Deck 16: Today Apos;s Challenges the Terrorist Threat Cyber Crime and White Collar Crime

ملء الشاشة (f)
exit full mode
سؤال
Today,approximately border patrol agents are stationed at the Mexican border.

A)2,500
B)9,000
C)21,500
D)40,000
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Corporate violence is physical harm to individuals or the environment that occurs as the result of corporate policies or decision making.
سؤال
The sale of pornographic materials to a fifty-year old is always considered a crime against the community.
سؤال
Terrorist suspects were detained indefinitely as enemy combatants in accordance with the

A)military model.
B)criminal justice model.
C)homeland security model.
D)intelligence model.
سؤال
One way white-collar criminals to carry out their crimes is through the use of deception.
سؤال
Terrorists are exploiting new communications technology,including the Internet,to mount global campaigns.
سؤال
Which of the following is not organized under the Department of Homeland Security?

A)FEMA.
B)the FBI.
C)the U.S.Secret Service.
D)the U.S.Coast Guard.
سؤال
A virus is a self-replicating software program that attaches itself to a host file to move from one computer to the next.
سؤال
All of the following have been successfully smuggled across U.S.borders,EXCEPT:

A)high-level terrorist suspects.
B)methamphetamine.
C)firearms.
D)illegal immigrants.
سؤال
Which response model treats terrorism like any other criminal offense?

A)Intelligence
B)Military
C)Justice
D)Criminal justice
سؤال
Major differences between criminal court and military tribunals include all of the following EXCEPT

A)military tribunals do not use juries.
B)defendants are not entitled to representation by counsel in military tribunals.
C)military tribunals are not bound by the rules of evidence.
D)military tribunals do not require a unanimous verdict
سؤال
Jihad refers to all of the following except

A)the struggle against evil in oneself.
B)the struggle against evil outside of oneself.
C)the struggle against nonbelievers.
D)holy war.
سؤال
Jihad translates into "holy war."
سؤال
A weapon of mass destruction has the capacity to cause large number of casualties or significant property damage.
سؤال
The military model regards terrorist activities as threats to the security of the state rather than as criminal acts.
سؤال
A worm cannot exist as a separate entity and must attach itself to another program to move through a network.
سؤال
Which of the following is an example of domestic terrorism?

A)The bombing of the U.S.S.Cole
B)The attempted bombing of Times Square by a U.S.citizen
C)The attacks on U.S.Embassies in Northern Africa
D)Aggression against U.S.soldiers living on a military base on Afghanistan
سؤال
Which of the following is true regarding today's terrorist organizations?

A)Terrorists have developed efficient organizations patterned after the small business model
B)Terror groups are usually led by a single,charismatic leader
C)Terror groups are tightly organized and centralized in structure
D)Individual terrorists rely on word of mouth between operatives
سؤال
The homeland security presence on the Mexican border has never been greater than it is now.
سؤال
Which response model considers terrorism a threat to the security of the state rather than a criminal act?

A)Intelligence
B)Military
C)Justice
D)Criminal justice
سؤال
In order to protect yourself from identity theft,the text suggests all of the following except

A)secure your mailbox.
B)remove your name from mailing lists.
C)do not enter chat rooms or join social networking sites.
D)share information only when necessary.
سؤال
Which of the following is NOT one of the three main techniques used by white collar criminals to carry out their crimes?

A)Deception.
B)Abuse of trust.
C)Concealment.
D)Violence.
سؤال
A is a person who uses one computer to break into another.

A)hacker
B)electronic theif
C)piraate
D)spammer
سؤال
is the criminal action of being involved in an organized effort to engage in illegal business transactions.

A)Extortion
B)Influence peddling
C)Racketeering
D)Insider trading
سؤال
When consumers purchase merchandise online directly from an online auction site,and that merchandise is never delivered,this is

A)online auction fraud
B)identity theft
C)cyber theft
D)online retail fraud
سؤال
Which type of software program is capable of reproducing itself as it spreads from one computer to another?

A)Spam
B)Cookie
C)Worm
D)Botnet
سؤال
By 2010,nearly 300 billion junk-emails,or spam messages were being sent each day,comprising of all emails.

A)97%
B)83%
C)52%
D)19%
سؤال
All of the following are vulnerable to piracy except

A)books.
B)films.
C)stocks.
D)software.
سؤال
What percentage of all websites is estimated to have pornographic content.

A)2%
B)12%
C)23%
D)49%
سؤال
In an effort to collect valuable data and consumer information many websites utilize

A)botnets.
B)worms.
C)cookies.
D)bytes.
سؤال
Cyberstalking and cyberbullying are both examples of common offline behavior that has been exacerbated by all of the following except

A)emails.
B)chat rooms.
C)text messages.
D)bomb threats.
سؤال
The Deepwater Horizon oil spill off the coast of Louisiana in April 2010,which caused a great deal harm,is an example of

A)deception
B)corporate violence.
C)racketeering.
D)fraud.
سؤال
Cyberstalking occurs when

A)a person inadvertently views offensive material online.
B)a person inadvertently sends an unintended recipient an email.
C)a person uses a computer or electronic device to carry out his or her harassment.
D)a person sends pornographic material over the Internet and the recipient is not at least 18 years of age.
سؤال
The Internet is conducive to child pornography for all of the following reasons EXCEPT:

A)Low-cost.
B)Speed.
C)Security.
D)Anonymity..
سؤال
The unauthorized copying and use of the property is called

A)insider trading
B)cyber stealing
C)piracy
D)fraud
سؤال
Which of the following is a form of identity theft?

A)Using digital currency
B)Software piracy
C)Hacking
D)Phishing
سؤال
About illegal aliens are living in the United States.

A)500,000
B)3,800,000
C)6,000,000
D)11,200,000
سؤال
Illegal aliens can be removed from the United States at any time as the result of a legal proceeding called

A)compliance.
B)conviction.
C)removal.
D)revocation.
سؤال
The main goal of cyber forensics is to .

A)Collect witness statements.
B)Gather digital evidence.
C)Facilitate investigations over multiple jurisdictions.
D)Elicit confessions.
سؤال
Today,the dominant strain of terrorism mixes political goals with very strong

A)ethnic affiliations.
B)religious affiliations.
C)affiliations to particular nations.
D)cultural affiliations.
سؤال
Khan's online magazine is most significantly an example of what recent trend in international terrorism?

A)exploitation of new communications technology
B)more efficient methods of financing
C)structural organization based on the small-business model
D)development of more efficient organizations
سؤال
China's online policy would lead to less

A)anonymity
B)speed
C)security
D)commerce
سؤال
Given the venue where Shehadeh was convicted,which model would apply in this instance?

A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
سؤال
The preface would suggest that the United States viewed Shehadeh as a(n)

A)American citizen with due process rights
B)enemy combatant
C)criminal combatant
D)civilian combatant
سؤال
In what venue was Shehadeh convicted?

A)military tribunal
B)criminal court
C)civil court
D)joint military-civilian court
سؤال
Controlling the flow of good and services across U.S.borders is the responsibility of ,an agency located within the Department of Homeland Security.
سؤال
China's online policy would potentially diminish the need for people with skills in what field?

A)cyber forensics
B)DNA forensics
C)crime scene investigators
D)criminal investigation
سؤال
Terrorists have evolved into ,free of control by or allegiance to any nation.
سؤال
A court operated by the military rather than the criminal justice system is a .
سؤال
Shehadeh's desire to join a terrorist organization would likely be an example of

A)the exploitation of new communications technology
B)more efficient methods of financing
C)a philosophy of bigger means better
D)self-radicalization
سؤال
China's online policy would have little immediate effect on incidents of

A)corporate violence
B)phishing
C)spam
D)cyber fraud
سؤال
In the criminal justice model, is treated like any other crime.
سؤال
Given the information in the preface,we can conclude that Shehadeh is a(n)

A)American citizen
B)enemy combatant
C)foreign national
D)There is not enough information to judge.
سؤال
A is official authorization allowing a person to travel within the authorizing country.
سؤال
The use of a drone strike suggests that the United States viewed Khan as

A)an American citizen with due process rights
B)an enemy combatant
C)a criminal combatant
D)a civilian combatant
سؤال
Khan was killed by an American drone strike in Yemen in 2011.Which model would apply in this instance?

A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
سؤال
In terms of counter terrorism,Samir Khan's online magazine,Inspire,would suffer most from

A)a cyberattack
B)intellectual piracy
C)corporate violence
D)government regulation
سؤال
Khan's magazine,Inspire,presumably would inspire individuals toward

A)jihad
B)religious pilgrimages
C)corporate sponsorship
D)government deregulation
سؤال
American online policies would likely allow for more than China's.

A)cyber crime
B)cyberattacks
C)cyber fraud
D)All of these choices
سؤال
Advocates of free speech would prefer which country's Internet policy?

A)United States
B)China
C)Both country's policies are about the same.
D)There is not enough information provided in the preface to make a conclusion.
سؤال
A is any wrongful act that is directed against computers and computer parts or that involves wrongful use or abuse of computers or software.
سؤال
The theft of a victim's personal information is .
سؤال
is fraud committed over the Internet.
سؤال
refers to three kinds of struggle,or exertion,required of the Muslim faithful.
سؤال
A crime that takes place in the virtual community of the Internet is a .
سؤال
The is legislation which makes it a crime to exchange .any material online that would cause another to believe than a minor is engaged in actual or simulated sex.
سؤال
The application of science for finding and utilizing evidence of cyber crime is .
سؤال
Books,films,and music are examples of .
سؤال
A virus is another form of _____.
سؤال
is the state of operating in accordance with governmental standards.
سؤال
Sending unsolicited e-mails that falsely claim to be from a legitimate organization in an attempt to acquire sensitive information from the recipient is called .
سؤال
A person who uses one computer to break into another is a(n) .
سؤال
An individual who has supported foreign terrorist organizations engaged in hostilities against the military operations of the United States is considered an .
سؤال
refers to acts of terror without direct foreign involvement that take place within the territorial jurisdiction of the United States.
سؤال
The goal of regulation is ,or the following of regulatory guidelines.
سؤال
A is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
سؤال
occurs in the business world when somebody within a company sells influence,power,or information to a person outside the company who can benefit.
سؤال
A(n) is a person who is not a citizen of the country in which he or she is located.
سؤال
Terrorists have developed more efficient organizations based on the model.
سؤال
Under the model of homeland security,terrorism is treated like any other crime.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/90
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Today Apos;s Challenges the Terrorist Threat Cyber Crime and White Collar Crime
1
Today,approximately border patrol agents are stationed at the Mexican border.

A)2,500
B)9,000
C)21,500
D)40,000
C
2
Corporate violence is physical harm to individuals or the environment that occurs as the result of corporate policies or decision making.
True
3
The sale of pornographic materials to a fifty-year old is always considered a crime against the community.
False
4
Terrorist suspects were detained indefinitely as enemy combatants in accordance with the

A)military model.
B)criminal justice model.
C)homeland security model.
D)intelligence model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
5
One way white-collar criminals to carry out their crimes is through the use of deception.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
6
Terrorists are exploiting new communications technology,including the Internet,to mount global campaigns.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is not organized under the Department of Homeland Security?

A)FEMA.
B)the FBI.
C)the U.S.Secret Service.
D)the U.S.Coast Guard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
8
A virus is a self-replicating software program that attaches itself to a host file to move from one computer to the next.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
9
All of the following have been successfully smuggled across U.S.borders,EXCEPT:

A)high-level terrorist suspects.
B)methamphetamine.
C)firearms.
D)illegal immigrants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which response model treats terrorism like any other criminal offense?

A)Intelligence
B)Military
C)Justice
D)Criminal justice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
11
Major differences between criminal court and military tribunals include all of the following EXCEPT

A)military tribunals do not use juries.
B)defendants are not entitled to representation by counsel in military tribunals.
C)military tribunals are not bound by the rules of evidence.
D)military tribunals do not require a unanimous verdict
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
12
Jihad refers to all of the following except

A)the struggle against evil in oneself.
B)the struggle against evil outside of oneself.
C)the struggle against nonbelievers.
D)holy war.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
13
Jihad translates into "holy war."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
14
A weapon of mass destruction has the capacity to cause large number of casualties or significant property damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
15
The military model regards terrorist activities as threats to the security of the state rather than as criminal acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
16
A worm cannot exist as a separate entity and must attach itself to another program to move through a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is an example of domestic terrorism?

A)The bombing of the U.S.S.Cole
B)The attempted bombing of Times Square by a U.S.citizen
C)The attacks on U.S.Embassies in Northern Africa
D)Aggression against U.S.soldiers living on a military base on Afghanistan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is true regarding today's terrorist organizations?

A)Terrorists have developed efficient organizations patterned after the small business model
B)Terror groups are usually led by a single,charismatic leader
C)Terror groups are tightly organized and centralized in structure
D)Individual terrorists rely on word of mouth between operatives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
19
The homeland security presence on the Mexican border has never been greater than it is now.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which response model considers terrorism a threat to the security of the state rather than a criminal act?

A)Intelligence
B)Military
C)Justice
D)Criminal justice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
21
In order to protect yourself from identity theft,the text suggests all of the following except

A)secure your mailbox.
B)remove your name from mailing lists.
C)do not enter chat rooms or join social networking sites.
D)share information only when necessary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is NOT one of the three main techniques used by white collar criminals to carry out their crimes?

A)Deception.
B)Abuse of trust.
C)Concealment.
D)Violence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
23
A is a person who uses one computer to break into another.

A)hacker
B)electronic theif
C)piraate
D)spammer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
24
is the criminal action of being involved in an organized effort to engage in illegal business transactions.

A)Extortion
B)Influence peddling
C)Racketeering
D)Insider trading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
25
When consumers purchase merchandise online directly from an online auction site,and that merchandise is never delivered,this is

A)online auction fraud
B)identity theft
C)cyber theft
D)online retail fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which type of software program is capable of reproducing itself as it spreads from one computer to another?

A)Spam
B)Cookie
C)Worm
D)Botnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
27
By 2010,nearly 300 billion junk-emails,or spam messages were being sent each day,comprising of all emails.

A)97%
B)83%
C)52%
D)19%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
28
All of the following are vulnerable to piracy except

A)books.
B)films.
C)stocks.
D)software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
29
What percentage of all websites is estimated to have pornographic content.

A)2%
B)12%
C)23%
D)49%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
30
In an effort to collect valuable data and consumer information many websites utilize

A)botnets.
B)worms.
C)cookies.
D)bytes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
31
Cyberstalking and cyberbullying are both examples of common offline behavior that has been exacerbated by all of the following except

A)emails.
B)chat rooms.
C)text messages.
D)bomb threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
32
The Deepwater Horizon oil spill off the coast of Louisiana in April 2010,which caused a great deal harm,is an example of

A)deception
B)corporate violence.
C)racketeering.
D)fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
33
Cyberstalking occurs when

A)a person inadvertently views offensive material online.
B)a person inadvertently sends an unintended recipient an email.
C)a person uses a computer or electronic device to carry out his or her harassment.
D)a person sends pornographic material over the Internet and the recipient is not at least 18 years of age.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
34
The Internet is conducive to child pornography for all of the following reasons EXCEPT:

A)Low-cost.
B)Speed.
C)Security.
D)Anonymity..
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
35
The unauthorized copying and use of the property is called

A)insider trading
B)cyber stealing
C)piracy
D)fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is a form of identity theft?

A)Using digital currency
B)Software piracy
C)Hacking
D)Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
37
About illegal aliens are living in the United States.

A)500,000
B)3,800,000
C)6,000,000
D)11,200,000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
38
Illegal aliens can be removed from the United States at any time as the result of a legal proceeding called

A)compliance.
B)conviction.
C)removal.
D)revocation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
39
The main goal of cyber forensics is to .

A)Collect witness statements.
B)Gather digital evidence.
C)Facilitate investigations over multiple jurisdictions.
D)Elicit confessions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
40
Today,the dominant strain of terrorism mixes political goals with very strong

A)ethnic affiliations.
B)religious affiliations.
C)affiliations to particular nations.
D)cultural affiliations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
41
Khan's online magazine is most significantly an example of what recent trend in international terrorism?

A)exploitation of new communications technology
B)more efficient methods of financing
C)structural organization based on the small-business model
D)development of more efficient organizations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
42
China's online policy would lead to less

A)anonymity
B)speed
C)security
D)commerce
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
43
Given the venue where Shehadeh was convicted,which model would apply in this instance?

A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
44
The preface would suggest that the United States viewed Shehadeh as a(n)

A)American citizen with due process rights
B)enemy combatant
C)criminal combatant
D)civilian combatant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
45
In what venue was Shehadeh convicted?

A)military tribunal
B)criminal court
C)civil court
D)joint military-civilian court
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
46
Controlling the flow of good and services across U.S.borders is the responsibility of ,an agency located within the Department of Homeland Security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
47
China's online policy would potentially diminish the need for people with skills in what field?

A)cyber forensics
B)DNA forensics
C)crime scene investigators
D)criminal investigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
48
Terrorists have evolved into ,free of control by or allegiance to any nation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
49
A court operated by the military rather than the criminal justice system is a .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
50
Shehadeh's desire to join a terrorist organization would likely be an example of

A)the exploitation of new communications technology
B)more efficient methods of financing
C)a philosophy of bigger means better
D)self-radicalization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
51
China's online policy would have little immediate effect on incidents of

A)corporate violence
B)phishing
C)spam
D)cyber fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
52
In the criminal justice model, is treated like any other crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
53
Given the information in the preface,we can conclude that Shehadeh is a(n)

A)American citizen
B)enemy combatant
C)foreign national
D)There is not enough information to judge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
54
A is official authorization allowing a person to travel within the authorizing country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
55
The use of a drone strike suggests that the United States viewed Khan as

A)an American citizen with due process rights
B)an enemy combatant
C)a criminal combatant
D)a civilian combatant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
56
Khan was killed by an American drone strike in Yemen in 2011.Which model would apply in this instance?

A)military tribunal model
B)military justice model
C)criminal justice model
D)civilian court model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
57
In terms of counter terrorism,Samir Khan's online magazine,Inspire,would suffer most from

A)a cyberattack
B)intellectual piracy
C)corporate violence
D)government regulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
58
Khan's magazine,Inspire,presumably would inspire individuals toward

A)jihad
B)religious pilgrimages
C)corporate sponsorship
D)government deregulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
59
American online policies would likely allow for more than China's.

A)cyber crime
B)cyberattacks
C)cyber fraud
D)All of these choices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
60
Advocates of free speech would prefer which country's Internet policy?

A)United States
B)China
C)Both country's policies are about the same.
D)There is not enough information provided in the preface to make a conclusion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
61
A is any wrongful act that is directed against computers and computer parts or that involves wrongful use or abuse of computers or software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
62
The theft of a victim's personal information is .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
63
is fraud committed over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
64
refers to three kinds of struggle,or exertion,required of the Muslim faithful.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
65
A crime that takes place in the virtual community of the Internet is a .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
66
The is legislation which makes it a crime to exchange .any material online that would cause another to believe than a minor is engaged in actual or simulated sex.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
67
The application of science for finding and utilizing evidence of cyber crime is .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
68
Books,films,and music are examples of .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
69
A virus is another form of _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
70
is the state of operating in accordance with governmental standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
71
Sending unsolicited e-mails that falsely claim to be from a legitimate organization in an attempt to acquire sensitive information from the recipient is called .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
72
A person who uses one computer to break into another is a(n) .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
73
An individual who has supported foreign terrorist organizations engaged in hostilities against the military operations of the United States is considered an .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
74
refers to acts of terror without direct foreign involvement that take place within the territorial jurisdiction of the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
75
The goal of regulation is ,or the following of regulatory guidelines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
76
A is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
77
occurs in the business world when somebody within a company sells influence,power,or information to a person outside the company who can benefit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
78
A(n) is a person who is not a citizen of the country in which he or she is located.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
79
Terrorists have developed more efficient organizations based on the model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
80
Under the model of homeland security,terrorism is treated like any other crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.