Filters
Question type

The two main mediums for cyberbullying include:


A) ​cell phones and Internet.
B) ​Internet and graffiti.
C) ​word of mouth and cell phones.
D) ​graffiti and word of mouth.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A

Using cyberspace for acts of violence, including spying and disrupting an enemy's computer network is known as ___________________.

Correct Answer

verifed

verified

The Electronic Crimes Task Force is operated by the DEA.

A) True
B) False

Correct Answer

verifed

verified

When an identity thief creates false e-mails and/or Web sites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:


A) spamming.
B) phishing.
C) mousetrapping.
D) warez.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Sharing files with friends who did not pay for them is an example of:


A) cyber copying.
B) cloning.
C) deceptive copying.
D) copyright infringement.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

_________ crimes are challenging for criminologists to explain because they defy long-held assumptions about the cause of crime.

Correct Answer

verifed

verified

Cybercriminals who aim their malicious attacks at disrupting, defacing, and destroying technology that they find offensive are known as____________________.


A) cyberterrorists
B) cybervandals
C) cyberstalkers
D) cyberthieves

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which type of cybercrime consists of acts aimed at undermining the social, economic, and political system of an enemy nation?


A) cyberattack
B) cyberwar
C) cyberhack
D) cyberoffense

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.

A) True
B) False

Correct Answer

verifed

verified

In 2004, the Identity Theft Penalty Enhancement Act was signed into law; the act increases existing penalties for the crime of identity theft.

A) True
B) False

Correct Answer

verifed

verified

The number of Web sites that advertise or sell prescription drugs is booming. The majority of these sites require that a patient provide a prescription from his or her doctor.

A) True
B) False

Correct Answer

verifed

verified

Cybervandalism is motivated more by a profit than a cybercriminal's urge to seek revenge.

A) True
B) False

Correct Answer

verifed

verified

_________________ is the illegal buying and/or selling of merchandise on the Internet.

Correct Answer

verifed

verified

E-tailing fraud

__________________is a new breed of offenses typically involving the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, or the Internet.

Correct Answer

verifed

verified

A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.

A) True
B) False

Correct Answer

verifed

verified

While many wonder how people can be so easily duped, the government's Internet fraud center receives 200,000 complaints yearly, and Internet scams result in over ____ in losses each year.


A) $10 billion
B) $10 million
C) $240 billion
D) $240 million

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What are "cyber smears" and "pump and dumps?"


A) forms of illegal file sharing
B) forms of cyber stalking
C) forms of market manipulation
D) forms of denial-of-service attack

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

C

Define what is meant by phishing and identity theft .

Correct Answer

verifed

verified

Identity theft occurs when a person uses...

View Answer

Because of a new portion of the D.A.R.E. program, cyberbullying has decreased by nearly 27% in recent years.

A) True
B) False

Correct Answer

verifed

verified

Using the Internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim's name is known as ______________.

Correct Answer

verifed

verified

Showing 1 - 20 of 95

Related Exams

Show Answer