Deck 1: Law Enforcement, Privacy, and Security in Dealing With Cybercrime; Technology and Cybercrime
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/9
العب
ملء الشاشة (f)
Deck 1: Law Enforcement, Privacy, and Security in Dealing With Cybercrime; Technology and Cybercrime
1
Which of the following agencies have the primary responsibility for the investigation of transnational cybercrimes in the United States?
A) local police
B) state police
C) federal law enforcement
D) sheriffs
A) local police
B) state police
C) federal law enforcement
D) sheriffs
C
2
Which of the following crimes do local law enforcement agencies investigate the least in the US?
A) prostitution
B) computer hacking
C) child sexual exploitation
D) stalking and harassment
A) prostitution
B) computer hacking
C) child sexual exploitation
D) stalking and harassment
B
3
Which of the following levels of law enforcement in the US investigate crimes when jurisdictional conflicts exist between local agencies?
A) state police
B) sheriffs' offices
C) local police
D) federal law enforcement
A) state police
B) sheriffs' offices
C) local police
D) federal law enforcement
A
4
Which form of law is used to resolve disputes between private parties including individuals and businesses?
A) criminal
B) civil
A) criminal
B) civil
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
5
What term is used to refer to an individual who conducts investigations, including forensic examinations, on behalf of private citizens or businesses?
A) police officer
B) civil servant
C) constable
D) private investigator
A) police officer
B) civil servant
C) constable
D) private investigator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
6
Computer hacking would be placed under which category in Wall's typology of cybercrime?
A) cyber-trespass
B) cyber-deception
C) cyber-porn
D) cyber-violence
A) cyber-trespass
B) cyber-deception
C) cyber-porn
D) cyber-violence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
7
Any act that violates codified legal statutes is considered what?
A) deviance
B) crime
C) terror
D) warfare
A) deviance
B) crime
C) terror
D) warfare
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
8
When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be ____ to the offense.
A) incidental
B) evidentiary
C) unrelated
D) tertiary
A) incidental
B) evidentiary
C) unrelated
D) tertiary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
9
A group with its own norms and values that exists in opposition to the dominant culture is called what?
A) gang
B) clique
C) subculture
D) none of the above
A) gang
B) clique
C) subculture
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck

