Deck 14: Todays Challenges in Criminal Justice

ملء الشاشة (f)
exit full mode
سؤال
_____ is the act of helping a terrorist organization by engaging in a wide range of activity that includes providing financial assistance, training, and expert advice.

A) Material support
B) Red flagging
C) Identity theft
D) Spear phishing
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Hector is a member of a terrorist organization that hacks into the traffic control system of the state of Greenville, United States. He disrupts the traffic in the state for a day, leading to many automobile accidents. This is an example of _____.

A) phishing
B) true threat
C) identity theft
D) cyberattack
سؤال
Cyberattack is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
سؤال
Which of the following terms refers to an attempt to damage or disrupt computer systems or electronic networks operated by computers?

A) Cyber fraud
B) Identity theft
C) Cyberattack
D) Corporate violence
سؤال
The Foreign Intelligence Surveillance Act requires permission from a special court to engage in surveillance, if the target is a(n):

A) employee of the armed forces of the United States.
B) individual associated with the state government.
C) foreign agent operating within the United States.
D) individual with a previous felony conviction.
سؤال
Less than 10 percent of identity theft involves the misappropriation of an existing credit-card account.
سؤال
The Brady Bill prohibits all persons from acquiring a firearm for personal purposes.
سؤال
National security letters can be used to collect:

A) records of individuals that own a federally licensed firearm.
B) medical records of individuals targeted for surveillance.
C) funds as a reparation for damages done as a result of a war.
D) financial records such as money transfers and bank accounts.
سؤال
Identity theft involves:

A) stealing personal information from a victim and using it to access his or her financial resources.
B) using one's position in an organization to steal his or her employer's funds.
C) creating a fake account in websites in order to solicit members for a donation.
D) listing a product in an auction site and refusing to send the product to the customer despite payment.
سؤال
Cyber sleuths can create a digital duplicate of a targeted hard drive, enabling them to break access codes, determine passwords, and search files.
سؤال
Which of the following examples best illustrates advance fee fraud?

A) Scott sends a fraudulent mail to hundreds of people claiming that they have won 20 million dollars in a lottery.
B) Sabina creates a fake account on a networking site and collects funds for a fictitious charitable organization.
C) Frederick lists a Van Gogh painting for auction on his website and refuses to send the product upon receiving payment.
D) Deliwear, an online shopping portal, does not deliver clothes that are ordered online by customers despite receiving payment.
سؤال
Tax evasion occurs when taxpayers underreport their taxable income.
سؤال
The preferred method of phishing is through the use of a worm.
سؤال
Which of the following is true of the Foreign Intelligence Surveillance Court?

A) It comprises eleven federal judges assigned by the chief justice of the Supreme Court.
B) It gathers records of surveillance carried out by foreign agents in the United States.
C) It prohibits electronic monitoring of suspected individuals or national security threats.
D) It comprises two federal judges assigned by the President of the United States.
سؤال
The main goal of cyber forensics is to gather digital evidence.
سؤال
A technique called keystroke logging relies on software that embeds itself in a victim's computer and records every keystroke made on that computer.
سؤال
Which of the following Supreme Court cases involved the police's warrantless seizure of phone numbers dialed from the home of a robbery suspect?

A) Muller v. Oregon
B) Browder v. Gayle
C) Smith v. Maryland
D) Batson v. Kentucky
سؤال
In the context of the Brady Bill, an applicant can be prohibited from purchasing a firearm if evidence of illegal drug addiction is uncovered.
سؤال
In which of the following Supreme Court cases did the Court strike down part of a Virginia law that prohibited all forms of cross burning?

A) Virginia v. Loving
B) Boynton v. Virginia
C) Virginia v. Black
D) Morgan v. Virginia
سؤال
Different types of malware are used to prevent a computer from being infested with viruses.
سؤال
The Brady Bill requires background checks:

A) only for those who purchase guns from gun shows or from private citizens.
B) for applicants who wish to become federally licensed firearms dealers.
C) for applicants who have a history of procuring firearms.
D) only for those who purchase guns from federally licensed firearms dealers.
سؤال
Which of the following terms refers to sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information from the recipient?

A) Phishing
B) Encryption
C) Corporate violence
D) Cyberstalking
سؤال
_____ is a practice wherein companies hire outside experts to act as hackers and attempt to gain access to their systems.

A) Smishing
B) Cyberstalking
C) Penetration testing
D) Spear phishing
سؤال
Which of the following is true of pilferage?

A) It is a more serious form of employee fraud.
B) It involves individuals stealing items from their workplaces.
C) It involves individuals resorting to illegal activity in the stock market.
D) It is a more serious form of consumer fraud.
سؤال
Which of the following is a form of phishing that is done via a phone?

A) Vishing
B) Pharming
C) Cyberstalking
D) Flagging
سؤال
Cyber stalking involves:

A) using electronic communication to cause a victim to fear for her or his safety.
B) stealing personal information from a victim and using it to access his or her financial resources.
C) faking an identity of a law enforcement officer in order to defraud victims into paying money.
D) creating a fake account in websites in order to solicit members for a donation.
سؤال
Lee receives an email from an unknown account claiming that his debit card details need to be confirmed along with the password for the purpose of verification. The details are sent, after which he then contacts the bank, which denies sending any such email. After a few days, he notices that there have been a lot of unknown transactions from his bank account. This is an example of _____.

A) cyberstalking
B) phishing
C) hacking
D) flagging
سؤال
Which of the following illustrates spear phishing?

A) Tanya clicks on a link that appears to have been emailed by her colleague that downloads a harmful software.
B) Margaret receives an email from an unknown account claiming that she has won the state lottery and asks her for her credit card information.
C) Parker receives an email from an unknown account claiming to be from a charitable organization and requests him to transfer money as a donation.
D) George opens a pornographic website on his office computer without the knowledge of his coworkers.
سؤال
_____ refers to any program that is harmful to a computer or, by extension, a computer user.

A) A glitch
B) A bug
C) Spam
D) Malware
سؤال
Which of the following is a similarity between a virus and a worm?

A) Both can replicate themselves.
B) Both need to be attached to an existing file in the computer.
C) Both can exist as independent entities.
D) Both do not affect the normal use of a computer.
سؤال
Which of the following is a problem with the background check system for the purchase of firearms?

A) It is unreliable, as it is carried out by licensed firearms dealers.
B) It relies on states to provide the federal government with mental-health information about their citizens.
C) It allows people with prior felony convictions to purchase firearms, which is dangerous to the society.
D) It makes it easier to purchase semiautomatic weapons and easier to keep firearms in the hands of the mentally ill.
سؤال
The _____ requires a person wishing to purchase a gun from a licensed firearms dealer to apply for the privilege of doing so.

A) Brady Handgun Violence Prevention Act
B) Undetectable Firearms Act
C) National Firearms Act
D) Protection of Lawful Commerce in Arms Act
سؤال
Unlike "regular" crimes, white-collar crimes:

A) are non-bailable.
B) do not involve deception.
C) do not involve physical force.
D) are not punishable.
سؤال
AAsoft, a software company, encodes all the files in its system in such a way that only its employees can access it with an automatically generated password. This is an example of _____.

A) transcription
B) encryption
C) diversion
D) surveillance
سؤال
Mike is a businessman in the state of Lakaster, United States. He is worried that his business rivals might murder him, and so, he decides to purchase a revolver in order to defend himself. When he approaches a licensed firearms dealer to apply for the privilege of owning a firearm, he is informed that the process includes a thorough background check by the FBI. Which of the following, if true, is most likely to cause the FBI to prohibit Mike from purchasing the revolver?

A) Mike has worked with the FBI in the past.
B) Mike has a history of felony conviction.
C) Mike has purchased a licensed firearm in the past.
D) Mike has faced significant losses in his business.
سؤال
A website named freegoodz.com allows users to download computer software for free. This has resulted in significant losses for several companies that sell these software legally. This is an example of _____.

A) smishing
B) piracy
C) cyberstalking
D) hacking
سؤال
Which of the following is a form of cyberbullying that involves nonconsensual online publication of explicit images?

A) Spamming
B) Cyberstalking
C) Spear phishing
D) Revenge porn
سؤال
Unlike a worm, a virus:

A) is not a software program.
B) does not interfere with the normal use of a computer.
C) cannot replicate itself.
D) cannot exist as a separate entity.
سؤال
Piracy involves:

A) the unauthorized copying and use of someone's intellectual property.
B) sending emails to targets in order to acquire sensitive information.
C) the unauthorized sending of bulk emails to victims.
D) creating fake accounts in websites in order to solicit members for a donation.
سؤال
Botnets are networks of computers that have been appropriated by _____ without the knowledge of their owners.

A) cyberstalkers
B) spammers
C) hackers
D) cyber sleuths
سؤال
_________ is an act of speech or expression that is not protected by the First Amendment because it is done with the intention of placing a specific victim or group of victims in fear of unlawful violence.
A. True threat
B. Identity theft
C. Cyberattack
D. Corporate Violence ​
سؤال
_________ is the illegal production and sale of material depicting sexually explicit conduct involving a child.
A. Child pornography
B. Child abduction
C. Child-selling
D. Child neglect ​
سؤال
The _________ requires background checks for private gun transactions and for the sale of ammunition.
A. Undetectable Firearms Act
B. New York Secure Firearms Enforcement Act
C. Protection of Lawful Commerce in Arms Act
D. Gun-Free School Zones Act ​
سؤال
Which of the following is true of the Occupational Safety and Health Administration (OSHA)?

A) It improves the quality of rehabilitation centers.
B) It enforces workplace health and safety standards.
C) It ensures fair operation of financial markets.
D) It regulates air quality, water quality, and toxic waste.
سؤال
A(n) _________ is a financial activity characterized by deceit and concealment that do not involve physical force or violence.
A. homicide
B. white-collar crime
C. inchoate crime
D. burglary ​
سؤال
_____ occurs when somebody within a company or government sells influence, power, or information to a person outside the company or government who can benefit.

A) Influence peddling
B) Insider trading
C) Consumer fraud
D) Spear phishing
سؤال
_________ are legal notices that compel the disclosure of customer records held by banks, telephone companies, Internet service providers, and other companies to the agents of the federal government.
A. Bills of attainder
B. Non-disclosure agreements
C. National security letters
D. Creativity trust orders ​
سؤال
Explain cyber forensics.
سؤال
Which of the following is true of corporate violence?

A) It occurs as a result of policies or actions undertaken by an establishment.
B) It involves stalking in cyberspace through the use of e-mail or text messages.
C) It involves sending emails to corporations in order to acquire sensitive information.
D) It occurs as a result of unauthorized copying and use of a victim's intellectual property.
سؤال
Explain how cyberattacks impact the regular operations of a state.
سؤال
Which of the following is an example of a white-collar crime?

A) Homicide
B) Arson
C) Bribery
D) Battery
سؤال
_____ involves buying or selling securities on the basis of information that has not been made available to the public.

A) Pilferage
B) Influence peddling
C) Insider trading
D) Embezzlement
سؤال
Odometer fraud involves:

A) manipulating odometers in taxis in order to charge higher prices to customers.
B) stealing odometers from cars and smuggling them to other countries.
C) manipulating odometers of used cars in order to charge higher prices.
D) removing odometers from used cars and inserting them in new cars.
سؤال
Which of the following is true of the Securities and Exchange Commission (SEC)?

A) It ensures fair operation of financial markets.
B) It regulates air quality, water quality, and toxic waste.
C) It helps improve the work environment in corporations.
D) It enforces workplace health and safety standards.
سؤال
Explain the role of the regulatory justice system in fighting white-collar crime.
سؤال
The term _____ refers to dishonest practices relating to home loans.

A) cyberstalking
B) corporate violence
C) mortgage fraud
D) phishing
سؤال
Describe the term intellectual property.
سؤال
Which of the following is an example of corporate violence?

A) A dye-manufacturing company releases toxic waste into a river, which causes the death of a majority of the river's fish population.
B) Bensen smashes his manager's computer with a hammer after a discussion about the former's performance.
C) Jamie sends confidential information from her office computer to a rival company.
D) A group of hackers break into the traffic control system in their city and manipulate it, resulting in a number of automobile accidents.
سؤال
Which of the following is true of the Environmental Protection Agency (EPA)?

A) It regulates air quality, water quality, and toxic waste.
B) It helps improve the work environment in corporations.
C) It enforces workplace health and safety standards.
D) It ensures fair operation of financial markets.
سؤال
Describe the "Zero Days" problem.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Todays Challenges in Criminal Justice
1
_____ is the act of helping a terrorist organization by engaging in a wide range of activity that includes providing financial assistance, training, and expert advice.

A) Material support
B) Red flagging
C) Identity theft
D) Spear phishing
A
2
Hector is a member of a terrorist organization that hacks into the traffic control system of the state of Greenville, United States. He disrupts the traffic in the state for a day, leading to many automobile accidents. This is an example of _____.

A) phishing
B) true threat
C) identity theft
D) cyberattack
D
3
Cyberattack is an attempt to damage or disrupt computer systems or electronic networks operated by computers.
True
4
Which of the following terms refers to an attempt to damage or disrupt computer systems or electronic networks operated by computers?

A) Cyber fraud
B) Identity theft
C) Cyberattack
D) Corporate violence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
5
The Foreign Intelligence Surveillance Act requires permission from a special court to engage in surveillance, if the target is a(n):

A) employee of the armed forces of the United States.
B) individual associated with the state government.
C) foreign agent operating within the United States.
D) individual with a previous felony conviction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
6
Less than 10 percent of identity theft involves the misappropriation of an existing credit-card account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Brady Bill prohibits all persons from acquiring a firearm for personal purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
8
National security letters can be used to collect:

A) records of individuals that own a federally licensed firearm.
B) medical records of individuals targeted for surveillance.
C) funds as a reparation for damages done as a result of a war.
D) financial records such as money transfers and bank accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
9
Identity theft involves:

A) stealing personal information from a victim and using it to access his or her financial resources.
B) using one's position in an organization to steal his or her employer's funds.
C) creating a fake account in websites in order to solicit members for a donation.
D) listing a product in an auction site and refusing to send the product to the customer despite payment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
10
Cyber sleuths can create a digital duplicate of a targeted hard drive, enabling them to break access codes, determine passwords, and search files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following examples best illustrates advance fee fraud?

A) Scott sends a fraudulent mail to hundreds of people claiming that they have won 20 million dollars in a lottery.
B) Sabina creates a fake account on a networking site and collects funds for a fictitious charitable organization.
C) Frederick lists a Van Gogh painting for auction on his website and refuses to send the product upon receiving payment.
D) Deliwear, an online shopping portal, does not deliver clothes that are ordered online by customers despite receiving payment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
12
Tax evasion occurs when taxpayers underreport their taxable income.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
13
The preferred method of phishing is through the use of a worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is true of the Foreign Intelligence Surveillance Court?

A) It comprises eleven federal judges assigned by the chief justice of the Supreme Court.
B) It gathers records of surveillance carried out by foreign agents in the United States.
C) It prohibits electronic monitoring of suspected individuals or national security threats.
D) It comprises two federal judges assigned by the President of the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
15
The main goal of cyber forensics is to gather digital evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
16
A technique called keystroke logging relies on software that embeds itself in a victim's computer and records every keystroke made on that computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following Supreme Court cases involved the police's warrantless seizure of phone numbers dialed from the home of a robbery suspect?

A) Muller v. Oregon
B) Browder v. Gayle
C) Smith v. Maryland
D) Batson v. Kentucky
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
18
In the context of the Brady Bill, an applicant can be prohibited from purchasing a firearm if evidence of illegal drug addiction is uncovered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
19
In which of the following Supreme Court cases did the Court strike down part of a Virginia law that prohibited all forms of cross burning?

A) Virginia v. Loving
B) Boynton v. Virginia
C) Virginia v. Black
D) Morgan v. Virginia
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
20
Different types of malware are used to prevent a computer from being infested with viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
21
The Brady Bill requires background checks:

A) only for those who purchase guns from gun shows or from private citizens.
B) for applicants who wish to become federally licensed firearms dealers.
C) for applicants who have a history of procuring firearms.
D) only for those who purchase guns from federally licensed firearms dealers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following terms refers to sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information from the recipient?

A) Phishing
B) Encryption
C) Corporate violence
D) Cyberstalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
23
_____ is a practice wherein companies hire outside experts to act as hackers and attempt to gain access to their systems.

A) Smishing
B) Cyberstalking
C) Penetration testing
D) Spear phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is true of pilferage?

A) It is a more serious form of employee fraud.
B) It involves individuals stealing items from their workplaces.
C) It involves individuals resorting to illegal activity in the stock market.
D) It is a more serious form of consumer fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is a form of phishing that is done via a phone?

A) Vishing
B) Pharming
C) Cyberstalking
D) Flagging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
26
Cyber stalking involves:

A) using electronic communication to cause a victim to fear for her or his safety.
B) stealing personal information from a victim and using it to access his or her financial resources.
C) faking an identity of a law enforcement officer in order to defraud victims into paying money.
D) creating a fake account in websites in order to solicit members for a donation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
27
Lee receives an email from an unknown account claiming that his debit card details need to be confirmed along with the password for the purpose of verification. The details are sent, after which he then contacts the bank, which denies sending any such email. After a few days, he notices that there have been a lot of unknown transactions from his bank account. This is an example of _____.

A) cyberstalking
B) phishing
C) hacking
D) flagging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following illustrates spear phishing?

A) Tanya clicks on a link that appears to have been emailed by her colleague that downloads a harmful software.
B) Margaret receives an email from an unknown account claiming that she has won the state lottery and asks her for her credit card information.
C) Parker receives an email from an unknown account claiming to be from a charitable organization and requests him to transfer money as a donation.
D) George opens a pornographic website on his office computer without the knowledge of his coworkers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
29
_____ refers to any program that is harmful to a computer or, by extension, a computer user.

A) A glitch
B) A bug
C) Spam
D) Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is a similarity between a virus and a worm?

A) Both can replicate themselves.
B) Both need to be attached to an existing file in the computer.
C) Both can exist as independent entities.
D) Both do not affect the normal use of a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is a problem with the background check system for the purchase of firearms?

A) It is unreliable, as it is carried out by licensed firearms dealers.
B) It relies on states to provide the federal government with mental-health information about their citizens.
C) It allows people with prior felony convictions to purchase firearms, which is dangerous to the society.
D) It makes it easier to purchase semiautomatic weapons and easier to keep firearms in the hands of the mentally ill.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
32
The _____ requires a person wishing to purchase a gun from a licensed firearms dealer to apply for the privilege of doing so.

A) Brady Handgun Violence Prevention Act
B) Undetectable Firearms Act
C) National Firearms Act
D) Protection of Lawful Commerce in Arms Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
33
Unlike "regular" crimes, white-collar crimes:

A) are non-bailable.
B) do not involve deception.
C) do not involve physical force.
D) are not punishable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
34
AAsoft, a software company, encodes all the files in its system in such a way that only its employees can access it with an automatically generated password. This is an example of _____.

A) transcription
B) encryption
C) diversion
D) surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
35
Mike is a businessman in the state of Lakaster, United States. He is worried that his business rivals might murder him, and so, he decides to purchase a revolver in order to defend himself. When he approaches a licensed firearms dealer to apply for the privilege of owning a firearm, he is informed that the process includes a thorough background check by the FBI. Which of the following, if true, is most likely to cause the FBI to prohibit Mike from purchasing the revolver?

A) Mike has worked with the FBI in the past.
B) Mike has a history of felony conviction.
C) Mike has purchased a licensed firearm in the past.
D) Mike has faced significant losses in his business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
36
A website named freegoodz.com allows users to download computer software for free. This has resulted in significant losses for several companies that sell these software legally. This is an example of _____.

A) smishing
B) piracy
C) cyberstalking
D) hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is a form of cyberbullying that involves nonconsensual online publication of explicit images?

A) Spamming
B) Cyberstalking
C) Spear phishing
D) Revenge porn
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
38
Unlike a worm, a virus:

A) is not a software program.
B) does not interfere with the normal use of a computer.
C) cannot replicate itself.
D) cannot exist as a separate entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
39
Piracy involves:

A) the unauthorized copying and use of someone's intellectual property.
B) sending emails to targets in order to acquire sensitive information.
C) the unauthorized sending of bulk emails to victims.
D) creating fake accounts in websites in order to solicit members for a donation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
40
Botnets are networks of computers that have been appropriated by _____ without the knowledge of their owners.

A) cyberstalkers
B) spammers
C) hackers
D) cyber sleuths
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
41
_________ is an act of speech or expression that is not protected by the First Amendment because it is done with the intention of placing a specific victim or group of victims in fear of unlawful violence.
A. True threat
B. Identity theft
C. Cyberattack
D. Corporate Violence ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
42
_________ is the illegal production and sale of material depicting sexually explicit conduct involving a child.
A. Child pornography
B. Child abduction
C. Child-selling
D. Child neglect ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
43
The _________ requires background checks for private gun transactions and for the sale of ammunition.
A. Undetectable Firearms Act
B. New York Secure Firearms Enforcement Act
C. Protection of Lawful Commerce in Arms Act
D. Gun-Free School Zones Act ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following is true of the Occupational Safety and Health Administration (OSHA)?

A) It improves the quality of rehabilitation centers.
B) It enforces workplace health and safety standards.
C) It ensures fair operation of financial markets.
D) It regulates air quality, water quality, and toxic waste.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
45
A(n) _________ is a financial activity characterized by deceit and concealment that do not involve physical force or violence.
A. homicide
B. white-collar crime
C. inchoate crime
D. burglary ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
46
_____ occurs when somebody within a company or government sells influence, power, or information to a person outside the company or government who can benefit.

A) Influence peddling
B) Insider trading
C) Consumer fraud
D) Spear phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
47
_________ are legal notices that compel the disclosure of customer records held by banks, telephone companies, Internet service providers, and other companies to the agents of the federal government.
A. Bills of attainder
B. Non-disclosure agreements
C. National security letters
D. Creativity trust orders ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
48
Explain cyber forensics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is true of corporate violence?

A) It occurs as a result of policies or actions undertaken by an establishment.
B) It involves stalking in cyberspace through the use of e-mail or text messages.
C) It involves sending emails to corporations in order to acquire sensitive information.
D) It occurs as a result of unauthorized copying and use of a victim's intellectual property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
50
Explain how cyberattacks impact the regular operations of a state.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following is an example of a white-collar crime?

A) Homicide
B) Arson
C) Bribery
D) Battery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
52
_____ involves buying or selling securities on the basis of information that has not been made available to the public.

A) Pilferage
B) Influence peddling
C) Insider trading
D) Embezzlement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
53
Odometer fraud involves:

A) manipulating odometers in taxis in order to charge higher prices to customers.
B) stealing odometers from cars and smuggling them to other countries.
C) manipulating odometers of used cars in order to charge higher prices.
D) removing odometers from used cars and inserting them in new cars.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is true of the Securities and Exchange Commission (SEC)?

A) It ensures fair operation of financial markets.
B) It regulates air quality, water quality, and toxic waste.
C) It helps improve the work environment in corporations.
D) It enforces workplace health and safety standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
55
Explain the role of the regulatory justice system in fighting white-collar crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
56
The term _____ refers to dishonest practices relating to home loans.

A) cyberstalking
B) corporate violence
C) mortgage fraud
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
57
Describe the term intellectual property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following is an example of corporate violence?

A) A dye-manufacturing company releases toxic waste into a river, which causes the death of a majority of the river's fish population.
B) Bensen smashes his manager's computer with a hammer after a discussion about the former's performance.
C) Jamie sends confidential information from her office computer to a rival company.
D) A group of hackers break into the traffic control system in their city and manipulate it, resulting in a number of automobile accidents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is true of the Environmental Protection Agency (EPA)?

A) It regulates air quality, water quality, and toxic waste.
B) It helps improve the work environment in corporations.
C) It enforces workplace health and safety standards.
D) It ensures fair operation of financial markets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
60
Describe the "Zero Days" problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.