Deck 19: Computers and Technological Crime

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not one of the more common types of crime using information technology?

A) illegal drug activity
B) prostitution
C) arson
D) gambling
E) identity theft
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
At the heart of virtually all information technology lies a computer system or ___________.

A) central processing unit (CPU)
B) ROM file
C) hard drive
D) Global Positioning System (GPS)
E) all of the above
سؤال
Police may sometimes pose as children in chat rooms in an effort to identify child molesters. In such cases, it is important to avoid _____________, which is a common defense.

A) obtaining a search warrant
B) detection
C) failure to obtain a warrant
D) entrapment
E) enticing
سؤال
The investigator facing a crime scene involving computers should:

A) turn off all computers and peripherals
B) call for a component service technician
C) request assistance from the computer owner in recovering data
D) all of the above
E) none of the above
سؤال
One of the most common types of electronic fraud involves the use of:

A) stolen or forged credit cards
B) homemade software programs
C) viruses
D) commercial software programs
E) straw buyers
سؤال
One of the most fastest growing crimes in the United States is:

A) cracking
B) identity theft
C) hacking
D) sexual exploitation of children
E) none of the above
سؤال
______________ is a term that refers to one who enters a computer system illegally for the purpose of destroying, changing, or stealing data.

A) Software disabler
B) Hacker
C) Cracker
D) Clipper
E) Flipper
سؤال
To date, the computer has not come close to the potential it offers as an investigative tool because of:

A) concerns about the right to privacy
B) a lack of trained technicians
C) entrenched resistance by officers who have little understanding of the computer's capabilities
D) all of the above
E) none of the above
سؤال
Clipper chips, encryption, logic bombs, pinging, remailers, trapdoors, Trojan horses, viruses, and worms are all cited as examples of _______________ used to accomplish or conceal crime in cyberspace.

A) computer sabotage
B) documents
C) threads
D) strings
E) CPUs
سؤال
The Rapid Start Team, a team of experts who assist federal and local law enforcement with a quick mobilization capacity for investigating serious crimes, is an elite unit of the:

A) Bureau of Alcohol, Tobacco, and Firearms
B) Central Intelligence Agency
C) Secret Service
D) National Association of Computer Crime Investigators
E) Federal Bureau of Investigation
سؤال
Which of the following is not one of the more common types of crime using information technology?

A) child pornography
B) gambling
C) identity theft
D) illegal drug activity
E) arson
سؤال
To date, the computer has not come close to the potential it offers as an investigative tool because of which of the following?

A) concerns about the right to privacy
B) lack of sufficient funding
C) a lack of trained technicians
D) entrenched resistance by officers who have little understanding of the computer's capabilities
E) all of the above
سؤال
When dealing with a high-tech crime scene, which of the following investigation steps are recommended by the NIJ?

A) observe and document the crime scene
B) document the condition and location of the computer system
C) identify and document related electronic components
D) photograph the entire scene
E) all of the above
سؤال
Although statutes differ by states, the elements of computer fraud make it unlawful for any person to use a computer or computer network without permission with the intent to:

A) embezzle or commit larceny
B) obtain property or services by false pretenses
C) convert the property of another
D) all of the above
E) none of the above
سؤال
A number of federal agencies monitor web sites of suspected violent groups, primarily as a means of keeping track of:

A) adult visitors to the site
B) potential criminal activity
C) where members are living
D) child visits to the site
E) none of the above
سؤال
Computers have improved the capacity of law enforcement to collect, analyze, and store large volumes of essential information.
سؤال
On an individual basis, most investigators working at a crime scene have found that the computer does not serve any useful purpose.
سؤال
According to the authors, a criminal investigator should, at a minimum, know the difference between various types of computers, as well as have some understanding of their capabilities.
سؤال
In the field of criminal investigation, the computer has been found to be useful only in the area of text-based information.
سؤال
According to the text, a criminal investigator confronted with a crime scene involving computers should protect the area and call for a component service technician.
سؤال
If an activated computer is a part of the criminal investigation, it should be immediately turned off to prevent any software from destroying the data on the hard drive.
سؤال
Home computers and other personal and portable devices fall under the purview of the Fourth Amendment, which protects citizens from unreasonable searches and seizures.
سؤال
According to the authors, the proper investigation of computer-related crime can be performed by any criminal investigator regardless of training and experience.
سؤال
According to the text, crimes involving sabotage of computers or data processing systems are frequently carried out by disgruntled employees.
سؤال
According to the text, some social networking sites have agreed to remove from their sites those individuals who have a criminal record involving children.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 19: Computers and Technological Crime
1
Which of the following is not one of the more common types of crime using information technology?

A) illegal drug activity
B) prostitution
C) arson
D) gambling
E) identity theft
C
2
At the heart of virtually all information technology lies a computer system or ___________.

A) central processing unit (CPU)
B) ROM file
C) hard drive
D) Global Positioning System (GPS)
E) all of the above
A
3
Police may sometimes pose as children in chat rooms in an effort to identify child molesters. In such cases, it is important to avoid _____________, which is a common defense.

A) obtaining a search warrant
B) detection
C) failure to obtain a warrant
D) entrapment
E) enticing
D
4
The investigator facing a crime scene involving computers should:

A) turn off all computers and peripherals
B) call for a component service technician
C) request assistance from the computer owner in recovering data
D) all of the above
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
One of the most common types of electronic fraud involves the use of:

A) stolen or forged credit cards
B) homemade software programs
C) viruses
D) commercial software programs
E) straw buyers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
One of the most fastest growing crimes in the United States is:

A) cracking
B) identity theft
C) hacking
D) sexual exploitation of children
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
______________ is a term that refers to one who enters a computer system illegally for the purpose of destroying, changing, or stealing data.

A) Software disabler
B) Hacker
C) Cracker
D) Clipper
E) Flipper
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
To date, the computer has not come close to the potential it offers as an investigative tool because of:

A) concerns about the right to privacy
B) a lack of trained technicians
C) entrenched resistance by officers who have little understanding of the computer's capabilities
D) all of the above
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Clipper chips, encryption, logic bombs, pinging, remailers, trapdoors, Trojan horses, viruses, and worms are all cited as examples of _______________ used to accomplish or conceal crime in cyberspace.

A) computer sabotage
B) documents
C) threads
D) strings
E) CPUs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
The Rapid Start Team, a team of experts who assist federal and local law enforcement with a quick mobilization capacity for investigating serious crimes, is an elite unit of the:

A) Bureau of Alcohol, Tobacco, and Firearms
B) Central Intelligence Agency
C) Secret Service
D) National Association of Computer Crime Investigators
E) Federal Bureau of Investigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is not one of the more common types of crime using information technology?

A) child pornography
B) gambling
C) identity theft
D) illegal drug activity
E) arson
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
To date, the computer has not come close to the potential it offers as an investigative tool because of which of the following?

A) concerns about the right to privacy
B) lack of sufficient funding
C) a lack of trained technicians
D) entrenched resistance by officers who have little understanding of the computer's capabilities
E) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
When dealing with a high-tech crime scene, which of the following investigation steps are recommended by the NIJ?

A) observe and document the crime scene
B) document the condition and location of the computer system
C) identify and document related electronic components
D) photograph the entire scene
E) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Although statutes differ by states, the elements of computer fraud make it unlawful for any person to use a computer or computer network without permission with the intent to:

A) embezzle or commit larceny
B) obtain property or services by false pretenses
C) convert the property of another
D) all of the above
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
A number of federal agencies monitor web sites of suspected violent groups, primarily as a means of keeping track of:

A) adult visitors to the site
B) potential criminal activity
C) where members are living
D) child visits to the site
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
Computers have improved the capacity of law enforcement to collect, analyze, and store large volumes of essential information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
On an individual basis, most investigators working at a crime scene have found that the computer does not serve any useful purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
According to the authors, a criminal investigator should, at a minimum, know the difference between various types of computers, as well as have some understanding of their capabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
In the field of criminal investigation, the computer has been found to be useful only in the area of text-based information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
According to the text, a criminal investigator confronted with a crime scene involving computers should protect the area and call for a component service technician.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
If an activated computer is a part of the criminal investigation, it should be immediately turned off to prevent any software from destroying the data on the hard drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Home computers and other personal and portable devices fall under the purview of the Fourth Amendment, which protects citizens from unreasonable searches and seizures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
According to the authors, the proper investigation of computer-related crime can be performed by any criminal investigator regardless of training and experience.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
According to the text, crimes involving sabotage of computers or data processing systems are frequently carried out by disgruntled employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
According to the text, some social networking sites have agreed to remove from their sites those individuals who have a criminal record involving children.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.