Filters
Question type

_________________ is the illegal buying and/or selling of merchandise on the Internet.

Correct Answer

verifed

verified

The premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents is termed:


A) cyberespionage.
B) cyberspying.
C) cyberterrorism.
D) cyberstalking.

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Corporate espionage is the unauthorized obtaining of information from a computer, including software that is copied for profit.

A) True
B) False

Correct Answer

verifed

verified

Which statement best reflects cybercrime?


A) As information technology evolves, cybercriminals are rapidly replacing noncyber offenders.
B) Innovation brings change and, with it, new opportunities to commit crime.
C) Despite the rapid evolution of cybercrime, the justice system has managed to keep pace.
D) Cybercriminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Some experts question the existence of __________________ and claim that hackers are regularly mistaken for terrorists.

Correct Answer

verifed

verified

Megan Meier was a victim of what type of cyber act?


A) catfishing
B) hogging
C) noodling
D) trolling

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

_________ are challenging for criminologists to explain because they defy long-held assumptions about the cause of crime.

Correct Answer

verifed

verified

Why do cybercrimes present a compelling challenge for the justice system and law enforcement community?


A) Cybercrime is rapidly evolving.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime presents a compelling challenge for all these reasons.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Why do cybercrimes present a significant challenge for criminologists?


A) cybercrimes predominantly occur only in industrialized countries
B) unlike non-cybercrimes, cybercrimes defy accurate measurement
C) cybercrimes defy long-held assumptions about the cause of crime
D) cybercrimes are a function of the social environment

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

File sharing is a type of copyright infringement that allows users to download music and other copyrighted materials without paying royalties to the copyright holder.

A) True
B) False

Correct Answer

verifed

verified

Logic bombs implanted in an enemy's computer are an example of cyberterrorism.

A) True
B) False

Correct Answer

verifed

verified

Cyberstalking was made famous in the 2007 case of O.J. Simpson and his then girlfriend Megan Huff.

A) True
B) False

Correct Answer

verifed

verified

Cybervandalism is motivated more by a profit than a cybercriminal's urge to seek revenge.

A) True
B) False

Correct Answer

verifed

verified

Some spam can simply be an unwanted advertisement. Under what circumstance can spam become a crime?


A) when it causes emotional distress to a victim
B) when it involves pornography
C) when it causes serious harm to a computer or network
D) when it involves an organized group of spammers

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Define illegal copyright infringement and discuss what is involved in stealing intellectual property.

Correct Answer

verifed

verified

Warez refers to products that groups of ...

View Answer

The Black Shirt Mafia, one of the largest online identity-theft organizations, with roots in Pennsylvania, illegally obtained money used to fund terrorist activities.

A) True
B) False

Correct Answer

verifed

verified

_________ is using the Internet to advertise sexual services and make contact with clients.

Correct Answer

verifed

verified

__________________is a new breed of offense, typically involving the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, or the Internet.

Correct Answer

verifed

verified

Cyberterrorism is a handy battlefield for terrorists because it can strike directly at what target that bombs will not affect?


A) the economy of an enemy
B) the defense infrastructure of an enemy
C) the hearts and minds of the citizens of an enemy
D) the energy infrastructure of an enemy

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

In the case of MGM Studios, Inc. v. Grokster, the Court held that software distributors could not be sued for inducing copyright infringement for marketing file-sharing software.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 113

Related Exams

Show Answer