Cybercrime- Test #1 potential questions
Which of the following is MOST true? A) Case studies offer generalizations on cybercriminals B) Most research of cybercrime focuses on behavioral approaches C) Early researchers felt that computer crime would be a large problem D) A great deal of effort is dedicated to computer security
A great deal of effort is dedicated to computer security
Which of the following is MOST true? A) The character and nature of cybercrime and their frequency of occurrence has changed significantly since 1995 B) Cybercrime is well researched C) Law enforcement is prepared to handle the newest threats of digital crime D) Cybervictimization is likely leveling off
A) The character and nature of cybercrime and their frequency of occurrence has changed significantly since 1995
Which of the following is MOST true? A) The processes and dynamics involved in the production of cyber crime and cyber terrorism are virtually the same B) Cyber terrorism does not pose as great a threat as digital crime C) Cyber crime is another term for digital terrorism D) Cyber crime and digital terrorism are not on parallel tracks
A) The processes and dynamics involved in the production of cyber crime and cyber terrorism are virtually the same
Which of the following has the highest rate of cybervictimization? A) United States B) England C) China D) North Korea
A) United States
The Nigerian bank scheme, pyramid schemes, and bunko schemes are examples of which type of computer crime? A) Computer as a target B) Computer as an instrument of a crime C) Computer as incidental to crime D) Crimes associated with the prevalence of computers
B) Computer as an instrument of a crime
Which of the following is MOST true? A) Estimates concerning the costs of cybercrime are derived from crime statistics B) Indirect costs have not traditionally been considered in the calculation of costs C) Estimates of costs are easy to calculate across different categories of computer crime D) Employers always report computer crimes committed by employees
B) Indirect costs have not traditionally been considered in the calculation of costs
Which of the following is MOST true? A) All forms of digital crimes are covered in the text B) The text focuses mainly on Macintosh-based systems C) Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations D) The authors of the text treat digital crime and digital terrorism as separate concepts
C) Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations
Which of the following is NOT an example of Donn Parker's work as an early commentator on problems associated with computer science? A) The ease with which criminals could misuse information B) The observation that researchers felt that computer crime was not worthy of specific explicit research C) The "cyber" prefix to describe computer crimes D) The observation that losses increase substantially with intentional acts involving computers
C) The "cyber" prefix to describe computer crimes
Which of the following is MOST true? A) Digital crimes are not of great concern to the public B) The public perception is that law enforcement and government officials are well-equipped to deal with cybercrime C) The public relies on computers for a host of societal functions including military operations, finance, communications, utilities, and mass transit D) Threats of cyberterrorism are grossly exaggerated
C) The public relies on computers for a host of societal functions including military operations, finance, communications, utilities, and mass transit
Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of crime?
Computer as a target
Which of the following is NOT considered in the calculation of costs associated with each type of computer crime? A) Reputational damage B) Anti-virus software C) Loss of revenue D) All of the above are considered in the calculation of costs.
D) All of the above are considered in the calculation of costs.
Which of the following is NOT a characteristic noted by Anderson and colleagues in 2012? A) Traditional crimes that are now "cyber" because they are conducted online B) Traditional crimes that have changed with the advent of the Internet C) New crimes that have been originated since the advent of the Internet D) Crimes that facilitate other crimes through the proper use of computers
D) Crimes that facilitate other crimes through the proper use of computers
Which of the following is not a common theme to emerge from the research on the problems of computer crime? A) Computer fraud within government agencies B) The work of hackers C) Incidences of network incursion D) Behavioral approaches of cybercriminals
D. behavioral approaches of cyber criminals
Which type of computer crime describes actions in which the computer is used only to further a criminal end? (i.e. computer/data contained therein is not the object of the crime)
computer as an instrument of a crime
Child pornography is an example of type of computer crime?
computer as incidental to crime
Intellectual property violations, component theft, counterfeiting, and identity theft are examples of which type of computer crime?
crimes associated with the prevalence of computers
Criminal statistics/data on computer crime are
inconsistent because there is an absence of any attempt to collect data systematically
Network intrusion:
often targets the server and may cause harm to the network owners
Which of the following is NOT one of the four categories of computer crime?A) The computer as a target B) Computer vandalism C) The computer as incidental to the crime D) Crimes associated with the prevalence of computers
B) Computer vandalism
Which of the following is NOT an example of indirect cost associated with cyber crime? A) Damages to international trade B) Damages to competitiveness C) Physical damages to the computer D) Damages to innovation
C) Physical damages to the computer