Cybercrime- Test #1 potential questions

Ace your homework & exams now with Quizwiz!

Which of the following is MOST true? A) Case studies offer generalizations on cybercriminals B) Most research of cybercrime focuses on behavioral approaches C) Early researchers felt that computer crime would be a large problem D) A great deal of effort is dedicated to computer security

A great deal of effort is dedicated to computer security

Which of the following is MOST true? A) The character and nature of cybercrime and their frequency of occurrence has changed significantly since 1995 B) Cybercrime is well researched C) Law enforcement is prepared to handle the newest threats of digital crime D) Cybervictimization is likely leveling off

A) The character and nature of cybercrime and their frequency of occurrence has changed significantly since 1995

Which of the following is MOST true? A) The processes and dynamics involved in the production of cyber crime and cyber terrorism are virtually the same B) Cyber terrorism does not pose as great a threat as digital crime C) Cyber crime is another term for digital terrorism D) Cyber crime and digital terrorism are not on parallel tracks

A) The processes and dynamics involved in the production of cyber crime and cyber terrorism are virtually the same

Which of the following has the highest rate of cybervictimization? A) United States B) England C) China D) North Korea

A) United States

The Nigerian bank scheme, pyramid schemes, and bunko schemes are examples of which type of computer crime? A) Computer as a target B) Computer as an instrument of a crime C) Computer as incidental to crime D) Crimes associated with the prevalence of computers

B) Computer as an instrument of a crime

Which of the following is MOST true? A) Estimates concerning the costs of cybercrime are derived from crime statistics B) Indirect costs have not traditionally been considered in the calculation of costs C) Estimates of costs are easy to calculate across different categories of computer crime D) Employers always report computer crimes committed by employees

B) Indirect costs have not traditionally been considered in the calculation of costs

Which of the following is MOST true? A) All forms of digital crimes are covered in the text B) The text focuses mainly on Macintosh-based systems C) Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations D) The authors of the text treat digital crime and digital terrorism as separate concepts

C) Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations

Which of the following is NOT an example of Donn Parker's work as an early commentator on problems associated with computer science? A) The ease with which criminals could misuse information B) The observation that researchers felt that computer crime was not worthy of specific explicit research C) The "cyber" prefix to describe computer crimes D) The observation that losses increase substantially with intentional acts involving computers

C) The "cyber" prefix to describe computer crimes

Which of the following is MOST true? A) Digital crimes are not of great concern to the public B) The public perception is that law enforcement and government officials are well-equipped to deal with cybercrime C) The public relies on computers for a host of societal functions including military operations, finance, communications, utilities, and mass transit D) Threats of cyberterrorism are grossly exaggerated

C) The public relies on computers for a host of societal functions including military operations, finance, communications, utilities, and mass transit

Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of crime?

Computer as a target

Which of the following is NOT considered in the calculation of costs associated with each type of computer crime? A) Reputational damage B) Anti-virus software C) Loss of revenue D) All of the above are considered in the calculation of costs.

D) All of the above are considered in the calculation of costs.

Which of the following is NOT a characteristic noted by Anderson and colleagues in 2012? A) Traditional crimes that are now "cyber" because they are conducted online B) Traditional crimes that have changed with the advent of the Internet C) New crimes that have been originated since the advent of the Internet D) Crimes that facilitate other crimes through the proper use of computers

D) Crimes that facilitate other crimes through the proper use of computers

Which of the following is not a common theme to emerge from the research on the problems of computer crime? A) Computer fraud within government agencies B) The work of hackers C) Incidences of network incursion D) Behavioral approaches of cybercriminals

D. behavioral approaches of cyber criminals

Which type of computer crime describes actions in which the computer is used only to further a criminal end? (i.e. computer/data contained therein is not the object of the crime)

computer as an instrument of a crime

Child pornography is an example of type of computer crime?

computer as incidental to crime

Intellectual property violations, component theft, counterfeiting, and identity theft are examples of which type of computer crime?

crimes associated with the prevalence of computers

Criminal statistics/data on computer crime are

inconsistent because there is an absence of any attempt to collect data systematically

Network intrusion:

often targets the server and may cause harm to the network owners

Which of the following is NOT one of the four categories of computer crime?A) The computer as a target B) Computer vandalism C) The computer as incidental to the crime D) Crimes associated with the prevalence of computers

B) Computer vandalism

Which of the following is NOT an example of indirect cost associated with cyber crime? A) Damages to international trade B) Damages to competitiveness C) Physical damages to the computer D) Damages to innovation

C) Physical damages to the computer


Related study sets

Midterm 1 Review (Units 1, 2, 8, 9, 10 of The Economy)

View Set

Infant physical development, infant perceptual development, sensorimotor stage

View Set

Psychology: Ch. 8, Part 1_Mental Representation

View Set

Brain Rules by John Medina & Other Facts

View Set

Leadership Test 1 Sample NCLEX from Pearson

View Set

Chapter 2: Binary Values and Number Systems

View Set