronic transfer of "e-cash" C. "Smurfing" D. Transformation of hard currency to real property or merchandise B

Which of the following is NOT a type of Trojan horse discussed in the text?

A. Remote access Trojans B. Software Detection Killers Correct C. Spyware Trojans D. Destructive Trojans C

Which of the following has increased the occurrence of corporate espionage in the last few decades?

A. The constant use of e-mail as a means of intra-office communication B. Corporate community's increasing use of information and technology to conduct business C. Global commerce conducted over the Internet D. All of the above D

Which of the following is NOT a characteristic of the modern embezzler?

A. The embezzler has a fiduciary relationship with the victim. B. The embezzler possesses specialized skills required to use computer systems. Correct C. The embezzler is limited by the physical nature of the theft act. D. The embezzler is motivated by a desire for a more affluent lifestyle. C

Which country has become the most active source of national and industrial espionage?

A. United States B. China C. Russia D. Japan B

A virus can be categorized based on:

A. the type of environment it operates in. B. the operating system it targets. C. the type of encryption and operating algorithms used. Correct D. all of the above. D

_____________ manifest(s) in several ways, including changes to the browser, redirecting startup pages on Internet browsers, replacing the search function within the browser, and generating pop-up ads and frames that can be difficult to delete or shut down.

Adware

___________________ can reach very large sizes and may include thousands of machines.

Botnets

Which of the following is NOT a characteristic of intruders during the first era of computer security? A. The intruders were usually insiders. B. Most intruders engaged in recreational intrusion. C. Only a few people had access and the appropriate skills to intrude into computer systems. D. Intruders sought knowledge and resources to continue their use of computers

B

Which of the following is NOT a characteristic of spyware? A. Spyware sends information via the Internet to publishers and programmers for marking purposes. B. Internet users are rarely warned about spyware in EULAs. C. Spyware typically is installed in addition to some other functional software. D. Spyware can lead to annoying pop-up ads.

B

Which of the following is a major obstacle for law enforcement in investigating Internet exploitation? A. The offenders rarely repeat their crimes B. The Internet offers relative anonymity C. It is tough to find child pornography on the Internet D. There is little evidence once the person is identified

B

Which law has become the primary vehicle for the prosecution of Internet fraud crimes?

Computer Fraud and Abuse Act (CFAA)

The "Nigerian 419" scheme is primarily what type of computer crime?

Confidence scheme

All of the following are typical characteristics of stalkers, except: A. White B. Male C. Between the ages of 18 and 35 D. Low income

D

Which of the following is NOT a lawful limitation on speech? A. Obscenity B. Incitement C. Libel/Slander D. Hate

D

Which of the following is NOT a primary category of stalker? A. Simple obsession B. Love obsession C. Vengeance D. Sexual sadist

D

Which of the following is NOT a typical victim of online exploitation? A. Women B. Children C. Adolescents D. Middle class males

D

Which of the following is NOT part of Finkelhor's four-part model that enunciates how a sex offense occurs between an offender and a child victim? A. A potential offender must have some motivation to sexually abuse a child. B. Any internal inhibitions against acting on the motivation to engage in sexual assault must be overcome. C. Any external impediments to acting on the impulse to abuse must be overcome. D. A potential offender must avoid detection from law enforcement.

D

Which federal agency is primarily responsible for protecting consumers against computer-generated commercial fraud?

FTC

Which of the following is not a division of the Bureau of Consumer Protection within the FTC?

Fraud

The ___________________________ provides victims of Internet fraud of mechanism to report suspicious activities online.

ICCC or IC3

Which federal agency houses the Customs Cyber Smuggling Center (3C)?

ICE

________________ is the largest and primary investigative arm of the U.S. DHS.

ICE

___________ is/are the most frequent type of consumer fraud complaint.

Identity theft

_____________ can be defined as information, which has been identified as relevant, collected, verified, and interpreted within the context of specific objectives.

Intelligence

Deceptive practices involving the use of capital to create more money is known as:

Investment fraud

Which government passed a law called "The new Personal Information International Disclosure Protection Act" to protect their citizens from having any information provided through PATRIOT Act investigations?

Nova Scotia

The most famous instance of an organization placing specific, personal information on a website is the _________________ Files case.

Nuremberg

_________________________ is the act of concealing the source of assets that have been illegally obtained.

Money laundering

Which federal agency is known as the nation's preeminent "cryptological organization"?

NSA

Which is the lead agency responsible for monitoring and protecting all of the federal government's computer networks from acts of cyberterrorism?

NSA

Which country ranks second behind only the United States in losses associated with Internet fraud schemes?

Nigeria

___________________ is/are the most widely reported type of Internet fraud.

Online auction fraud

Which of the following type of Trojan horse turns a victim's computer into a zombie server available to the whole world or to the attacker only?

Proxy/Wingate Trojans

Which subtype of child molester typically leads the most stable life?

Regressed child molester

Which countries are traditionally connected with child sex tourism?

Sri Lanka, Thailand, Philippines

Which of the following is not a form of secondary support FinCen provides to local law enforcement agencies?

The actual prosecution of money-laundering cases

What provides law enforcement agencies the incoming numbers to a subject's phone?

Trap and trace

An unauthorized program typically contained within a legitimate program is known as a:

Trojan.

___________________, a form of racist propaganda, was found in the automobile of Timothy McVeigh when he was arrested after the bombing of the Murrah Federal Building in Oklahoma City, Oklahoma.

Turner Diaries

According to the 2013 Symantec Internet Security Threat Report, the majority of computer users are being compromised through their:

Web browsers.

High-tech games, heavy metal music, black cults, and links to other social youth movements are techniques used on the Internet by what types of groups?

White supremacy and hate groups

Historically, the missing dimension in quality intelligence has been:

analysis

A __________________ is a court document signed by a judge that instructs the police to perform a specific task.

court order

The disparity in equipment between federal and local cyber cops can most clearly be seen in the inability of most local agencies to:

decipher encrypted computer evidence.

The groups ALF and ELF can best be described as:

environmental-special interests groups.

The increasing inability of federal law enforcement agencies to effectively collect evidence derived from electronic communications via the Web is referred as:

going dark.

The most pressing computer crimes enforced by local law enforcement agencies appear to be those related to:

harmful computer content.

The greatest cost of a virus or malicious code attack is:

physical damage to computer hard drives. lost data. loss of work hours and time spent patching systems.

The largest group of attackers, comprising over 95% of the attacker population, is referred to as:

script kiddies.

Traveling abroad to have sex with underage children is known as:

sex tourism

The most important critical need among local law enforcement agencies is:

training

Neutralization techniques" may be defined as

ways that embezzlers overcome lingering shame associated with the crime of embezzlement.


संबंधित स्टडी सेट्स

can exercise change your brain 253 lecture 16

View Set

Theories and Concepts: Pain and Comfort

View Set

Human Anatomy Chapter Three: Practice Questions

View Set

The Scientific Revolution (1543 - 1687)

View Set

Physics - U2 L13 - Correlation and Causation

View Set