Deck 14: Homeland Security and Cyber Crime

ملء الشاشة (f)
exit full mode
سؤال
Osama bin Laden's al Qaeda group has its origins in:

A)Iraq
B)Saudi Arabia
C)Afghanistan
D)Pakistan
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Terrorists have evolved into ____, free of control by or allegiance to any nation, and use violence to further political goals such as the formation or destruction of a particular government.

A)Nonstate actors
B)Enemy combatants
C)Unlawful combatants
D)al Qaeda
سؤال
The lead federal agency in the investigation of all terrorism related matters is the:

A)U.S.Secret Service
B)Federal Bureau of Investigation
C)National Security Agency
D)Central Intelligence Agency
سؤال
The AEDPA was passed in response to:

A)September 11, 2001
B)The Oklahoma City Bombing
C)Pearl Harbor
D)The anthrax mailings
سؤال
Which agency handles the "paperwork" side of U.S.immigration law?

A)The U.S.Customs and Border Patrol
B)The Immigration and Naturalization Services
C)The Transportation Security Administration
D)The United States Citizenship and Immigration Services
سؤال
According to homeland security expert Brian Jenkins, all of the following are trends in terrorism EXCEPT:

A)Terrorist attacks are becoming more violent
B)Terrorists are becoming more organized
C)The number of nations being controlled by terror groups has risen
D)Terrorist are getting better at mounting global campaigns
سؤال
Under this model, terrorism is treated like any other crime, and the law enforcement, court, and correctional systems work together to deter terrorist activity through the threat of arrest and punishment:

A)Criminal Justice Model
B)Military Model
C)Intelligence Model
D)War on Terror Model
سؤال
The term al Qaeda means:

A)The base
B)The struggle
C)Holy war
D)Terrorist
سؤال
The intelligence agency that is responsible for protecting U.S.government communications and producing intelligence by monitoring foreign communications is the:

A)Central Intelligence Agency
B)National Security Agency
C)Federal Bureau of Investigation
D)U.S.Secret Service
سؤال
Which of the following is NOT a duty of first responders?

A)Securing the scene
B)Investigating reports of terrorist threats
C)Rescuing the injured
D)Retrieving those who have been killed
سؤال
Which of the following is NOT one of the struggles or exertions (Jihad) required of the Muslim faith?

A)The struggle against modernization
B)The struggle against evil in oneself
C)The struggle against non-believers
D)The struggle against evil outside of oneself
سؤال
Placing undercover agents in a position to gain information from hostile foreign intelligence services is a form of:

A)Electronic surveillance
B)Human-source collection
C)Open-source collection
D)Counterintelligence
سؤال
The ____ regards terrorist activities as threats to the security of the state rather than as criminal acts.

A)Criminal Justice Model
B)Intelligence Model
C)Military Model
D)War on Terror Model
سؤال
The term Jihad means:

A)The base
B)The struggle
C)Holy war
D)Terrorist
سؤال
Which of the following agencies is NOT part of the Department of Homeland Security?

A)The Federal Bureau of Investigation
B)The U.S.Customs and Border Protection
C)The U.S.Coast Guard
D)The U.S.Secret Service
سؤال
Prior to the formation of the Department of Homeland Security, disaster management at the federal level was primarily the responsibility of:

A)The Federal Bureau of Investigation (FBI)
B)The Federal Emergency Management Agency (FEMA)
C)The Red Cross
D)The National Guard
سؤال
The recruitment of foreign agents and interviews with people who have particular knowledge about areas of interest is known as:

A)Human- source collection
B)Open- source collection
C)Counterintelligence
D)Surveillance
سؤال
Which piece of legislation gives federal law enforcement officers the power to arrest and prosecute any individual who provides "material support or resources" to a "terrorist organization?"

A)Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B)Criminal Justice Model
C)The Liberty Seven
D)USA Patriot Act
سؤال
The primary purpose of the AEDPA is to fight terrorism by

A)Easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents quicker access to terror suspects
B)Creating harsher penalties for those convicted of terrorist acts
C)Cutting off the financial support funneled to terrorist organizations
D)Establishing the Department of Homeland Security
سؤال
The ____ is a critical legal tool used in efforts to combat terrorism, because it permits law enforcement agents to arrest suspects even though no crime, in the traditional sense of the word, has taken place and no evident harm has been caused.

A)Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B)Criminal Justice Model
C)The Liberty Seven
D)USA Patriot Act
سؤال
Which of the following occurs in a military tribunal?

A)All members of the panel or jury must agree to convict the individual
B)The defendant has a right to a trial by a jury
C)A panel of military officers acts in place of the judge and jury and decides questions of "both fact and law"
D)The traditional rules of evidence apply
سؤال
In a military tribunal, there is no right to trial by jury, as guaranteed by the ____ Amendment.

A)Fourth
B)Fifth
C)Sixth
D)Eighth
سؤال
Which Amendment protects against unreasonable searches and seizures?

A)Fourth
B)Fifth
C)Sixth
D)Eighth
سؤال
The theft of personal information is known as _____________.

A)Cyber theft
B)Cyberstalking
C)Cyber fraud
D)Identity theft
سؤال
Because detainees being held at Guantanamo Bay were seized during a military campaign and were not American citizens, the ____ Amendment was not believed to apply to their incarceration.

A)Fourth
B)Fifth
C)Sixth
D)Eighth
سؤال
Criminal activity which occurs via a computer in the virtual community of the Internet is a(n) ____________.

A)Cyber crime
B)Computer crime
C)White collar crime
D)Victimless crime
سؤال
The connection between illegal aliens and terrorism in this country is:

A)Minimal
B)Nonexistent
C)Undeniable
D)Weak
سؤال
Major differences between criminal courts and military tribunals include all of the following EXCEPT:

A)Military tribunals do not use juries
B)Defendants are not entitled to representation in military tribunals
C)Military tribunals are not bound by the rules of evidence
D)Military tribunals are not required to convict "beyond a reasonable doubt"
سؤال
A document issued by the U.S.State Department that indicates the conditions under which the holder can remain in the United States is a ______________.

A)Passport
B)Identification card
C)Driver's License
D)Visa
سؤال
Each year, an estimated ____ non-U.S.citizens, unable to secure visas, enter the country illegally by crossing the large, unregulated stretches of our borders with Mexico and Canada.

A)Thousands
B)Tens of thousands
C)Hundreds of thousands
D)Millions
سؤال
A person who takes part in armed hostilities but who does not belong to the armed forces of a sovereign nation and, therefore, is not afforded protection under the Geneva Conventions is a(n):

A)Terrorist
B)State actor
C)Unlawful combatant
D)Enemy of the state
سؤال
In 2009, spam accounted for approximately ____________ of all emails.

A)7%
B)44%
C)86%
D)97%
سؤال
___________ of all global computer attacks originate in the United States.

A)5%
B)18%
C)23%
D)55%
سؤال
Any wrongful act that is directed against computers and computer parts or involves the abuse of software is a(n)

A)Cybercrime
B)White collar crime
C)Property crime
D)Computer crime
سؤال
A software program that is capable of reproducing itself as it spreads from one computer to the next is a(n) ________________________.

A)Virus
B)Botnet
C)Worm
D)Spam
سؤال
In 2009, more than _______________ Americans reported victims of identity fraud.

A)250,000
B)1 million
C)3.5 million
D)11 million
سؤال
For the sake of security, the majority of U.S.citizens favor:

A)The search of people at airports
B)The inspection of mail and other documents
C)The monitoring of phone calls
D)The monitoring of email
سؤال
When the perpetrator uses the internet or some form of electronic communication to harass and stalk the victim, this is known as ______________________.

A)Phishing
B)Intellectual property theft
C)Cyberbullying
D)Cyberstalking
سؤال
When a consumer orders an item online and it is never delivered, this is an example of ___________.

A)White collar crime
B)Cyber theft
C)Online retail fraud
D)Online auction fraud
سؤال
The ____ Amendment holds that no person shall be deprived of life, liberty, or property without due process of law.

A)Fourth
B)Fifth
C)Sixth
D)Eighth
سؤال
A botnet is a form of malware that is capable of reproducing itself when attached to an "infested" host file.
سؤال
The most successful way to protect computer information is to:

A)Avoid placing it on the Internet
B)Create a strong password
C)Encrypt it
D)Back up all data in two locations
سؤال
The AEDPA and the Patriot Act are both part of America's criminal justice model response to terrorism.
سؤال
AEDPA amended the law to allow the FBI to obtain warrants for "terrorism" investigations, "chemical weapons" investigations, or "computer fraud and abuse" investigations as long as agents can prove that such actions have a significant purpose.
سؤال
Most cyber crimes are new crimes.
سؤال
Nearly one-third of teens with Internet access report being the victims of cyberbullying.
سؤال
The Sixth Amendment guarantees only U.S.Citizens the right to due process.
سؤال
The criminal justice model response to terrorism involves treating terrorist activities as a threat to the security of the state rather than as criminal acts.
سؤال
Identity theft existed prior to the Internet.
سؤال
The ___________ has/have the primary responsibility for enforcing all federal criminal statutes involving computer crimes.

A)Secret Service
B)FBI
C)U.S.Marshals
D)ICE
سؤال
The goal for many law enforcement agencies is not to solve crimes after they have occurred, but to prevent them from happening.
سؤال
Terrorists have evolved into nonstate actors, free of control by or allegiance to any nation.
سؤال
Since September 11, 2001, the Federal Bureau of Investigation (FBI), a branch of the Department of Justice, has been the "lead federal agency" for all terrorism-related matters.
سؤال
The Sixth Amendment says that federal crimes should be tried:

A)In the district in which the offense was committed
B)In the district where the defendant resides
C)In the district where the victim resides
D)In Washington, D.C.
سؤال
The Antiterrorism and Effective Death Penalty Act (AEDPA) was passed in response to the 1995 truck bombing of the Alfred P.Murrah Federal Building in Oklahoma City, Oklahoma.
سؤال
Counterintelligence involves placing undercover agents in a position to gain information from hostile foreign intelligence services.
سؤال
The main goal of cyber forensics is to:

A)Gather digital evidence
B)Control the flow of images onto the Internet
C)Prosecute hackers
D)Educate citizens on the power of encryption
سؤال
First responders are primary local law enforcement officers, firefighters and emergency medical technicians.
سؤال
Jihad means holy war.
سؤال
The application of computer technology to finding and utilizing evidence of cyber crimes is ______________.

A)Digital investigation
B)Cyber forensics
C)High-tech policing
D)Preventive policing
سؤال
Explain how American law enforcement agencies have used "preventive policing" to combat terrorism.
سؤال
Discuss the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA).Why is the AEDPA such an important legal tool against terrorists?
سؤال
Describe the primary goals of an intelligence agency and indicate how it differs from an agency that focuses solely on law enforcement.
سؤال
An act of terrorism that is practiced within one's own country is ________________.
سؤال
Identify and discuss three important trends in international terrorism.
سؤال
The term ___________________ refers to the facilities and systems that provide the daily necessities of modern life, such as electric power, food, water, transportation and communication.
سؤال
____________________ is fraud committed over the Internet.
سؤال
The _________ Amendment provides that no person shall be deprived of life, liberty, or property without due process of law.
سؤال
Explain how the Patriot Act has made it easier for federal agencies to conduct searches during terrorism investigations.
سؤال
The ________________is the federal agency that has taken the lead in law enforcement efforts against cyber crime.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/70
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Homeland Security and Cyber Crime
1
Osama bin Laden's al Qaeda group has its origins in:

A)Iraq
B)Saudi Arabia
C)Afghanistan
D)Pakistan
C
2
Terrorists have evolved into ____, free of control by or allegiance to any nation, and use violence to further political goals such as the formation or destruction of a particular government.

A)Nonstate actors
B)Enemy combatants
C)Unlawful combatants
D)al Qaeda
A
3
The lead federal agency in the investigation of all terrorism related matters is the:

A)U.S.Secret Service
B)Federal Bureau of Investigation
C)National Security Agency
D)Central Intelligence Agency
B
4
The AEDPA was passed in response to:

A)September 11, 2001
B)The Oklahoma City Bombing
C)Pearl Harbor
D)The anthrax mailings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which agency handles the "paperwork" side of U.S.immigration law?

A)The U.S.Customs and Border Patrol
B)The Immigration and Naturalization Services
C)The Transportation Security Administration
D)The United States Citizenship and Immigration Services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
6
According to homeland security expert Brian Jenkins, all of the following are trends in terrorism EXCEPT:

A)Terrorist attacks are becoming more violent
B)Terrorists are becoming more organized
C)The number of nations being controlled by terror groups has risen
D)Terrorist are getting better at mounting global campaigns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
7
Under this model, terrorism is treated like any other crime, and the law enforcement, court, and correctional systems work together to deter terrorist activity through the threat of arrest and punishment:

A)Criminal Justice Model
B)Military Model
C)Intelligence Model
D)War on Terror Model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
8
The term al Qaeda means:

A)The base
B)The struggle
C)Holy war
D)Terrorist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
9
The intelligence agency that is responsible for protecting U.S.government communications and producing intelligence by monitoring foreign communications is the:

A)Central Intelligence Agency
B)National Security Agency
C)Federal Bureau of Investigation
D)U.S.Secret Service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is NOT a duty of first responders?

A)Securing the scene
B)Investigating reports of terrorist threats
C)Rescuing the injured
D)Retrieving those who have been killed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is NOT one of the struggles or exertions (Jihad) required of the Muslim faith?

A)The struggle against modernization
B)The struggle against evil in oneself
C)The struggle against non-believers
D)The struggle against evil outside of oneself
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
12
Placing undercover agents in a position to gain information from hostile foreign intelligence services is a form of:

A)Electronic surveillance
B)Human-source collection
C)Open-source collection
D)Counterintelligence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ____ regards terrorist activities as threats to the security of the state rather than as criminal acts.

A)Criminal Justice Model
B)Intelligence Model
C)Military Model
D)War on Terror Model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
14
The term Jihad means:

A)The base
B)The struggle
C)Holy war
D)Terrorist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following agencies is NOT part of the Department of Homeland Security?

A)The Federal Bureau of Investigation
B)The U.S.Customs and Border Protection
C)The U.S.Coast Guard
D)The U.S.Secret Service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
16
Prior to the formation of the Department of Homeland Security, disaster management at the federal level was primarily the responsibility of:

A)The Federal Bureau of Investigation (FBI)
B)The Federal Emergency Management Agency (FEMA)
C)The Red Cross
D)The National Guard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
17
The recruitment of foreign agents and interviews with people who have particular knowledge about areas of interest is known as:

A)Human- source collection
B)Open- source collection
C)Counterintelligence
D)Surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which piece of legislation gives federal law enforcement officers the power to arrest and prosecute any individual who provides "material support or resources" to a "terrorist organization?"

A)Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B)Criminal Justice Model
C)The Liberty Seven
D)USA Patriot Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
19
The primary purpose of the AEDPA is to fight terrorism by

A)Easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents quicker access to terror suspects
B)Creating harsher penalties for those convicted of terrorist acts
C)Cutting off the financial support funneled to terrorist organizations
D)Establishing the Department of Homeland Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ____ is a critical legal tool used in efforts to combat terrorism, because it permits law enforcement agents to arrest suspects even though no crime, in the traditional sense of the word, has taken place and no evident harm has been caused.

A)Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B)Criminal Justice Model
C)The Liberty Seven
D)USA Patriot Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following occurs in a military tribunal?

A)All members of the panel or jury must agree to convict the individual
B)The defendant has a right to a trial by a jury
C)A panel of military officers acts in place of the judge and jury and decides questions of "both fact and law"
D)The traditional rules of evidence apply
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
22
In a military tribunal, there is no right to trial by jury, as guaranteed by the ____ Amendment.

A)Fourth
B)Fifth
C)Sixth
D)Eighth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which Amendment protects against unreasonable searches and seizures?

A)Fourth
B)Fifth
C)Sixth
D)Eighth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
24
The theft of personal information is known as _____________.

A)Cyber theft
B)Cyberstalking
C)Cyber fraud
D)Identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
25
Because detainees being held at Guantanamo Bay were seized during a military campaign and were not American citizens, the ____ Amendment was not believed to apply to their incarceration.

A)Fourth
B)Fifth
C)Sixth
D)Eighth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
26
Criminal activity which occurs via a computer in the virtual community of the Internet is a(n) ____________.

A)Cyber crime
B)Computer crime
C)White collar crime
D)Victimless crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
27
The connection between illegal aliens and terrorism in this country is:

A)Minimal
B)Nonexistent
C)Undeniable
D)Weak
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
28
Major differences between criminal courts and military tribunals include all of the following EXCEPT:

A)Military tribunals do not use juries
B)Defendants are not entitled to representation in military tribunals
C)Military tribunals are not bound by the rules of evidence
D)Military tribunals are not required to convict "beyond a reasonable doubt"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
29
A document issued by the U.S.State Department that indicates the conditions under which the holder can remain in the United States is a ______________.

A)Passport
B)Identification card
C)Driver's License
D)Visa
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
30
Each year, an estimated ____ non-U.S.citizens, unable to secure visas, enter the country illegally by crossing the large, unregulated stretches of our borders with Mexico and Canada.

A)Thousands
B)Tens of thousands
C)Hundreds of thousands
D)Millions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
31
A person who takes part in armed hostilities but who does not belong to the armed forces of a sovereign nation and, therefore, is not afforded protection under the Geneva Conventions is a(n):

A)Terrorist
B)State actor
C)Unlawful combatant
D)Enemy of the state
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
32
In 2009, spam accounted for approximately ____________ of all emails.

A)7%
B)44%
C)86%
D)97%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
33
___________ of all global computer attacks originate in the United States.

A)5%
B)18%
C)23%
D)55%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
34
Any wrongful act that is directed against computers and computer parts or involves the abuse of software is a(n)

A)Cybercrime
B)White collar crime
C)Property crime
D)Computer crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
35
A software program that is capable of reproducing itself as it spreads from one computer to the next is a(n) ________________________.

A)Virus
B)Botnet
C)Worm
D)Spam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
36
In 2009, more than _______________ Americans reported victims of identity fraud.

A)250,000
B)1 million
C)3.5 million
D)11 million
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
37
For the sake of security, the majority of U.S.citizens favor:

A)The search of people at airports
B)The inspection of mail and other documents
C)The monitoring of phone calls
D)The monitoring of email
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
38
When the perpetrator uses the internet or some form of electronic communication to harass and stalk the victim, this is known as ______________________.

A)Phishing
B)Intellectual property theft
C)Cyberbullying
D)Cyberstalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
39
When a consumer orders an item online and it is never delivered, this is an example of ___________.

A)White collar crime
B)Cyber theft
C)Online retail fraud
D)Online auction fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
40
The ____ Amendment holds that no person shall be deprived of life, liberty, or property without due process of law.

A)Fourth
B)Fifth
C)Sixth
D)Eighth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
41
A botnet is a form of malware that is capable of reproducing itself when attached to an "infested" host file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
42
The most successful way to protect computer information is to:

A)Avoid placing it on the Internet
B)Create a strong password
C)Encrypt it
D)Back up all data in two locations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
43
The AEDPA and the Patriot Act are both part of America's criminal justice model response to terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
44
AEDPA amended the law to allow the FBI to obtain warrants for "terrorism" investigations, "chemical weapons" investigations, or "computer fraud and abuse" investigations as long as agents can prove that such actions have a significant purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
45
Most cyber crimes are new crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
46
Nearly one-third of teens with Internet access report being the victims of cyberbullying.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
47
The Sixth Amendment guarantees only U.S.Citizens the right to due process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
48
The criminal justice model response to terrorism involves treating terrorist activities as a threat to the security of the state rather than as criminal acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
49
Identity theft existed prior to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
50
The ___________ has/have the primary responsibility for enforcing all federal criminal statutes involving computer crimes.

A)Secret Service
B)FBI
C)U.S.Marshals
D)ICE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
51
The goal for many law enforcement agencies is not to solve crimes after they have occurred, but to prevent them from happening.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
52
Terrorists have evolved into nonstate actors, free of control by or allegiance to any nation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
53
Since September 11, 2001, the Federal Bureau of Investigation (FBI), a branch of the Department of Justice, has been the "lead federal agency" for all terrorism-related matters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
54
The Sixth Amendment says that federal crimes should be tried:

A)In the district in which the offense was committed
B)In the district where the defendant resides
C)In the district where the victim resides
D)In Washington, D.C.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
55
The Antiterrorism and Effective Death Penalty Act (AEDPA) was passed in response to the 1995 truck bombing of the Alfred P.Murrah Federal Building in Oklahoma City, Oklahoma.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
56
Counterintelligence involves placing undercover agents in a position to gain information from hostile foreign intelligence services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
57
The main goal of cyber forensics is to:

A)Gather digital evidence
B)Control the flow of images onto the Internet
C)Prosecute hackers
D)Educate citizens on the power of encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
58
First responders are primary local law enforcement officers, firefighters and emergency medical technicians.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
59
Jihad means holy war.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
60
The application of computer technology to finding and utilizing evidence of cyber crimes is ______________.

A)Digital investigation
B)Cyber forensics
C)High-tech policing
D)Preventive policing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
61
Explain how American law enforcement agencies have used "preventive policing" to combat terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
62
Discuss the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA).Why is the AEDPA such an important legal tool against terrorists?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
63
Describe the primary goals of an intelligence agency and indicate how it differs from an agency that focuses solely on law enforcement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
64
An act of terrorism that is practiced within one's own country is ________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
65
Identify and discuss three important trends in international terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
66
The term ___________________ refers to the facilities and systems that provide the daily necessities of modern life, such as electric power, food, water, transportation and communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
67
____________________ is fraud committed over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
68
The _________ Amendment provides that no person shall be deprived of life, liberty, or property without due process of law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
69
Explain how the Patriot Act has made it easier for federal agencies to conduct searches during terrorism investigations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
70
The ________________is the federal agency that has taken the lead in law enforcement efforts against cyber crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.