Deck 14: Crimes in the 21st Century

ملء الشاشة (f)
exit full mode
سؤال
Which statement best summarizes the challenges associated with creating a typology of high-tech crime?

A) The crimes are so complicated it is difficult for others to understand.
B) There are so few types of high-tech crimes that it is difficult to derive enough categories.
C) The crimes are complex and contain many elements making it difficult to create distinct categories.
D) The crimes are so similar to white-collar crime that it is difficult to create a unique typology that is distinct from existing typologies.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which global system is information technology (IT) the key to?

A) business
B) Internet
C) economic
D) social
سؤال
Cybercrime presents a compelling challenge for the justice system and law enforcement community. Which statement does NOT accurately describe the challenge cybercrime creates?

A) Cybercrime is rapidly evolving with new schemes being created daily.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime necessitates a lighter sentence due to limited state and federal laws.
سؤال
What type of cybercriminal is motivated by the desire to commit technological destruction?

A) cyberterrorist
B) cybervandal
C) cybertheft
D) cyberspy
سؤال
Why is it difficult to calculate an accurate computer crime rate?

A) Computer crime is often not reported by companies.
B) Most companies exaggerate the amount of computer crime.
C) Most companies are involved in computer crime and do not want to implicit themselves.
D) Police are not interested in computer crime because it is a private matter.
سؤال
What percentage of attacks on businesses is estimated to be in the e-commerce area?

A) 4
B) 16
C) 55
D) 61
سؤال
What term refers to the situation in which pornography websites send consumers to other sites involuntarily?

A) tripping
B) mousetrapping
C) slagging
D) ping-ponging
سؤال
What type of computer crime uses a computer to reprogram another for illicit purposes; for example, telling a bank computer to put deposits in the criminal's accounts?

A) salami slice
B) super zapping
C) Trojan horse
D) logic bomb
سؤال
What term refers to the use of a maintenance subroutine to supersede an antitheft program?

A) salami slicing
B) super-zapping
C) interroutining
D) program redundancy
سؤال
A virus program is secretly attached to the company's computer system. What type of computer crime is this an example of?

A) computer voyeurism
B) data leakage
C) the logic bomb
D) super-zapping
سؤال
What type of computer program disrupts or destroys existing programs and networks?

A) logic bomb
B) trap door
C) virus
D) Trojan horse
سؤال
In 1986, the first bootable PC virus was released. What was the virus called?

A) Melissa macro
B) Hacker's haven
C) the Brain
D) Morris worm
سؤال
In 2003, which Internet "worm" infected hundreds of thousands of computers as the fastest spreading worm in history?

A) Trojan
B) Morris
C) Slammer
D) Earth
سؤال
In 2004, the first webworm was launched which used Google to find new targets. What was the worm called?

A) Sony
B) Daprosy
C) Laroux
D) Santy
سؤال
What term is used to describe the intentional manipulation of the securities marketplace through the use of the Internet for the purposes of profit?

A) Internet fraud
B) Internet manipulation
C) e-fraud
D) electronic fraud
سؤال
George posts negative information about a particular company in an attempt to reduce stock price. Once the price has lowered, George purchases the stock before the company is able to reverse the negative damage and re-inflate the stock price. What crime has George committed?

A) fraudulent stock exchange
B) illegal touting
C) illegal infringement
D) market manipulation
سؤال
Identity theft is a type of cybercrime that has grown at surprising rates over the past few years. Which statement does NOT accurately describe identity theft?

A) Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
B) Opening new lines of credit is the most common goals of credit card thieves.
C) Some identity theft schemes are extremely elaborate.
D) Much is known about the extent of identity theft.
سؤال
Which of the following is NOT a common phishing scam?

A) account verification scams in which the victim is directed to a bogus website by clicking the legitimate-looking address
B) the Nigerian 419 scam in which an alleged representative of a foreign government asking the victim to help move money from one account to another
C) a free credit report through Experian, TransUnion, and Equifax
D) an e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling
سؤال
Which term refers to phishing; that is, the act of setting up phony websites to gain access to personal information?

A) e-hooking
B) e-tailing
C) vishing
D) spoofing
سؤال
What is the purpose of phishing?

A) to make connections in order launder money
B) to protect against potential internet scams
C) to gain access to personal information
D) to fence illegal goods
سؤال
What term refers to the use of computer networks to illegally acquire privileged information?

A) e-tailing fraud
B) cyberterrorism
C) cyberwar
D) cyberespionage
سؤال
What is a method used by terrorist groups to acquire funds to carry out operations?

A) collecting donations using fraudulent charities websites
B) threatening existing organizations with a denial-of-service attack
C) using profits from illegal touting scams
D) using profits from selling illegal goods on the Internet
سؤال
Why is international cooperation required for the control of cybercrime?

A) It is too expensive to combat cybercrime on the national level.
B) Cybercrime can operate from anywhere in the world making it a global matter to control.
C) International efforts are required to detect cybercrime.
D) Recognizing cybercrime at the international level will act as more of a deterrent to cybercriminals.
سؤال
What is the name of the first international treaty that was created to address the cybercrime?

A) the Internet Crime Treaty
B) the Convention on Cybercrime
C) the Treaty of Cybercrime Enforcement
D) the Declaration of Cybercrime Prevention
سؤال
What is type of crime is website damage or defacement?

A) cybervandalism
B) cyberterrorism
C) cyberespionage
D) cybertheft
سؤال
What generally motivates cybervandals?

A) thrill
B) need
C) greed
D) malice
سؤال
Which reason often motivates Internet crimes?

A) revenge against an enemy
B) a need to exhibit technical skills and prowess
C) a need to spy on other people's private information
D) a need to make cash with computer ransom
سؤال
What type of threat is represented by Titan Rain?

A) cyberfraud
B) cyberterrorism
C) cyberespionage
D) cyberstalking
سؤال
Which of the following led to the emergence of a national gang syndicate?

A) the advent of the Internet
B) the implementation of prohibition
C) changing values in society
D) weak law enforcement strategies
سؤال
Besides narcotics distribution and Internet pornography, what generates most organized crime income?

A) charitable funds
B) terrorism
C) human trafficking
D) labour unions
سؤال
What term best describes international covert crime activities that involve large networks of people?

A) national crime organizations
B) the Mafia
C) international crime groups
D) transnational organized crime
سؤال
What term is used to describe a crime that is committed in more than one state by the same criminal organization?

A) international
B) transnational
C) regional
D) intercontinental
سؤال
Which statement does NOT describe the decline of Mafia power?

A) Reigning family heads are quite old.
B) The code of silence is now regularly broken by younger members.
C) Emerging ethnic gangs want to muscle in on traditional syndicate activities.
D) Younger members are not as educated as earlier generations.
سؤال
Which statement best describes the current state of traditional organized crime syndicates?

A) They are thriving and gaining "membership."
B) They are eroding and in decline.
C) They are maintaining stability but only in large city "territories.
D) They are virtually nonexistent having been replaced by newer ethnic gangs.
سؤال
What is a main goal for transnational organized crime?

A) political change
B) economic gain
C) social transformation
D) exporting terrorism
سؤال
What has enabled the recent success of transnational organized crime?

A) social change
B) economic turmoil
C) tools of the internet
D) traditional forms of organization
سؤال
What type of crime have organized crime cartels recently become involved in?

A) pirating software
B) securities fraud
C) cyberespionage
D) cybertrafficking
سؤال
What is characteristic of a nation in which a transnational crime syndicate is most likely to develop?

A) a weak government with no effective methods of opposition
B) a corrupt government who is willing to work with the organization for a cut of the profits
C) areas with a stable economy and disposable income
D) areas with few existing crime syndicates to limit competition
سؤال
What is the main focus of eastern European gangs?

A) Internet securities fraud
B) political terrorism
C) drug smuggling
D) human trafficking
سؤال
In contrast to other international organizations, what crime is Russian organized crime more involved with?

A) money laundering
B) drug smuggling
C) human trafficking
D) illegal arms sales
سؤال
What crime is Russian organized crime less likely to be involved with?

A) human trafficking
B) healthcare fraud
C) drug trafficking
D) extortion
سؤال
How much in illegal drug proceeds do Mexican gangs annually smuggle in for laundering?

A) $10 million to $100 million
B) $100 million to $1 billion
C) $1 billion to $5 billion
D) $8 billion to $25 billion
سؤال
What crimes are Asian transnational organized gangs notorious for?

A) political corruption
B) illegal arms sales and terrorism
C) drug smuggling and human trafficking
D) corruption in industrial construction
سؤال
What kind of crime must carry with it the intent to disrupt and change the government and must not be a simple common-law crime committed for reasons of greed or egotism?

A) political crime
B) Marxist revolution
C) workplace violence
D) computer theft
سؤال
How do most political criminals characterize themselves?

A) vengeful
B) greedy
C) selfless
D) frustrated
سؤال
An individual who threatens an adversary in response to a difference in political opinion is engaging in what method to achieve their political goal?

A) oppression
B) coercion
C) bullying
D) intimidation
سؤال
What term is used to describe a political criminal who does not view their actions as criminal but rather in the best interest of society?

A) decisive
B) conviction
C) purposeful
D) intimidation
سؤال
What term is used to describe a political criminal whose actions are criminally motivated but disguises these motivations by presenting the actions as selfless and beneficial to society?

A) pseudo-conviction
B) pseudo-criminal
C) false-conviction
D) imitation-crime
سؤال
What term refers to the act of an individual or group who engages in actions with the purpose to topple the current government and replace it with their leader of choice?

A) revolution
B) democracy
C) equality
D) political harmony
سؤال
What type of election fraud is vandalizing a polling station in an attempt to scare individuals and to prevent individuals from voting an example of?

A) neutralization
B) espionage
C) intimidation
D) terrorism
سؤال
What term describes acts that are specifically designed to scare individuals away from polling stations to prevent them from casting their vote?

A) coercion
B) intimidation
C) anarchism
D) preventative tactics
سؤال
What type of election fraud is the circulation of incorrect information regarding the location of polling stations to voters registered with the opposing party in an attempt to prevent them from casting their vote?

A) misinformation
B) registration fraud
C) false advertising
D) disruption
سؤال
In the eighteenth century, what political crime was considered to be most serious?

A) election fraud
B) espionage
C) treason
D) desertion
سؤال
What term refers to the covert practice of obtaining confidential information from organizations without their knowledge?

A) treason
B) espionage
C) corruption
D) voyeurism
سؤال
What political crime was former FBI agent, Robert Hanssen, convicted of?

A) espionage
B) election fraud
C) transnational crimes
D) securities fraud
سؤال
What type of espionage is deliberately inserting an individual into a corporation with the purpose of extracting confidential information without the corporation's knowledge an example of?

A) economic
B) political
C) industrial
D) military
سؤال
What does the crime of terrorism emphasize in order to promote change?

A) rationality
B) violence
C) demonstrations
D) spying
سؤال
What is the purpose of terrorism?

A) to acquire profits for personal use
B) to demonstrate superiority over a competitor
C) to expose a vulnerability in a rival
D) to evoke change in the political party in power
سؤال
What distinguishes terrorism from conventional warfare?

A) Terrorism does not involve excessive war-like violence.
B) Terrorism requires secrecy and operations to exert control over large populations.
C) Terrorism is not a very organized crime.
D) Terrorism is less political in its nature than conventional warfare.
سؤال
The word "assassin" is derived from an Arabic term. What does it mean?

A) crazy man
B) hashish eater
C) political prisoner
D) killer of men
سؤال
In which historical period was terrorism more pervasive?

A) Elizabethan
B) Post Modern
C) Victorian
D) Middle Ages
سؤال
When did the word "terrorist" first become popular?

A) during the Second World War
B) during the Spanish Inquisition
C) during the French Revolution
D) during the plague in England
سؤال
Which of the following is characteristic of insurgents?

A) They engage in actions to maintain and promote the existing government.
B) The underlying motivation of any insurgent action is economic gain.
C) They engage in actions to oppose and undermine the existing government.
D) The purpose of insurgent action is to promote and maintain peace within the nation.
سؤال
What kind of terrorism has, as its ultimate goal, replacing an existing government with a regime that holds acceptable political views?

A) political
B) revolutionary
C) nationalistic
D) individualistic
سؤال
What kind of terrorist group is the Ku Klux Klan an example of?

A) non-political
B) nationalistic
C) political
D) state-sponsored
سؤال
Which type of terrorism is designed to promote the interests of minority ethnic groups or religious groups that believe they have been persecuted under majority rule?

A) state-sponsored
B) non-political
C) nationalistic
D) revolutionary
سؤال
Which of the following is the best-known nationalistic terrorist group from Ireland?

A) the Irish Battalion of the Poor
B) the Provisional Irish Republican Army
C) the Liberation Front of Ireland
D) the Irish Nationalists
سؤال
What kind of terrorism is exemplified by anti-abortion groups sponsoring demonstrations at abortion clinics, attacking clinics, and killing doctors with bombs?

A) justifiable
B) non-political
C) nationalistic
D) state-sponsored
سؤال
What kind of terrorism is represented by a repressive government regime forcing its citizens into obedience, oppressing minorities, and stifling political dissent?

A) nationalistic
B) state-sponsored
C) political
D) non-political
سؤال
State-sponsored terrorism includes a type of violence which involves physical harm caused by the unequal distribution of wealth. What is this type of violence called?

A) feministic
B) structural
C) patriarchal
D) unstructured
سؤال
What is the most extreme form of state-sponsored terrorism?

A) hijacking
B) genocide
C) structural
D) catastrophic
سؤال
What kind of terrorism involves individuals engaging in acts of violence as a way to demonstrate their loyalty to a group leader?

A) non-political
B) political
C) cult
D) patriotic
سؤال
How do leaders of cult terror groups ensure obedience from group members?

A) severe discipline
B) positive reinforcement
C) cultivating a supportive environment
D) engaging in open dialogue
سؤال
What organization uses the acronym "ALF"?

A) Albanian Liberation Front
B) Armenian Liberty Foundation
C) Animal Liberation Front
D) Activism, Liberty, and Freedom
سؤال
What is NOT a condition that has preceded genocide in Western societies?

A) authority orientation
B) "just world" thinking
C) new ideology
D) high levels of mental illness
سؤال
What term refers to the organizational structure of a group in which the group is subdivided into smaller independent groups as a means to enhance security?

A) insurgent cell
B) militant cell
C) terror cell
D) guerrilla cell
سؤال
Which of the following factors may influence the formation of a terror cell?

A) socioeconomic status
B) personality type
C) educational background
D) family membership
سؤال
What term refers to loosely organized groups with diverse leadership who are dispersed across a range of locations?

A) networks
B) webs
C) colonies
D) districts
سؤال
Which statement describes a characteristic of terrorist networks?

A) They follow a hierarchical model of leadership.
B) Most members are inexperienced.
C) They have access to vast amount of resources.
D) They are very well funded.
سؤال
Terrorists may be motivated by feelings of alienation. What do they feel?

A) lost in the complexities of modern society
B) secure in their violent role
C) that their actions are wrong, but necessary
D) fearful to begin their actions
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/110
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Crimes in the 21st Century
1
Which statement best summarizes the challenges associated with creating a typology of high-tech crime?

A) The crimes are so complicated it is difficult for others to understand.
B) There are so few types of high-tech crimes that it is difficult to derive enough categories.
C) The crimes are complex and contain many elements making it difficult to create distinct categories.
D) The crimes are so similar to white-collar crime that it is difficult to create a unique typology that is distinct from existing typologies.
The crimes are complex and contain many elements making it difficult to create distinct categories.
2
Which global system is information technology (IT) the key to?

A) business
B) Internet
C) economic
D) social
economic
3
Cybercrime presents a compelling challenge for the justice system and law enforcement community. Which statement does NOT accurately describe the challenge cybercrime creates?

A) Cybercrime is rapidly evolving with new schemes being created daily.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime necessitates a lighter sentence due to limited state and federal laws.
Cybercrime necessitates a lighter sentence due to limited state and federal laws.
4
What type of cybercriminal is motivated by the desire to commit technological destruction?

A) cyberterrorist
B) cybervandal
C) cybertheft
D) cyberspy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
5
Why is it difficult to calculate an accurate computer crime rate?

A) Computer crime is often not reported by companies.
B) Most companies exaggerate the amount of computer crime.
C) Most companies are involved in computer crime and do not want to implicit themselves.
D) Police are not interested in computer crime because it is a private matter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
6
What percentage of attacks on businesses is estimated to be in the e-commerce area?

A) 4
B) 16
C) 55
D) 61
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
7
What term refers to the situation in which pornography websites send consumers to other sites involuntarily?

A) tripping
B) mousetrapping
C) slagging
D) ping-ponging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
8
What type of computer crime uses a computer to reprogram another for illicit purposes; for example, telling a bank computer to put deposits in the criminal's accounts?

A) salami slice
B) super zapping
C) Trojan horse
D) logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
9
What term refers to the use of a maintenance subroutine to supersede an antitheft program?

A) salami slicing
B) super-zapping
C) interroutining
D) program redundancy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
10
A virus program is secretly attached to the company's computer system. What type of computer crime is this an example of?

A) computer voyeurism
B) data leakage
C) the logic bomb
D) super-zapping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
11
What type of computer program disrupts or destroys existing programs and networks?

A) logic bomb
B) trap door
C) virus
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
12
In 1986, the first bootable PC virus was released. What was the virus called?

A) Melissa macro
B) Hacker's haven
C) the Brain
D) Morris worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
13
In 2003, which Internet "worm" infected hundreds of thousands of computers as the fastest spreading worm in history?

A) Trojan
B) Morris
C) Slammer
D) Earth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
14
In 2004, the first webworm was launched which used Google to find new targets. What was the worm called?

A) Sony
B) Daprosy
C) Laroux
D) Santy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
15
What term is used to describe the intentional manipulation of the securities marketplace through the use of the Internet for the purposes of profit?

A) Internet fraud
B) Internet manipulation
C) e-fraud
D) electronic fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
16
George posts negative information about a particular company in an attempt to reduce stock price. Once the price has lowered, George purchases the stock before the company is able to reverse the negative damage and re-inflate the stock price. What crime has George committed?

A) fraudulent stock exchange
B) illegal touting
C) illegal infringement
D) market manipulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
17
Identity theft is a type of cybercrime that has grown at surprising rates over the past few years. Which statement does NOT accurately describe identity theft?

A) Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
B) Opening new lines of credit is the most common goals of credit card thieves.
C) Some identity theft schemes are extremely elaborate.
D) Much is known about the extent of identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is NOT a common phishing scam?

A) account verification scams in which the victim is directed to a bogus website by clicking the legitimate-looking address
B) the Nigerian 419 scam in which an alleged representative of a foreign government asking the victim to help move money from one account to another
C) a free credit report through Experian, TransUnion, and Equifax
D) an e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which term refers to phishing; that is, the act of setting up phony websites to gain access to personal information?

A) e-hooking
B) e-tailing
C) vishing
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is the purpose of phishing?

A) to make connections in order launder money
B) to protect against potential internet scams
C) to gain access to personal information
D) to fence illegal goods
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
21
What term refers to the use of computer networks to illegally acquire privileged information?

A) e-tailing fraud
B) cyberterrorism
C) cyberwar
D) cyberespionage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
22
What is a method used by terrorist groups to acquire funds to carry out operations?

A) collecting donations using fraudulent charities websites
B) threatening existing organizations with a denial-of-service attack
C) using profits from illegal touting scams
D) using profits from selling illegal goods on the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
23
Why is international cooperation required for the control of cybercrime?

A) It is too expensive to combat cybercrime on the national level.
B) Cybercrime can operate from anywhere in the world making it a global matter to control.
C) International efforts are required to detect cybercrime.
D) Recognizing cybercrime at the international level will act as more of a deterrent to cybercriminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is the name of the first international treaty that was created to address the cybercrime?

A) the Internet Crime Treaty
B) the Convention on Cybercrime
C) the Treaty of Cybercrime Enforcement
D) the Declaration of Cybercrime Prevention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
25
What is type of crime is website damage or defacement?

A) cybervandalism
B) cyberterrorism
C) cyberespionage
D) cybertheft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
26
What generally motivates cybervandals?

A) thrill
B) need
C) greed
D) malice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which reason often motivates Internet crimes?

A) revenge against an enemy
B) a need to exhibit technical skills and prowess
C) a need to spy on other people's private information
D) a need to make cash with computer ransom
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
28
What type of threat is represented by Titan Rain?

A) cyberfraud
B) cyberterrorism
C) cyberespionage
D) cyberstalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following led to the emergence of a national gang syndicate?

A) the advent of the Internet
B) the implementation of prohibition
C) changing values in society
D) weak law enforcement strategies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
30
Besides narcotics distribution and Internet pornography, what generates most organized crime income?

A) charitable funds
B) terrorism
C) human trafficking
D) labour unions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
31
What term best describes international covert crime activities that involve large networks of people?

A) national crime organizations
B) the Mafia
C) international crime groups
D) transnational organized crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
32
What term is used to describe a crime that is committed in more than one state by the same criminal organization?

A) international
B) transnational
C) regional
D) intercontinental
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which statement does NOT describe the decline of Mafia power?

A) Reigning family heads are quite old.
B) The code of silence is now regularly broken by younger members.
C) Emerging ethnic gangs want to muscle in on traditional syndicate activities.
D) Younger members are not as educated as earlier generations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which statement best describes the current state of traditional organized crime syndicates?

A) They are thriving and gaining "membership."
B) They are eroding and in decline.
C) They are maintaining stability but only in large city "territories.
D) They are virtually nonexistent having been replaced by newer ethnic gangs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is a main goal for transnational organized crime?

A) political change
B) economic gain
C) social transformation
D) exporting terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
36
What has enabled the recent success of transnational organized crime?

A) social change
B) economic turmoil
C) tools of the internet
D) traditional forms of organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
37
What type of crime have organized crime cartels recently become involved in?

A) pirating software
B) securities fraud
C) cyberespionage
D) cybertrafficking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is characteristic of a nation in which a transnational crime syndicate is most likely to develop?

A) a weak government with no effective methods of opposition
B) a corrupt government who is willing to work with the organization for a cut of the profits
C) areas with a stable economy and disposable income
D) areas with few existing crime syndicates to limit competition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
39
What is the main focus of eastern European gangs?

A) Internet securities fraud
B) political terrorism
C) drug smuggling
D) human trafficking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
40
In contrast to other international organizations, what crime is Russian organized crime more involved with?

A) money laundering
B) drug smuggling
C) human trafficking
D) illegal arms sales
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
41
What crime is Russian organized crime less likely to be involved with?

A) human trafficking
B) healthcare fraud
C) drug trafficking
D) extortion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
42
How much in illegal drug proceeds do Mexican gangs annually smuggle in for laundering?

A) $10 million to $100 million
B) $100 million to $1 billion
C) $1 billion to $5 billion
D) $8 billion to $25 billion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
43
What crimes are Asian transnational organized gangs notorious for?

A) political corruption
B) illegal arms sales and terrorism
C) drug smuggling and human trafficking
D) corruption in industrial construction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
44
What kind of crime must carry with it the intent to disrupt and change the government and must not be a simple common-law crime committed for reasons of greed or egotism?

A) political crime
B) Marxist revolution
C) workplace violence
D) computer theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
45
How do most political criminals characterize themselves?

A) vengeful
B) greedy
C) selfless
D) frustrated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
46
An individual who threatens an adversary in response to a difference in political opinion is engaging in what method to achieve their political goal?

A) oppression
B) coercion
C) bullying
D) intimidation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
47
What term is used to describe a political criminal who does not view their actions as criminal but rather in the best interest of society?

A) decisive
B) conviction
C) purposeful
D) intimidation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
48
What term is used to describe a political criminal whose actions are criminally motivated but disguises these motivations by presenting the actions as selfless and beneficial to society?

A) pseudo-conviction
B) pseudo-criminal
C) false-conviction
D) imitation-crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
49
What term refers to the act of an individual or group who engages in actions with the purpose to topple the current government and replace it with their leader of choice?

A) revolution
B) democracy
C) equality
D) political harmony
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
50
What type of election fraud is vandalizing a polling station in an attempt to scare individuals and to prevent individuals from voting an example of?

A) neutralization
B) espionage
C) intimidation
D) terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
51
What term describes acts that are specifically designed to scare individuals away from polling stations to prevent them from casting their vote?

A) coercion
B) intimidation
C) anarchism
D) preventative tactics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
52
What type of election fraud is the circulation of incorrect information regarding the location of polling stations to voters registered with the opposing party in an attempt to prevent them from casting their vote?

A) misinformation
B) registration fraud
C) false advertising
D) disruption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
53
In the eighteenth century, what political crime was considered to be most serious?

A) election fraud
B) espionage
C) treason
D) desertion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
54
What term refers to the covert practice of obtaining confidential information from organizations without their knowledge?

A) treason
B) espionage
C) corruption
D) voyeurism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
55
What political crime was former FBI agent, Robert Hanssen, convicted of?

A) espionage
B) election fraud
C) transnational crimes
D) securities fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
56
What type of espionage is deliberately inserting an individual into a corporation with the purpose of extracting confidential information without the corporation's knowledge an example of?

A) economic
B) political
C) industrial
D) military
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
57
What does the crime of terrorism emphasize in order to promote change?

A) rationality
B) violence
C) demonstrations
D) spying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
58
What is the purpose of terrorism?

A) to acquire profits for personal use
B) to demonstrate superiority over a competitor
C) to expose a vulnerability in a rival
D) to evoke change in the political party in power
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
59
What distinguishes terrorism from conventional warfare?

A) Terrorism does not involve excessive war-like violence.
B) Terrorism requires secrecy and operations to exert control over large populations.
C) Terrorism is not a very organized crime.
D) Terrorism is less political in its nature than conventional warfare.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
60
The word "assassin" is derived from an Arabic term. What does it mean?

A) crazy man
B) hashish eater
C) political prisoner
D) killer of men
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
61
In which historical period was terrorism more pervasive?

A) Elizabethan
B) Post Modern
C) Victorian
D) Middle Ages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
62
When did the word "terrorist" first become popular?

A) during the Second World War
B) during the Spanish Inquisition
C) during the French Revolution
D) during the plague in England
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following is characteristic of insurgents?

A) They engage in actions to maintain and promote the existing government.
B) The underlying motivation of any insurgent action is economic gain.
C) They engage in actions to oppose and undermine the existing government.
D) The purpose of insurgent action is to promote and maintain peace within the nation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
64
What kind of terrorism has, as its ultimate goal, replacing an existing government with a regime that holds acceptable political views?

A) political
B) revolutionary
C) nationalistic
D) individualistic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
65
What kind of terrorist group is the Ku Klux Klan an example of?

A) non-political
B) nationalistic
C) political
D) state-sponsored
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which type of terrorism is designed to promote the interests of minority ethnic groups or religious groups that believe they have been persecuted under majority rule?

A) state-sponsored
B) non-political
C) nationalistic
D) revolutionary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following is the best-known nationalistic terrorist group from Ireland?

A) the Irish Battalion of the Poor
B) the Provisional Irish Republican Army
C) the Liberation Front of Ireland
D) the Irish Nationalists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
68
What kind of terrorism is exemplified by anti-abortion groups sponsoring demonstrations at abortion clinics, attacking clinics, and killing doctors with bombs?

A) justifiable
B) non-political
C) nationalistic
D) state-sponsored
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
69
What kind of terrorism is represented by a repressive government regime forcing its citizens into obedience, oppressing minorities, and stifling political dissent?

A) nationalistic
B) state-sponsored
C) political
D) non-political
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
70
State-sponsored terrorism includes a type of violence which involves physical harm caused by the unequal distribution of wealth. What is this type of violence called?

A) feministic
B) structural
C) patriarchal
D) unstructured
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
71
What is the most extreme form of state-sponsored terrorism?

A) hijacking
B) genocide
C) structural
D) catastrophic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
72
What kind of terrorism involves individuals engaging in acts of violence as a way to demonstrate their loyalty to a group leader?

A) non-political
B) political
C) cult
D) patriotic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
73
How do leaders of cult terror groups ensure obedience from group members?

A) severe discipline
B) positive reinforcement
C) cultivating a supportive environment
D) engaging in open dialogue
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
74
What organization uses the acronym "ALF"?

A) Albanian Liberation Front
B) Armenian Liberty Foundation
C) Animal Liberation Front
D) Activism, Liberty, and Freedom
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
75
What is NOT a condition that has preceded genocide in Western societies?

A) authority orientation
B) "just world" thinking
C) new ideology
D) high levels of mental illness
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
76
What term refers to the organizational structure of a group in which the group is subdivided into smaller independent groups as a means to enhance security?

A) insurgent cell
B) militant cell
C) terror cell
D) guerrilla cell
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following factors may influence the formation of a terror cell?

A) socioeconomic status
B) personality type
C) educational background
D) family membership
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
78
What term refers to loosely organized groups with diverse leadership who are dispersed across a range of locations?

A) networks
B) webs
C) colonies
D) districts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which statement describes a characteristic of terrorist networks?

A) They follow a hierarchical model of leadership.
B) Most members are inexperienced.
C) They have access to vast amount of resources.
D) They are very well funded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
80
Terrorists may be motivated by feelings of alienation. What do they feel?

A) lost in the complexities of modern society
B) secure in their violent role
C) that their actions are wrong, but necessary
D) fearful to begin their actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 110 في هذه المجموعة.