SOC 3420 Criminology 12-14
40. Which of the following is not true in regard to drug distribution and the Internet? a. While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of Pharmacy. b. Often drugs sold on the Internet are adulterated, expired, or the wrong dose. c. Numerous websites provide prescriptions written by cyber doctors. d. There are no controls for preventing children from ordering drugs.
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
50. Prostitution is illegal in all states except Nevada where licensed and highly regulated brothels can operate as business enterprises in ______. a. rural counties b. hotel casinos c. Las Vegas and Reno d. private residences
ANSWER: a REFERENCES: Prostitution
54. The Internet Crime Complaint Center, based in Fairmont, WV, is run by the National White Collar Crime Center and which federal agency? a. DEA b. FBI c. CIA d. INS
ANSWER: b REFERENCES: Controlling Cybercrime
34. People who seek to control or criminalize deviant behaviors in accordance with their own way of thinking are called ______. a. moralists. b. moral entrepreneurs c. power seekers d. social activists
ANSWER: b REFERENCES: The Theory of Social Harm
57. Which of the following is false in regard to Russian organized crime groups in the United States? a. They are involved primarily in frauds and scams. b. They are involved in health care fraud. c. They are primary players in drug trafficking. d. They are believed to be a major player in credit card fraud.
ANSWER: c REFERENCES: Transnational Organized Crime
46. Extorting money from an Internet service user by threatening to prevent the user from having access to the service is known as ______. a. denial-retrial b. Trojan horse c. warez d. denial-of-service attack
ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit
58. Problem behavior syndrome contends that ______. a. genetics hold the key to addiction b. the neighborhood is the primary determinant of substance abuse c. substance abuse is linked to impaired cognitive functioning d. substance abuse is just one of many problem behaviors
ANSWER: d REFERENCES: Substance Abuse
52. What was the significance of the Counterfeit Access Device and Computer Fraud and Abuse Law? a. It protected classified U.S defense and foreign relations information. b. It made identity theft a separate crime against the individual whose identity was stolen. c. It created a federal insurance program to assist victims of computer fraud. d. All of the above
ANSWER: a REFERENCES: Controlling Cybercrime
53. Which of the following is true about the Convention on Cybercrime, ratified in 2006? a. It was the first international treaty to address the definition and enforcement of cybercrime b. It has been signed by 70 nations c. It fails to address a common legal framework to eliminate jurisdictional hurdles d. All of the above
ANSWER: a REFERENCES: Controlling Cybercrime
31. The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet. a. Cybercrime b. Organized crime c. Connected crime d. Technology crime
ANSWER: a REFERENCES: Crime in the Cyber Age
32. Which of the following is not true about the "cyber age" according to the text? a. Facebook reached 10 million users in 2015. b. There are over 500 million tweets a day. c. Nearly 4 billion industries use email. d. Over 190 billion email messages are sent daily.
ANSWER: a REFERENCES: Crime in the Cyber Age
33. Malicious attacks aimed at disrupting, defacing, and destroying technology. a. Cybervandalism b. Cyberwar c. Cyberterrorism d. Cyber malware
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
34. A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection. a. Warez b. Phishing c. Suarez d. Salami slice
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
35. The federal government has actively pursued members of the warez community through new legislation. Which of the following is one of these acts? a. Computer Fraud and Abuse Act b. Federal Lautenberg Act c. RICO Act d. Copyright Infringement Act
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
38. A type of computer crime which includes the unauthorized obtaining of information from a computer (hacking), including software that is copied for profit. a. Theft of information b. Manipulation c. Corporate espionage d. Skimming
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
41. Which of the following is false in regard to denial-of-service (DoS) attacks? a. DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party b. Even respectable businesspeople have been accused of launching DoS attacks against rival businesses c. Online, offshore, gambling sites are particularly vulnerable to DoS attacks d. Many U.S organizations have been affected by DoS attacks, including New York City email accounts and Rutgers University
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
42. Which of the following would be an example of a cyber smear scam? a. Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase b. Jenny sends emails with embedded worms to random Gmail users to obtain personal information in attempt to make a quick profit c. Ryan steals the identity of his biology professors and using his credit card information to purchase his books for the system; afterward he quickly dumps the card to eliminate the trace d. Frank spreads rumors about his ex-girlfriend Diana, including her promiscuity, sexual orientation, and prior drug use on Instagram
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
45. Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to the service desk to get a refund. Becky has just committed _______. a. shoplisting b. entail fraud c. phishing d. mass marketing fraud
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
47. The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information a. phishing b. warez c. dumpster diving d. spearing
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
62. Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend, David, and the two are set to graduate next May with degrees in criminal justice. ANSWER the following questions: One of Jody's friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______. a. file sharing b. salami slicing c. warez d. skimming
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
63. After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide to use the university listserv to email all students and faculty at the university notifying them that their account has been hacked and to email their name and password back to the sender. This is an example of ______. a. phishing b. cyber smear c. a pump and dump d. spear-phishing
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
64. Jody and David begin an etailing fraud scam on campus with the rest of Jody's friends on the volleyball team. Which of the following scenarios would most likely be considered etailing fraud? a. Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a full refund b. Jody obtains legitimate receipts for merchandise and enters a store, taking from the shelf the same merchandise and returns the stolen product for cash c. Jody has her friends purchase stock in a company and after purchasing at a low rate, she spread information via an online blog about the success of the company, increasing the stock price, and having her friends sell at an inflated rate d. David spread negative information about the university online in an attempt to hold the university ransom unless they agree to pay an agreed-upon sum of money for David to remove the slanderous information
ANSWER: a REFERENCES: Cybertheft: Cybercrime for Profit
48. David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his 80 million dollar cyber attack in the form of a ______. a. computer worm b. Trojan horse c. slag code d. logic bomb
ANSWER: a REFERENCES: Cybervandalism: Cybercrime with Malicious Intent
49. Which of the following is false in regard to cyberbullying? a. Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors. b. Adolescent girls are significantly more likely to have experienced cyberbullying than boys. c. Cyberbullying can happen via the computer or cellphone. d. 17 percent of students in a recent survey say they have harassed someone online.
ANSWER: a REFERENCES: Cybervandalism: Cybercrime with Malicious Intent
51. Lockhead Martin, the world's largest aerospace company, announced it detected a significant cyber attack against its information systems that was thwarted. According to the text, this is an example of _______. a. cyberespionage b. cyberspying c. cybervandalism d. cyberterrorism
ANSWER: a REFERENCES: Cyberwarfare: Cybercrime with Political Motives
38. Of all the commonly practiced paraphilias, which causes the general public the most concern? a. Pedophilia b. Frotteurism c. Sadomasochism d. Exhibitionism
ANSWER: a REFERENCES: Paraphilias
63. One of Gloria's regular clients likes to participate in an outlawed paraphilia that involves deriving pleasure from receiving pain from Gloria and inflicting pain on her as well. This is called _______. a. sadomasochism b. exhibitionism c. frotteurism d. voyeurism
ANSWER: a REFERENCES: Paraphilias
54. Which of the following is not true about pornography a. Legal restrictions have made the prosecution of possession of pornography difficult especially for material involving children b. The scientific evidence linking pornography to violence is mixed. c. Sexually explicit films make up 15-30 percent of the home rental market. d. The Court redefined its measure of obscenity in the case of Miller v. California.
ANSWER: a REFERENCES: Pornography
56. The __________ Amendment right to free speech makes legal control of pornography quite difficult. a. First b. Second c. Fourth d. Sixth
ANSWER: a REFERENCES: Pornography
45. International trafficking in prostitution flourishes. Hundreds of thousands of children and women, primarily from _________, are abducted or lured by the promise of good jobs and, instead, end up in the sex trade in industrialized countries including the United States. a. Southeast Asia and Eastern Europe b. Western Europe and South Africa c. South Africa and Southeast Asia d. Eastern Europe and South Africa
ANSWER: a REFERENCES: Prostitution
48. What was the significance of the Mann Act of 1925? a. It prohibited bringing women into the country for the purpose of prostitution. b. It made the possession and distribution of cocaine, a drug previously used as a pain reliever, a federal crime. c. It set the standard for obscenity in cases involving pornography. d. It made prostitution legal in three counties within the state of Nevada.
ANSWER: a REFERENCES: Prostitution
62. Gloria is a 22-year-old woman from Florida who is attempting to finish college. She is studying to become a nurse. She began dancing as an exotic dancer at a gentlemen's club when she turned 20 to help pay for her tuition. ANSWER the following questions. After dancing for roughly a year, Gloria heard several of the other girls talk about prostitution. Gloria believed she could make more money by being both an exotic dancer and as an escort. Her belief most likely fits the view of prostitution called the ___________. a. free choice view b. sexual equality view c. sexual inequality view d. rational choice view
ANSWER: a REFERENCES: Prostitution
35. The movement to ban gay marriage in California that led to the passage of Proposition 8 is an example of a/an _____. a. moral crusade. b. religious policy. c. ethical mandate. d. social campaign.
ANSWER: a REFERENCES: The Theory of Social Harm
55. Which of the following is false about transnational organized crime? a. It usually does not include drug sales but is more inclined to commit business-related crimes. b. It is usually structured along hierarchical lines. c. Groups are quick and effective in controlling and disciplining members. d. They do not include terror organizations.
ANSWER: a REFERENCES: Transnational Organized Crime
56. Passed in 1970, the _______________________ act is federal legislation that enables prosecutors to bring additional criminal and civil charges against people whose multiple criminal acts constitute a conspiracy. a. RICO b. G.R.E.A.T. c. Federal Lautenberg d. Transnational Anti-Criminal Organization (TACO) Act
ANSWER: a REFERENCES: Transnational Organized Crime
58. Latin American and Mexican cartels primary method of income is through ______. a. drug sales and drug smuggling b. human trafficking c. gambling d. loan sharking
ANSWER: a REFERENCES: Transnational Organized Crime
61. Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand? a. Red Wa b. Jao Pho c. Triads d. Fuk Ching
ANSWER: a REFERENCES: Transnational Organized Crime
37. Catherine is a college professor who was recently appointed to chair of the department. As chair, she illegally removes small sums of money from a large number of accounts associated with the department and uses the money to fund her lavish vacations to the Africa, Asia, and Europe. This is an example of a______. a. Trojan horse b. salami slice fraud c. Ponzi scheme d. warez scheme
ANSWER: b REFERENCES: Cybertheft: Cybercrime for Profit
44. Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud. a. theft of information b. manipulation of accounts c. corporate espionage d. warez
ANSWER: b REFERENCES: Cybertheft: Cybercrime for Profit
37. __________ refers to the rubbing against or touching of a nonconsenting adult in a crowd. a. Exhibitionism b. Frotteurism c. Pedophilia d. Voyeurism
ANSWER: b REFERENCES: Paraphilias
40. Attaining sexual pleasure through sexual activity with prepubescent children is referred to as ______. a. frotteurism b. pedophilia c. voyeurism d. sadomasochism
ANSWER: b REFERENCES: Paraphilias
55. Obscenity is derived from the Latin word caenum that means _____________. a. perversion b. filth c. illegal d. twisted
ANSWER: b REFERENCES: Pornography
42. Modern commercial sex appears to have its roots in ancient _____ where Solon established licensed brothels in 500 BC. a. Rome b. Greece c. Mesopotamia d. Persia
ANSWER: b REFERENCES: Prostitution
47. Which category of prostitute is considered the least attractive, lowest paid, and most vulnerable, regardless of whether the prostitute is male or female? a. Brothel prostitutes b. Streetwalkers c. Escorts d. Circuit travelers
ANSWER: b REFERENCES: Prostitution
59. Border patrols are examples of ________ strategies aimed at stopping drug use. a. rehabilitation b. interdiction c. restorative d. diversion
ANSWER: b REFERENCES: Substance Abuse
61. Ethan Nadelmann argues that drugs should be legalized because ______. a. legalization will increase the price of drugs making it too costly for people to use drugs. b. the use of mood-altering substances is customary in almost all human societies. c. taxes the government could charge on drugs would help pay for drug prevention and treatment. d. we should be free.
ANSWER: b REFERENCES: Substance Abuse
33. According to the theory of social harm, immoral acts can be distinguished from crimes on the basis of the ____they cause. a. social outrage b. injury c. financial loss d. depravity
ANSWER: b REFERENCES: The Theory of Social Harm
36. Which of the following statements is accurate? a. Societies usually encourage behaviors that lawmakers consider dangerous. b. The line between behaviors that are immoral and those that are criminal are often blurred. c. People with religious beliefs rarely engage in moral crusades. d. Most behaviors are declared criminal before they are deemed immoral.
ANSWER: b REFERENCES: The Theory of Social Harm
43. Which of the following best depicts a phishing scheme? a. Cassandra writes a fictional column about the university he works for in an attempt to hurt enrollment after failing to earn tenure b. Jennifer spreads negative information about a company online in an attempt to draw down stock prices for her colleagues c. Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the season in an attempt to ascertain personal information for his use d. Tammy places deceptive information online to get unsuspecting investors interested in a stock, thus driving up the price, and allowing her to sell her shares at an inflated price
ANSWER: c REFERENCES: Cybertheft: Cybercrime for Profit
32. According to legal scholar, Morris Cohen, why should victimless crimes be criminally prohibited? a. Because then moral crusaders would not get to define the law b. Because victimless crimes are highly immoral just like "street crimes." c. Because one of the functions of criminal law is to express the public's shared sense of morality d. Because victimless crimes cause social harm and all acts that cause social harm are criminally prohibited
ANSWER: c REFERENCES: Law and Morality
41. _________is a disturbing behavior whereby men travel overseas to places such as Thailand in order to engage in illicit sexual behavior with young girls who have been sold into prostitution. a. Pedophilia tourism b. Pedophilia trafficking c. Sex tourism d. Sex trafficking
ANSWER: c REFERENCES: Prostitution
43. Which of the following is not a condition present in a commercial sexual transaction? a. Activity that has sexual significance for the customer b. Economic transaction c. Felonious violence d. Emotional indifference
ANSWER: c REFERENCES: Prostitution
52. Feminists' sexual equality view considers the prostitute a victim of ______. a. child sexual abuse b. economic circumstances c. male dominance d. personal choices
ANSWER: c REFERENCES: Prostitution
64. Gloria would most likely fit into which category of prostitute? a. Bar girl b. Brothel prostitute c. Call girl d. Street walker
ANSWER: c REFERENCES: Prostitution
57. Tying drug use to factors such as racial prejudice, low self-esteem, poor socioeconomic status, and the high levels of mistrust, negativism, and defiance found in impoverished areas describes which causal explanation of drug use? a. Social learning b. Psychological view c. Subcultural view d. Problem behavior syndrome
ANSWER: c REFERENCES: Substance Abuse
59. Which of the following is most true about the group known as the Surenos? a. They originated in Latin America, first as a protective force for Pablo Escobar, and later became a major player in the distribution of cocaine and heroin along border towns in Texas. b. They are one of the largest groups in the world involved in human trafficking, preying on the young women in the poorest regions and eventually selling them into sexual slavery. c. They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by selling drugs within prisons. d. None of the above
ANSWER: c REFERENCES: Transnational Organized Crime
36. Which of the following is a form of computer crime? a. Theft of information b. Corporate espionage c. Manipulation of accounts d. All of the above are computer crimes
ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit
39. Which of the following is true about ATM skimming crimes? a. Devices are typically undetectable b. Devices are usually placed only for a short time c. Phony keyboards are sometimes attached d. All of the above
ANSWER: d REFERENCES: Cybertheft: Cybercrime for Profit
50. The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______. a. cyberbullying b. cyberspying c. cyberabuse d. cyberstalking
ANSWER: d REFERENCES: Cybervandalism: Cybercrime with Malicious Intent
39. Your neighbor obtains sexual pleasure from spying on strangers while they disrobe. This neighbor is a/an ______. a. exhibitionist. b. frotteurist. c. pedophile. d. voyeur.
ANSWER: d REFERENCES: Paraphilias
53. Which of the following is a contention of opponents of pornography? a. Pornography has increased racism in the United States. b. Pornography is allowable if sold only in adult book stores. c. Pornography serves to encourage women to enter pornographic industries. d. Pornography degrades both the people who are participants and the public who are sometimes forced to see it.
ANSWER: d REFERENCES: Pornography
44. Which category of prostitute is believed to be responsible for the recent upsurge in prostitution? a. Bar girls b. Tooters c. Call girls d. Cyberprostitutes
ANSWER: d REFERENCES: Prostitution
46. The aristocrats of prostitution are _____ who charge customers thousands of dollars per night and who may net over 200,000 dollars per year. a. streetwalkers b. circuit travelers c. Ehookers d. call girls
ANSWER: d REFERENCES: Prostitution
49. After World War I, prostitution became associated with ____, and the desire to protect young servicemen from harm helped to end all experiments with legalization in the United States. a. organized crime b. immorality c. violence d. disease
ANSWER: d REFERENCES: Prostitution
51. What does research indicate about the effects of legalizing prostitution? a. Legalization leads to zoned areas where prostitution is cordoned off from suburban neighborhoods. b. Legalization results in lower pay but increased freedom for prostitutes. c. Legalization protects women from violence, verbal abuse, and physical injuries. d. Legalization leads to massive expansion of the trade, both legal and illegal.
ANSWER: d REFERENCES: Prostitution
60. Which issue presents an obstacle to controlling drugs via source control strategies? a. The drug trade is an important source of foreign revenue and source control undermines third-world economies. b. The amount of foreign grown narcotics is so vast that even if 75 percent of the opium market were destroyed, the United States would still require only 10 percent of the remainder to sustain its drug trade. c. Even if the government of one nation were willing to cooperate in vigorous drug suppression efforts, other nations would be eager to cash in on the drug trade void. d. These are all issues that present obstacles to controlling drugs via source control strategies.
ANSWER: d REFERENCES: Substance Abuse
60. Which of the following is true about Asian transnational crime groups? a. Chinese gangs are primarily involved in human trafficking, especially the shipment of young, poor, Asian women to Eastern Europe and Thailand for the sex trade b. The heijin is Thailand's #1 criminal group, involved primarily in the manufacturing and distribution of methamphetamines c. The Jao Pho, the Philippines largest gang, is often involved in street crime and prostitution and are now one of the largest growing groups on the west coast of the United States d. In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business sectors and politics
ANSWER: d REFERENCES: Transnational Organized Crime