Which of the following is true of the Digital Revolution?
It has prompted private citizens to embrace sophisticated measures of cyber protection.
It has eliminated vulnerabilities of government institutions and personal residences.
It has resulted in decreased interconnectivity.
It has created a new forum for both terrorist activity and criminal behavior.
Definition
It has created a new forum for both terrorist activity and criminal behavior.
Term
________ has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.
Digital Crime
Computer-related crime
Cybercrime
Computer crime
Definition
Cybercrime
Term
________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.
Cybercrime
Computer-related crime
Computer crime
Digital crime
Definition
Digital crime
Term
Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?
The presence of traditional jurisdictional demarcations
The presence of traditional jurisdictional demarcations
exact_answernone97566
margin of error +/-
The lack of physical boundaries
The lack of physical boundaries
exact_answernone37595
margin of error +/-
An extensive array of equipment or tools
An extensive array of equipment or tools
exact_answernone8890
margin of error +/-
The widespread acceptance of world passports
Definition
The lack of physical boundaries
The lack of physical boundaries
exact_answernone37595
margin of error +/-
Term
Which of the following, according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?
financial institutions
financial institutions
exact_answernone99041
margin of error +/-
individuals
individuals
exact_answernone21148
margin of error +/-
businesses
businesses
exact_answernone65559
margin of error +/-
educational institutions
Definition
businesses
businesses
exact_answernone65559
margin of error +/-
Term
Which of the following is NOT a problem in the investigation of cybercrime?
perceived insignificance of cybercrime
perceived insignificance of cybercrime
exact_answernone63662
margin of error +/-
prosecutorial reluctance to pursue cyber criminals
prosecutorial reluctance to pursue cyber criminals
exact_answernone19213
margin of error +/-
untrained investigators
untrained investigators
exact_answernone84163
margin of error +/-
a widespread perception of cybercrime as worse than “traditional” crime
Definition
a widespread perception of cybercrime as worse than “traditional” crime
Term
Which of the following is NOT a reason why many businesses and corporations underreport computer crimes?
consumers don’t care about confidentiality
consumers don’t care about confidentiality
exact_answernone64156
margin of error +/-
exposure to financial losses
exposure to financial losses
exact_answernone31932
margin of error +/-
data
damage to brand
Definition
consumers don’t care about confidentiality
Term
welcome federal assistance to help catch a cyber criminal?<br></span></p>
Edit this QuestionDelete this Question
0multiple_choice_question2622960
Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?
Government investigations of corporate cybercrime can boost consumer/client confidence.
Government investigations of corporate cybercrime can boost consumer/client confidence.
exact_answernone93414
margin of error +/-
Criminals access different services to disguise their location.
Criminals access different services to disguise their location.
exact_answernone70489
margin of error +/-
The U.S. judicial system lets corporations hide the results of law enforcement investigations.
The U.S. judicial system lets corporations hide the results of law enforcement investigations.
exact_answernone95187
margin of error +/-
Government agencies have the advantage of being able to ignore the chain of custody.
Definition
Criminals access different services to disguise their location.
Term
Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.
nerds or geeks
nerds or geeks
exact_answernone82229
margin of error +/-
forensic predators
forensic predators
exact_answernone25885
margin of error +/-
friendly vendors
friendly vendors
exact_answernone77480
margin of error +/-
electronic purses
Definition
friendly vendors
Term
Expenditures on which area represent a nonrecurring expense for a computer crime unit?
staffing
staffing
exact_answernone66360
margin of error +/-
training
training
exact_answernone71644
margin of error +/-
acquiring and updating equipment
acquiring and updating equipment
exact_answernone64625
margin of error +/-
establishing a computer laboratory
Definition
establishing a computer laboratory
Term
Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________.
First and Fourth Amendments
First and Fourth Amendments
exact_answernone52733
margin of error +/-
First and Second Amendments
First and Second Amendments
exact_answernone35904
margin of error +/-
Second and Third Amendments
Second and Third Amendments
exact_answernone88471
margin of error +/-
Third and Fourth Amendments
Definition
First and Fourth Amendments
Term
What did the Fifth Circuit Court of Appeals rule in U.S. v. Finley?
The post-arrest search of a suspect’s cell phone was unconstitutional.
The post-arrest search of a suspect’s cell phone was unconstitutional.
exact_answernone20163
margin of error +/-
The post-arrest search of a suspect’s cell phone was constitutional.
The post-arrest search of a suspect’s cell phone was constitutional.
exact_answernone9563
margin of error +/-
The pre-arrest search of a suspect’s cell phone was unconstitutional.
The pre-arrest search of a suspect’s cell phone was unconstitutional.
exact_answernone14741
margin of error +/-
The pre-arrest search of a suspect’s cell phone was constitutional.
Definition
The post-arrest search of a suspect’s cell phone was constitutional.
Term
Which of the following is an example of computer-initiated criminal activity?
spreading viruses
spreading viruses
exact_answernone69233
margin of error +/-
stealing home addresses
stealing home addresses
exact_answernone62939
margin of error +/-
wire transfers
wire transfers
exact_answernone88209
margin of error +/-
spamming
Definition
wire transfers
Term
One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.
phreaking
phreaking
exact_answernone68367
margin of error +/-
spamming
spamming
exact_answernone10677
margin of error +/-
hacking
hacking
exact_answernone75475
margin of error +/-
cracking
Definition
phreaking
Term
Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?
closed system cards
closed system cards
exact_answernone4198
margin of error +/-
digital precious metals
digital precious metals
exact_answernone2986
margin of error +/-
Internet payment services
Internet payment services
exact_answernone57666
margin of error +/-
stored value cards
Definition
Internet payment services
Term
Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?
anonymity in transactions
anonymity in transactions
exact_answernone7188
margin of error +/-
increased competition
increased competition
exact_answernone94853
margin of error +/-
lower cost
lower cost
exact_answernone69413
margin of error +/-
lower interest rates
Definition
anonymity in transactions
Term
Closed system cards and open system cards are two primary types of ________.
stored value cards
stored value cards
exact_answernone49090
margin of error +/-
prepaid cards
prepaid cards
exact_answernone84769
margin of error +/-
digital precious metals
digital precious metals
exact_answernone670
margin of error +/-
mobile payments
Definition
prepaid cards
Term
Which of the following e-payment methods stores funds on an integrated circuit chip in the card?
mobile payment
mobile payment
exact_answernone53100
margin of error +/-
prepaid card
prepaid card
exact_answernone36459
margin of error +/-
stored value card
stored value card
exact_answernone18688
margin of error +/-
Internet payment
Definition
stored value card
Term
Which payment method is typically associated with a card payment network such as Visa or MasterCard?