Chapter 17 Computer Crimes CJ 1340

Ace your homework & exams now with Quizwiz!

Which of the following statements is true?

A dynamic IP address fluctuates and is thus more secure.

Which of the following is not one of the three general categories of cybercriminals?

IT professionals

IC3 stands for

Internet Crime Complaint Center.

NW3C stands for

National White Collar Crime Center.

Common protocol for processing a crime scene involving electronic evidence includes which of the following?

Obtaining a search warrant.

Which of the following statements is not true?

Security of the police department's computers is basically a nonissue, because most police departments have highly trained computer specialists on staff.

Which of the following statements about reshipper schemes is correct?

The masterminds of reshipper schemes often initiate contact with their victims in chat rooms

A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a

Trojan horse

Skimming is defined as

a method in which a device is placed in a card reader to record sensitive information

Cybercrime is

a transnational problem.

Computer disks should be stored away from

all of these choices (Strong light, magnetic fields, dust)

Electronic evidence and other computer crime evidence may take the form of

all of these choices. (printers and scanners, VCRs and GPS devices, telephones and fax machines.)

Which of the following specialists are frequently consulted in the team approach to investigating computer crime?

all these choices (the victim who owns the equipment, database processing technicians, auditors)

A zombie is a

computer that has been taken over by another computer.

Computer evidence is

easy to destroy

The biggest difference between traditional evidence and computer evidence is the latter's

fragility

Theft of intellectual property

involves the pirating of proprietary information and copyrighted material.

A virus attack may replace or destroy data on the computer's hard drive and

leave a "back door" open for later entry.

A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a

logic bomb.

Port scanning is

looking for access into a computer.

Most computer crimes are

not reported

What type of material should not be used when packaging electronic evidence?

plastic materials

The USA PATRIOT Act, signed by President George W. Bush in 2001, grants

roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.

Intentionally destroying computer information, programs or hardware using a logic bomb is classified as

sabotage

What is the name for the process, often considered synonymous with phishing, that involves acquiring unauthorized access to a computer or network through a message using an IP address which appears to be from a trusted host, in an attempt to commit identity theft?

spoofing


Related study sets

Midterm Prep Weeks 1-7 -- CIST1220-Structured Query Language-SQL

View Set

Critical thinking questions ch. 1-10 and 44 - 47

View Set

Occupational Health and Safety Final Exam (Part 1)

View Set

7C the law of large numbers, 7B combining probabilities, 7A fundamentals of probability

View Set

Chapter 12 - T/F & Multiple Choice

View Set