Deck 17: Cyber Crime and the Future of Criminal Justice

ملء الشاشة (f)
exit full mode
سؤال
In which U.S. Supreme Court case did the Court ruling provide film and music companies with the ability to file piracy lawsuits against Internet file-sharing Web sites that market software used primarily to illegally download intellectual property?

A) Napster v. Illinois
B) MGM Studios v. Grokster.
C) Maxx v. Milnes
D) Roker v. Leaper
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When cyber criminals want to take their money-laundering operations one step
Further and avoid legitimate banks altogether, they can make use of
_______________.

A) digital banking
B) cyber money mules
C) laundering mules
D) digital currency
سؤال
A person who uses one computer to break into another is called a:

A) cyberbully
B) hacker
C) botnet
D) cyberstalking
سؤال
Buying and selling that takes place in cyberspace is called:

A) online auction fraud
B) e-commerce
C) online retail fraud
D) hacking
سؤال
Most parents are concerned more about pedophiles online than they are about __________, which is much more prevalent among children.

A) cyberbullying
B) hacking
C) cyberstalking
D) spyware
سؤال
Which of the following is one of the major challenges for law enforcement in dealing with cyber crime?

A) the limited amount of crime that is occurring
B) the difficulty of gathering evidence
C) the ease of dealing with jurisdictional issues
D) the multitude of resources that are available at the local level
سؤال
Which of the following is a computer program that can automatically replicate itself over a network such as the Internet and interfere with the normal use of a computer?.

A) virus
B) botnet
C) hacker
D) worm
سؤال
Which of the following is not something a worm or virus is typically programmed to do?

A) prompting host computers to continually crash
B) prompting host computers to continually reboot
C) steal someone's identity
D) infect the system
سؤال
Studies have shown that nearly __________ of American teenagers who use the Internet report being targets of cyberbullying.

A) one in five
B) one in ten
C) one in fifteen
D) one in seventeen
سؤال
In which of the following crimes do consumers order and pay for items that are never delivered?

A) online auction fraud
B) cybertheft
C) cyberhacking
D) online retail fraud
سؤال
Which of the following is NOT one of the three roles a computer can take on in a criminal act?

A) object
B) subject
C) instrument
D) model
سؤال
There are _____ state laws that target cyberbulling in the United States.

A) 24
B) 36
C) 44
D) 49
سؤال
About __________ of the approximately 3.4 million Americans who are stalked each year are victims of cyberstalking.

A) one in ten
B) one in eight
C) one in six
D) one in four
سؤال
Bulk e-mails, particularly of commercial advertising, sent in large quantities without the consent of the recipient are called:

A) malware
B) spam
C) viruses
D) worms
سؤال
Which of the following private efforts is NOT one of the efforts used to combat cyber crime?

A) the creation of laws
B) encryption
C) firewalls
D) patches
سؤال
A network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet is called a(n):

A) virus
B) botnet
C) hacker
D) worm
سؤال
The introduction of illegally gained funds into the legal financial system with the
Goal of covering up the funds' true origin is known as:

A) money laundering
B) digital currency
C) online banking
D) denial of service attack
سؤال
What protections ensure that a person who writes a book or a song or creates a software program is financially rewarded if that product is sold in the marketplace?

A) software and hardware
B) piracy and hacking
C) copyrights and patents
D) duplicates and rulings
سؤال
In what type of crime do the perpetrators try to get financial data and passwords from consumers by posing as a legitimate business such as a bank or credit-card company?

A) cyberbullying
B) hacking
C) phishing
D) cybertheft
سؤال
By 2010 nearly 300 billion spam messages were being sent each year, accounting for about ___ percent of all e-mails.

A) 97
B) 68
C) 35
D) 10
سؤال
Digital currency is the introduction of illegally gained funds into the legal financial system with the goal of covering up the funds' true origin.
سؤال
Which of the following is one of the main weaknesses of using encryption to protect material on computers?

A) the ease with which iencryptiont can be hacked
B) the rate at which encryption it becomes obsolete
C) the rate at which spam overrides encryptionit
D) the ease with which viruses obstruct encryptionit
سؤال
Research suggests that the greatest threats to children and teenagers on the Internet are other children and teenagers, not adult pedophiles.
سؤال
The crime of stalking, committed in cyberspace though the use of the Internet, e-mail, or another form of electronic communication is called __________.
سؤال
Many experts believe that Internet-enabled crime is going to increase dramatically in the near future.
سؤال
Malware is a term that refers to any program that is harmful to a computer or, by extension, a computer user.
سؤال
U.S. law requires that banks "know their customers"-that is, a banks is not required to know the source of a customer's funds.
سؤال
Which of the following is NOT one of the reasons why the Internet is conductive to child pornography?

A) speed
B) security
C) regulation
D) anonymity
سؤال
Which of the following is NOT a federal law regarding cybercrime?

A) it is a crime to gain unauthorized entry into a government computer and thereby discover information which is intended to remain confidential
B) it is a crime to transport child pornography in interstate or foreign commerce
C) it is a crime to use a computer to transmit adult pornography in interstate or foreign commerce
D) it is a crime to employ a minor or induce a minor to participate in making a visual depiction of a sexually explicit act
سؤال
Businesses sometimes fail to report cybercrimes for fear of losing customer confidence.
سؤال
A __________ is a person who uses one computer to break into another.
سؤال
The Internet has been a boon to the pornography industry.
سؤال
__________ is the willful and repeated emotional harm inflicted on another individual through the use of electronic devices such as computers and cell phones.
سؤال
Cybercrime is a crime that occurs online, in the virtual community of the __________.
سؤال
Today, cyber crime is the FBI's __________ priority, and each of the bureau's fifty-six field divisions has at least one agent who focuses solely on crimes committed on the Internet.

A) top
B) second-highest
C) third-highest
D) fourth-highest
سؤال
The illegal production and sales of material depicting sexually explicit conduct involving a child is called:

A) statutory rape
B) child sex trade
C) sex trafficking
D) child pornography
سؤال
All states have laws criminalizing aggressive behavior perpetrated through technology.
سؤال
The condition of not being recognized or having a traceable name or identity on
the Internet is known as _________.
سؤال
Every day, as many as 60,000 malicious programs circulate on the Internet.
سؤال
Twelve percent of all Web sites have pornographic content, and these sites
generate $4.2 billion in revenue a year.
سؤال
The unauthorized copying and use of the intellectual property is called __________.
سؤال
Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.
سؤال
A __________ is a network of computers that have been appropriated without the
knowledge of their owners and used to spread harmful programs via the Internet.
سؤال
Explain the difference between cyberbullying and cyberstalking and what states are doing to counteract these issues.
سؤال
Information or data of value to a criminal investigation that is either stored or transmitted by electronic means is called __________.
سؤال
Explain at least two of the issues with the use of credit cards on the Internet in relation to cyber
crime.
سؤال
_______________ is tThe application of computer technology to finding and utilizeing evidence of cyber crimes. is called __________.
سؤال
Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.
سؤال
Explain two some of the trends for the future of criminal justice.
سؤال
__________ is property resulting from intellectual, creative processes, such as books, films, or music.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 17: Cyber Crime and the Future of Criminal Justice
1
In which U.S. Supreme Court case did the Court ruling provide film and music companies with the ability to file piracy lawsuits against Internet file-sharing Web sites that market software used primarily to illegally download intellectual property?

A) Napster v. Illinois
B) MGM Studios v. Grokster.
C) Maxx v. Milnes
D) Roker v. Leaper
B
2
When cyber criminals want to take their money-laundering operations one step
Further and avoid legitimate banks altogether, they can make use of
_______________.

A) digital banking
B) cyber money mules
C) laundering mules
D) digital currency
B
3
A person who uses one computer to break into another is called a:

A) cyberbully
B) hacker
C) botnet
D) cyberstalking
B
4
Buying and selling that takes place in cyberspace is called:

A) online auction fraud
B) e-commerce
C) online retail fraud
D) hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Most parents are concerned more about pedophiles online than they are about __________, which is much more prevalent among children.

A) cyberbullying
B) hacking
C) cyberstalking
D) spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is one of the major challenges for law enforcement in dealing with cyber crime?

A) the limited amount of crime that is occurring
B) the difficulty of gathering evidence
C) the ease of dealing with jurisdictional issues
D) the multitude of resources that are available at the local level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is a computer program that can automatically replicate itself over a network such as the Internet and interfere with the normal use of a computer?.

A) virus
B) botnet
C) hacker
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is not something a worm or virus is typically programmed to do?

A) prompting host computers to continually crash
B) prompting host computers to continually reboot
C) steal someone's identity
D) infect the system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Studies have shown that nearly __________ of American teenagers who use the Internet report being targets of cyberbullying.

A) one in five
B) one in ten
C) one in fifteen
D) one in seventeen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
In which of the following crimes do consumers order and pay for items that are never delivered?

A) online auction fraud
B) cybertheft
C) cyberhacking
D) online retail fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is NOT one of the three roles a computer can take on in a criminal act?

A) object
B) subject
C) instrument
D) model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
There are _____ state laws that target cyberbulling in the United States.

A) 24
B) 36
C) 44
D) 49
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
About __________ of the approximately 3.4 million Americans who are stalked each year are victims of cyberstalking.

A) one in ten
B) one in eight
C) one in six
D) one in four
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Bulk e-mails, particularly of commercial advertising, sent in large quantities without the consent of the recipient are called:

A) malware
B) spam
C) viruses
D) worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following private efforts is NOT one of the efforts used to combat cyber crime?

A) the creation of laws
B) encryption
C) firewalls
D) patches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
A network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet is called a(n):

A) virus
B) botnet
C) hacker
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
The introduction of illegally gained funds into the legal financial system with the
Goal of covering up the funds' true origin is known as:

A) money laundering
B) digital currency
C) online banking
D) denial of service attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What protections ensure that a person who writes a book or a song or creates a software program is financially rewarded if that product is sold in the marketplace?

A) software and hardware
B) piracy and hacking
C) copyrights and patents
D) duplicates and rulings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
In what type of crime do the perpetrators try to get financial data and passwords from consumers by posing as a legitimate business such as a bank or credit-card company?

A) cyberbullying
B) hacking
C) phishing
D) cybertheft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
By 2010 nearly 300 billion spam messages were being sent each year, accounting for about ___ percent of all e-mails.

A) 97
B) 68
C) 35
D) 10
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Digital currency is the introduction of illegally gained funds into the legal financial system with the goal of covering up the funds' true origin.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is one of the main weaknesses of using encryption to protect material on computers?

A) the ease with which iencryptiont can be hacked
B) the rate at which encryption it becomes obsolete
C) the rate at which spam overrides encryptionit
D) the ease with which viruses obstruct encryptionit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Research suggests that the greatest threats to children and teenagers on the Internet are other children and teenagers, not adult pedophiles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
The crime of stalking, committed in cyberspace though the use of the Internet, e-mail, or another form of electronic communication is called __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Many experts believe that Internet-enabled crime is going to increase dramatically in the near future.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Malware is a term that refers to any program that is harmful to a computer or, by extension, a computer user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
U.S. law requires that banks "know their customers"-that is, a banks is not required to know the source of a customer's funds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is NOT one of the reasons why the Internet is conductive to child pornography?

A) speed
B) security
C) regulation
D) anonymity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is NOT a federal law regarding cybercrime?

A) it is a crime to gain unauthorized entry into a government computer and thereby discover information which is intended to remain confidential
B) it is a crime to transport child pornography in interstate or foreign commerce
C) it is a crime to use a computer to transmit adult pornography in interstate or foreign commerce
D) it is a crime to employ a minor or induce a minor to participate in making a visual depiction of a sexually explicit act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Businesses sometimes fail to report cybercrimes for fear of losing customer confidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
A __________ is a person who uses one computer to break into another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
The Internet has been a boon to the pornography industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
__________ is the willful and repeated emotional harm inflicted on another individual through the use of electronic devices such as computers and cell phones.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Cybercrime is a crime that occurs online, in the virtual community of the __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Today, cyber crime is the FBI's __________ priority, and each of the bureau's fifty-six field divisions has at least one agent who focuses solely on crimes committed on the Internet.

A) top
B) second-highest
C) third-highest
D) fourth-highest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The illegal production and sales of material depicting sexually explicit conduct involving a child is called:

A) statutory rape
B) child sex trade
C) sex trafficking
D) child pornography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
All states have laws criminalizing aggressive behavior perpetrated through technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The condition of not being recognized or having a traceable name or identity on
the Internet is known as _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Every day, as many as 60,000 malicious programs circulate on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Twelve percent of all Web sites have pornographic content, and these sites
generate $4.2 billion in revenue a year.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
The unauthorized copying and use of the intellectual property is called __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
A __________ is a network of computers that have been appropriated without the
knowledge of their owners and used to spread harmful programs via the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Explain the difference between cyberbullying and cyberstalking and what states are doing to counteract these issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Information or data of value to a criminal investigation that is either stored or transmitted by electronic means is called __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Explain at least two of the issues with the use of credit cards on the Internet in relation to cyber
crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
_______________ is tThe application of computer technology to finding and utilizeing evidence of cyber crimes. is called __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Explain two some of the trends for the future of criminal justice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
__________ is property resulting from intellectual, creative processes, such as books, films, or music.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.