Deck 5: Cybercrime Law: a European Perspective

ملء الشاشة (f)
exit full mode
سؤال
Forgery is an example of:

A) Computer assisted crime
B) Computer-related crime
C) Computer-integrity crime
D) Computer malfeasance crime
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following courts is located in France?

A) Court of First Instance
B) European Court of Justice
C) Le Conseil d'État
D) All of the above
سؤال
An example of a content-related crime would be:

A) Cyberstalking
B) Child pornography
C) Hacking
D) None of the above
سؤال
In the UK, it is legal to possess child pornography but illegal to distribute it to others.
سؤال
All cybercrimes can be addressed using existing laws.
سؤال
The EU Framework Decision makes illegal access to information systems (intentional, without right). Member states are required to ensure that this is:

A) Handled as a civil court issue
B) Punishable as a criminal offense
C) The responsibility of the owner of the computer system
D) Handled as a reprimand only
سؤال
The Netherlands claims universal jurisdiction for the crime of:

A) Attacks on the King
B) Transnational computer crimes
C) Terrorist network activity
D) Malware distribution
سؤال
The Council of Europe Convention on Cybercrime introduces three categories of computer offense. The most serious category is:

A) Computer-assisted crimes
B) Computer-related crimes
C) Computer-integrity crimes
D) Computer malfeasance crimes
سؤال
How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?

A) Search warrants
B) Treaties
C) Presidential intervention
D) All of the above
سؤال
Jurisdiction claims may be based on:

A) Location of the perpetrator's computer
B) Location of the victim's computer
C) Location of intermediary computers
D) All of the above
سؤال
In the civil-law countries, such as the Netherlands, criminal law is "inquisitional" where:

A) The judge takes an active role in "finding the truth"
B) The judge takes a more passive role, with "truth-finding" assigned to prosecution and defense
C) The judge and attorneys from both prosecution and defense meet in private chambers to determine guilt or innocence.
D) The public serves as judge, with prosecution and defense presenting their case in a public forum.
سؤال
England became the first European country to enact a law to address computer crime specifically. This law - the Computer Misuse Act - was enacted in:

A) 1985
B) 1990
C) 1995
D) 2000
سؤال
In the UK, prosecution of child pornography falls under what Act?

A) The Protection of Children Act of 1978
B) The Crimes Against Children Act of 1996
C) The Council of Europe Convention on Cybercrime
D) None of the above
سؤال
Virtual child pornography is illegal under UK law.
سؤال
In the UK, downloading child pornography is equated with "making" illegal material according to the legal definition.
سؤال
The criminal justice systems in the EU and US work in essentially the same way.
سؤال
The English Sentencing Advisory Panel (SAP) categorized the increasing seriousness of child pornography material into five levels. Which of the following is considered the worst, level 5?

A) Sadism or bestiality
B) Sexual activity between children or solo masturbation by a child
C) Non-penetrative sexual activity between adults and children
D) Penetrative sexual activity between adults and children
سؤال
Hacking is an example of:

A) Computer-assisted crime
B) Computer-related crime
C) Computer-integrity crime
D) Computer malfeasance crime
سؤال
In Ireland, the Non-Fatal Offences Against the State Act of 1997 specifically addresses:

A) Computerized welfare fraud
B) Cyberbullying
C) Nigerian scams
D) Hacking
سؤال
In the UK, an application for a search warrant must include which of the following?

A) Reasonable grounds for believing that a crime has been committed
B) A specific description of the premises to be searched
C) Which law has been broken
D) All of the above
سؤال
In England, child prostitution and pornography are scheduled offenses to the English
Serious Crime Act 2007.
سؤال
In the EU, computer-assisted crimes consist of those crimes which cannot be committed in the absence of computers or computer networks.
سؤال
In the EU, content-related crimes relate to traditional offenses where computers are tools rather than targets but, unlike computer-assisted crimes it is the content of data rather than the result of an action that is the core of the offense.
سؤال
Data interference is the intentional "serious hindering without right to the functioning of a computer system."
سؤال
In the EU, crimes like illegal access, illegal interception, and data interference are categorized as computer-integrity crimes.
سؤال
In Irish computer crime law, jurisdiction is often integrated into the legislative section setting out the offense.
سؤال
European law is civil-based, whereas the common-law countries are considered an adversarial system.
سؤال
According to the CoE Convention on Cybercrime, it is not illegal to break into a computer provided the intruder does not cause any damage.
سؤال
"Online grooming" was criminalized by the Lanzarote Convention.
سؤال
Scotland has specific legislation addressing cyberbullying.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Cybercrime Law: a European Perspective
1
Forgery is an example of:

A) Computer assisted crime
B) Computer-related crime
C) Computer-integrity crime
D) Computer malfeasance crime
A
2
Which of the following courts is located in France?

A) Court of First Instance
B) European Court of Justice
C) Le Conseil d'État
D) All of the above
D
3
An example of a content-related crime would be:

A) Cyberstalking
B) Child pornography
C) Hacking
D) None of the above
B
4
In the UK, it is legal to possess child pornography but illegal to distribute it to others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
All cybercrimes can be addressed using existing laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
The EU Framework Decision makes illegal access to information systems (intentional, without right). Member states are required to ensure that this is:

A) Handled as a civil court issue
B) Punishable as a criminal offense
C) The responsibility of the owner of the computer system
D) Handled as a reprimand only
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Netherlands claims universal jurisdiction for the crime of:

A) Attacks on the King
B) Transnational computer crimes
C) Terrorist network activity
D) Malware distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Council of Europe Convention on Cybercrime introduces three categories of computer offense. The most serious category is:

A) Computer-assisted crimes
B) Computer-related crimes
C) Computer-integrity crimes
D) Computer malfeasance crimes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?

A) Search warrants
B) Treaties
C) Presidential intervention
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
Jurisdiction claims may be based on:

A) Location of the perpetrator's computer
B) Location of the victim's computer
C) Location of intermediary computers
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
In the civil-law countries, such as the Netherlands, criminal law is "inquisitional" where:

A) The judge takes an active role in "finding the truth"
B) The judge takes a more passive role, with "truth-finding" assigned to prosecution and defense
C) The judge and attorneys from both prosecution and defense meet in private chambers to determine guilt or innocence.
D) The public serves as judge, with prosecution and defense presenting their case in a public forum.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
England became the first European country to enact a law to address computer crime specifically. This law - the Computer Misuse Act - was enacted in:

A) 1985
B) 1990
C) 1995
D) 2000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
In the UK, prosecution of child pornography falls under what Act?

A) The Protection of Children Act of 1978
B) The Crimes Against Children Act of 1996
C) The Council of Europe Convention on Cybercrime
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
Virtual child pornography is illegal under UK law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
In the UK, downloading child pornography is equated with "making" illegal material according to the legal definition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
The criminal justice systems in the EU and US work in essentially the same way.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
The English Sentencing Advisory Panel (SAP) categorized the increasing seriousness of child pornography material into five levels. Which of the following is considered the worst, level 5?

A) Sadism or bestiality
B) Sexual activity between children or solo masturbation by a child
C) Non-penetrative sexual activity between adults and children
D) Penetrative sexual activity between adults and children
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
Hacking is an example of:

A) Computer-assisted crime
B) Computer-related crime
C) Computer-integrity crime
D) Computer malfeasance crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
In Ireland, the Non-Fatal Offences Against the State Act of 1997 specifically addresses:

A) Computerized welfare fraud
B) Cyberbullying
C) Nigerian scams
D) Hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
In the UK, an application for a search warrant must include which of the following?

A) Reasonable grounds for believing that a crime has been committed
B) A specific description of the premises to be searched
C) Which law has been broken
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
In England, child prostitution and pornography are scheduled offenses to the English
Serious Crime Act 2007.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
In the EU, computer-assisted crimes consist of those crimes which cannot be committed in the absence of computers or computer networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
In the EU, content-related crimes relate to traditional offenses where computers are tools rather than targets but, unlike computer-assisted crimes it is the content of data rather than the result of an action that is the core of the offense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
Data interference is the intentional "serious hindering without right to the functioning of a computer system."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
In the EU, crimes like illegal access, illegal interception, and data interference are categorized as computer-integrity crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
In Irish computer crime law, jurisdiction is often integrated into the legislative section setting out the offense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
European law is civil-based, whereas the common-law countries are considered an adversarial system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
According to the CoE Convention on Cybercrime, it is not illegal to break into a computer provided the intruder does not cause any damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
"Online grooming" was criminalized by the Lanzarote Convention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
Scotland has specific legislation addressing cyberbullying.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.