Deck 13: Technology and Crime

ملء الشاشة (f)
exit full mode
سؤال
What is the main difference in the two broad categories of identity theft?

A)the amount of the costs to the victim
B)whether the thief is apprehended or not
C)the length of time before the victim realizes the theft
D)whether the fraud is with existing or new accounts
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Because of technology,we can be sure that

A)almost all criminals will be successfully prosecuted.
B)tomorrow's crimes will differ from those of today.
C)crime scene investigation will become more exciting.
D)criminals will take over the world.
سؤال
Identity theft is considered a type of

A)robbery.
B)larceny.
C)theft.
D)burglary.
سؤال
Provisions of the Communications Decency Act (CDA)have been struck down by the Supreme Court because

A)they were inherently inconsistent.
B)they abridged protected freedoms of speech.
C)they protected adults at the expense of children.
D)they did not address good faith efforts to restrict content.
سؤال
New technology specifically for use in apprehending criminals includes all of the following except which?

A)radar-detector detectors
B)the Spiderman snare
C)transponder-based automated vehicle location (AVL)systems
D)a disorienting strobe light
سؤال
Technology and crime ________ closely linked.

A)are about to become
B)have recently become
C)are sometimes
D)have always been
سؤال
Perpetrators of identity theft

A)most often target acquaintances.
B)are rarely known to their victims.
C)usually have extensive criminal backgrounds.
D)are more likely now than previously to be individuals.
سؤال
Cybercrime and white-collar crime have all of the following in common except which?

A)They often result in no personal financial gains.
B)They often use nonviolent means.
C)They often rely on access to computers or storage media.
D)They often involve information manipulation.
سؤال
What is TEMPEST?

A)an international computer security consortium
B)an anti-theft software program
C)a security standard developed by the U.S.military
D)a protocol for handling data securely
سؤال
In which of these areas are cyberthreats least likely?

A)United States
B)Canada
C)Central America
D)Peru
سؤال
Which of these methods of illegitimate access to a computer is known as "computer trespass"?

A)Direct access by a corporate spy.
B)Remote access via a computer modem.
C)Reading the electromagnetic radiation.
D)Detecting and interpreting keystroke activity from a distance.
سؤال
What is cyberbanging?

A)use of the Internet for sexual solicitation
B)use of the Internet to attack politicians
C)use of the Internet to out sexual predators
D)use of the Internet by street gangs
سؤال
What is a "cookie"?

A)a small program sent to users' machines by servers on the Web
B)a virus program concealed in an attractive pop-up
C)the name for a rogue code secreted in a text document
D)an accidentally released computer virus
سؤال
Trap doors and logic bombs are examples of which category of cybercrime?

A)computer-manipulation crimes
B)hardware,software,and information theft
C)support of criminal enterprises
D)internal cybercrimes (malware)
سؤال
The contrast between cyberspace and the physical and social reality of the real world is summed up in the term

A)user interface.
B)hypermedia.
C)virtual reality.
D)hackers.
سؤال
Polymorphic viruses differ from other viruses in their ability to

A)infect handheld devices,such as PDAs and mobile phones.
B)alter themselves after they have infected a computer.
C)be quickly caught by signature-based antivirus-scanning technologies.
D)interfere with a computer's ability to send and receive e-mail
سؤال
Social disorganization has been shown to

A)lead to a reversal in the advances of technology.
B)foment a renewed drive for technological advances.
C)result in illegal attempts to acquire dangerous technology.
D)encourage the spread of technology among law enforcement agencies.
سؤال
The valuable information that high-technology crime targets is best described as

A)financial information.
B)personal,identifying information.
C)a wide range of highly valuable data.
D)patentable inventions.
سؤال
Identity theft would be less likely if

A)Social Security numbers were used less in the public sector.
B)Social Security numbers became the sole form of identification.
C)Social Security numbers were done away with.
D)Social Security numbers were always used with an additional ID.
سؤال
The trial judge has to decide is an expert's testimony is

A)reliable and relevant.
B)accurate and accessible.
C)cogent and comprehensive.
D)clear and correct.
سؤال
Cybercrime statues were proactively developed by states and the federal government when law enforcement officers realized that they would help prevent jury confusion.
سؤال
The world's largest computer network is

A)cyberspace.
B)the Web.
C)the Internet.
D)hyperspace.
سؤال
The citizens' group that has taken on the task of helping refine notions of privacy and legality as they relate to telecommunications and other computer-based media is the

A)Computer Security Institute (CSI).
B)Anti-Phishing Working Group.
C)American Cryptography Association.
D)Electronic Frontier Foundation (EFF).
سؤال
A computer virus is a program designed to invade a computer system and modify its operation or alter the information it stores.
سؤال
Cybercrime simply refers to any crime that violates any federal or state cybercrime legislation.
سؤال
Technology is used by both crime fighters and law breakers.
سؤال
The distinctions between different types of computer malware are primarily based on how much damage they cause.
سؤال
Most viruses hide inside executable computer software in the "boot sectors" of storage media.
سؤال
America's first cohesive national cyber security system for identifying,analyzing,and prioritizing emerging vulnerabilities and threats is called the

A)United States Computer Emergency Readiness Team (US -CERT).
B)Comprehensive National Cybersecurity Initiative (CNCI).
C)National Cyber Alert System.
D)National Infrastructure Protection Center (NIPC).
سؤال
ISPs are mainly involved in doing which of the following?

A)hosting websites
B)building the Internet
C)providing Internet access
D)helping users find information
سؤال
The situation in which prosecution was impeded by the inability of many state and local police departments to skillfully investigate cybercrimes has been changing because of

A)the efforts of the FBI and the Department of Justice.
B)federal grants to fund local cybercrime units.
C)the opening of a new training facility for local officers.
D)cybercrime becoming a greater priority at the local level.
سؤال
Because it guarantees freedom of speech and the question of what constitutes speech has been raised,the _______ to the Constitution may need reinterpretation.

A)First Amendment
B)Second Amendment
C)Third Amendment
D)Fourth Amendment
سؤال
The yearly cost of cybercrime is over half a billion dollars.
سؤال
The first person to be indicted for writing something on the Internet was charged by the FBI after posting threats and released after 29 days in prison based on his writings being protected under the free speech clause.
سؤال
The amount of illegal software in use worldwide is only about a fifth of all software.
سؤال
Which of these questions speaks to the issue of security in our "persons,houses,papers,and effects,against unreasonable searches and seizures"?

A)Does e-mail qualify as speech?
B)What are papers?
C)Does social networking qualify as peaceable assembling?
D)Are forum postings a form of speech?
سؤال
Cybercrime could potentially lead to personal injury.
سؤال
AFIS allows investigators to

A)take a 360-degreee image of a bullet.
B)match a suspect's fingerprints more quickly.
C)create a simulated,computerized crime scene.
D)safely disable a motor vehicle's electrical system.
سؤال
The crimes of the Information Age require review of the Constitution because

A)basic definitions must be reassessed.
B)criminal penalties must be raised.
C)new amendments must be considered.
D)the concept of crime must be updated.
سؤال
Cybercriminals can work internationally through the Internet without passports,plane tickets,or associates,while law enforcement officials

A)require partnerships for international investigations.
B)accrue extensive travel costs chasing them.
C)are unable to trace the convoluted paths across the Internet.
D)are thwarted by their limited jurisdictions.
سؤال
Someone who uses computers for exploration or exploitation is known as a(n)________.
سؤال
The standard of scientific acceptability applicable to the gathering of evidence in criminal cases is known as the ________.
سؤال
When criminals misuse another individuals' personal information to commit fraud,they are guilty of ________.
سؤال
Gang members are using ________ to circumvent court injunctions that forbid members from meeting face-to-face.
سؤال
Identity theft became a federal crime in 2008.
سؤال
The development of telecommunication technology has raised new questions about individual's rights and protections.
سؤال
Identify theft has indirect costs,such as costs related to prevention and mitigation.
سؤال
Computer viruses,worms,and spyware are examples of ________.
سؤال
Identity theft affects people's decisions about shopping online.
سؤال
"Warez" are the results of the unauthorized and illegal copying of software programs,or ________.
سؤال
Money today is really only information.
سؤال
Computer-related crime and cybercrime are two names for the same thing.
سؤال
Computer hacking began with the rise of mass-market personal computers in the late 1970s.
سؤال
An expert in cybercrimes believes that specialized sanctions,such as confiscating and limiting access to computer equipment,is necessary to deter cybercrimes.
سؤال
Hacker Kevin Mitnick developed a method of getting a trusted insider to perform an action that enables a hacking attack and referred to it as ________.
سؤال
Most hackers are young adolescent males.
سؤال
When investigators use biological residue found at a crime scene for genetic comparison to aid in identifying criminal suspects,they are using ________.
سؤال
Someone who sends an official-looking e-mail message to try to steal valuable personal information is engaging in ________.
سؤال
The meeting place of computer technology and human psychology that exists only within electronic networks is called ________.
سؤال
Web sites are immune to use for criminal activity.
سؤال
Also known as risk analysis,________ involves a thorough assessment of perils facing an organization.
سؤال
The combination of computer hardware and software that attempts to duplicate a skilled investigator's decision-making processes when analyzing evidence and recognizing patterns is known as a(n)________.
سؤال
How might similarities between hacking and playing computer games blur the lines between entertainment and crime?
سؤال
Explain how developments in communications have brought into question definitions of long-standing.Which terms need to be redefined and why?
سؤال
Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?
سؤال
Describe the range of cybercriminals known as hackers.
سؤال
How is the use of computer technology by criminals and law enforcement similar too and different from the use of other types of technology to perpetrate crimes and bring perpetrators to justice?
سؤال
Do you agree with President Barack Obama that "the cyberthreat is one of the most serious economic and national security challenges we face as a nation"?
سؤال
One method of protecting electronic communications is ________,a method for encoding information to make it unreadable to all but the intended recipient.
سؤال
The network diagnostic tool developed by the FBI to intercept suspect personal communications delivered via wireless services is called ________.
سؤال
Compare and contrast phone phreaking with phishing.
سؤال
The sequential record of system activities surrounding an event,a(n)_______,enables investigators to reconstruct,review,and examine what happened during a computer crime after the fact.
سؤال
What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?
سؤال
Match between columns
Explorers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Explorers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Explorers
Individuals who focus on defeating copy protection either to play games or as a game
Explorers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Explorers
Individuals who hack for fun and without intending harm
Explorers
Malicious individuals who cause damage to computer systems without seeking gain
Game Players
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Game Players
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Game Players
Individuals who focus on defeating copy protection either to play games or as a game
Game Players
Individuals who make unplanned forays into evolving technology for the sake of discovery
Game Players
Individuals who hack for fun and without intending harm
Game Players
Malicious individuals who cause damage to computer systems without seeking gain
Pioneers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Pioneers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Pioneers
Individuals who focus on defeating copy protection either to play games or as a game
Pioneers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Pioneers
Individuals who hack for fun and without intending harm
Pioneers
Malicious individuals who cause damage to computer systems without seeking gain
Vandals
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Vandals
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Vandals
Individuals who focus on defeating copy protection either to play games or as a game
Vandals
Individuals who make unplanned forays into evolving technology for the sake of discovery
Vandals
Individuals who hack for fun and without intending harm
Vandals
Malicious individuals who cause damage to computer systems without seeking gain
Addicts
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Addicts
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Addicts
Individuals who focus on defeating copy protection either to play games or as a game
Addicts
Individuals who make unplanned forays into evolving technology for the sake of discovery
Addicts
Individuals who hack for fun and without intending harm
Addicts
Malicious individuals who cause damage to computer systems without seeking gain
Scamps
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Scamps
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Scamps
Individuals who focus on defeating copy protection either to play games or as a game
Scamps
Individuals who make unplanned forays into evolving technology for the sake of discovery
Scamps
Individuals who hack for fun and without intending harm
Scamps
Malicious individuals who cause damage to computer systems without seeking gain
سؤال
Match between columns
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1996 to protect minors from harmful material on the Internet
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 2002 to create new sentencing guidelines for cybercriminals
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Communications Decency Act (CDA)
Passed in 1996 to protect minors from harmful material on the Internet
Communications Decency Act (CDA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Communications Decency Act (CDA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Communications Decency Act (CDA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
No Electronic Theft Act (NETA)
Passed in 1996 to protect minors from harmful material on the Internet
No Electronic Theft Act (NETA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
No Electronic Theft Act (NETA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
No Electronic Theft Act (NETA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Cyber Security Enhancement Act (CSEA)
Passed in 1996 to protect minors from harmful material on the Internet
Cyber Security Enhancement Act (CSEA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Cyber Security Enhancement Act (CSEA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Cyber Security Enhancement Act (CSEA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Technology and Crime
1
What is the main difference in the two broad categories of identity theft?

A)the amount of the costs to the victim
B)whether the thief is apprehended or not
C)the length of time before the victim realizes the theft
D)whether the fraud is with existing or new accounts
D
2
Because of technology,we can be sure that

A)almost all criminals will be successfully prosecuted.
B)tomorrow's crimes will differ from those of today.
C)crime scene investigation will become more exciting.
D)criminals will take over the world.
B
3
Identity theft is considered a type of

A)robbery.
B)larceny.
C)theft.
D)burglary.
B
4
Provisions of the Communications Decency Act (CDA)have been struck down by the Supreme Court because

A)they were inherently inconsistent.
B)they abridged protected freedoms of speech.
C)they protected adults at the expense of children.
D)they did not address good faith efforts to restrict content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
New technology specifically for use in apprehending criminals includes all of the following except which?

A)radar-detector detectors
B)the Spiderman snare
C)transponder-based automated vehicle location (AVL)systems
D)a disorienting strobe light
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
Technology and crime ________ closely linked.

A)are about to become
B)have recently become
C)are sometimes
D)have always been
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
Perpetrators of identity theft

A)most often target acquaintances.
B)are rarely known to their victims.
C)usually have extensive criminal backgrounds.
D)are more likely now than previously to be individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
Cybercrime and white-collar crime have all of the following in common except which?

A)They often result in no personal financial gains.
B)They often use nonviolent means.
C)They often rely on access to computers or storage media.
D)They often involve information manipulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is TEMPEST?

A)an international computer security consortium
B)an anti-theft software program
C)a security standard developed by the U.S.military
D)a protocol for handling data securely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
In which of these areas are cyberthreats least likely?

A)United States
B)Canada
C)Central America
D)Peru
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of these methods of illegitimate access to a computer is known as "computer trespass"?

A)Direct access by a corporate spy.
B)Remote access via a computer modem.
C)Reading the electromagnetic radiation.
D)Detecting and interpreting keystroke activity from a distance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is cyberbanging?

A)use of the Internet for sexual solicitation
B)use of the Internet to attack politicians
C)use of the Internet to out sexual predators
D)use of the Internet by street gangs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is a "cookie"?

A)a small program sent to users' machines by servers on the Web
B)a virus program concealed in an attractive pop-up
C)the name for a rogue code secreted in a text document
D)an accidentally released computer virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
Trap doors and logic bombs are examples of which category of cybercrime?

A)computer-manipulation crimes
B)hardware,software,and information theft
C)support of criminal enterprises
D)internal cybercrimes (malware)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
The contrast between cyberspace and the physical and social reality of the real world is summed up in the term

A)user interface.
B)hypermedia.
C)virtual reality.
D)hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
Polymorphic viruses differ from other viruses in their ability to

A)infect handheld devices,such as PDAs and mobile phones.
B)alter themselves after they have infected a computer.
C)be quickly caught by signature-based antivirus-scanning technologies.
D)interfere with a computer's ability to send and receive e-mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
Social disorganization has been shown to

A)lead to a reversal in the advances of technology.
B)foment a renewed drive for technological advances.
C)result in illegal attempts to acquire dangerous technology.
D)encourage the spread of technology among law enforcement agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
The valuable information that high-technology crime targets is best described as

A)financial information.
B)personal,identifying information.
C)a wide range of highly valuable data.
D)patentable inventions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
Identity theft would be less likely if

A)Social Security numbers were used less in the public sector.
B)Social Security numbers became the sole form of identification.
C)Social Security numbers were done away with.
D)Social Security numbers were always used with an additional ID.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
The trial judge has to decide is an expert's testimony is

A)reliable and relevant.
B)accurate and accessible.
C)cogent and comprehensive.
D)clear and correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
Cybercrime statues were proactively developed by states and the federal government when law enforcement officers realized that they would help prevent jury confusion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
The world's largest computer network is

A)cyberspace.
B)the Web.
C)the Internet.
D)hyperspace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
The citizens' group that has taken on the task of helping refine notions of privacy and legality as they relate to telecommunications and other computer-based media is the

A)Computer Security Institute (CSI).
B)Anti-Phishing Working Group.
C)American Cryptography Association.
D)Electronic Frontier Foundation (EFF).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
A computer virus is a program designed to invade a computer system and modify its operation or alter the information it stores.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
Cybercrime simply refers to any crime that violates any federal or state cybercrime legislation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
Technology is used by both crime fighters and law breakers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
The distinctions between different types of computer malware are primarily based on how much damage they cause.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
Most viruses hide inside executable computer software in the "boot sectors" of storage media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
America's first cohesive national cyber security system for identifying,analyzing,and prioritizing emerging vulnerabilities and threats is called the

A)United States Computer Emergency Readiness Team (US -CERT).
B)Comprehensive National Cybersecurity Initiative (CNCI).
C)National Cyber Alert System.
D)National Infrastructure Protection Center (NIPC).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
ISPs are mainly involved in doing which of the following?

A)hosting websites
B)building the Internet
C)providing Internet access
D)helping users find information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
The situation in which prosecution was impeded by the inability of many state and local police departments to skillfully investigate cybercrimes has been changing because of

A)the efforts of the FBI and the Department of Justice.
B)federal grants to fund local cybercrime units.
C)the opening of a new training facility for local officers.
D)cybercrime becoming a greater priority at the local level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
Because it guarantees freedom of speech and the question of what constitutes speech has been raised,the _______ to the Constitution may need reinterpretation.

A)First Amendment
B)Second Amendment
C)Third Amendment
D)Fourth Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
The yearly cost of cybercrime is over half a billion dollars.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
The first person to be indicted for writing something on the Internet was charged by the FBI after posting threats and released after 29 days in prison based on his writings being protected under the free speech clause.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
The amount of illegal software in use worldwide is only about a fifth of all software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of these questions speaks to the issue of security in our "persons,houses,papers,and effects,against unreasonable searches and seizures"?

A)Does e-mail qualify as speech?
B)What are papers?
C)Does social networking qualify as peaceable assembling?
D)Are forum postings a form of speech?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
Cybercrime could potentially lead to personal injury.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
AFIS allows investigators to

A)take a 360-degreee image of a bullet.
B)match a suspect's fingerprints more quickly.
C)create a simulated,computerized crime scene.
D)safely disable a motor vehicle's electrical system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
The crimes of the Information Age require review of the Constitution because

A)basic definitions must be reassessed.
B)criminal penalties must be raised.
C)new amendments must be considered.
D)the concept of crime must be updated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
Cybercriminals can work internationally through the Internet without passports,plane tickets,or associates,while law enforcement officials

A)require partnerships for international investigations.
B)accrue extensive travel costs chasing them.
C)are unable to trace the convoluted paths across the Internet.
D)are thwarted by their limited jurisdictions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
Someone who uses computers for exploration or exploitation is known as a(n)________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
The standard of scientific acceptability applicable to the gathering of evidence in criminal cases is known as the ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
When criminals misuse another individuals' personal information to commit fraud,they are guilty of ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
Gang members are using ________ to circumvent court injunctions that forbid members from meeting face-to-face.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
Identity theft became a federal crime in 2008.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
The development of telecommunication technology has raised new questions about individual's rights and protections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
Identify theft has indirect costs,such as costs related to prevention and mitigation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
Computer viruses,worms,and spyware are examples of ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
Identity theft affects people's decisions about shopping online.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
"Warez" are the results of the unauthorized and illegal copying of software programs,or ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
Money today is really only information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
Computer-related crime and cybercrime are two names for the same thing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
Computer hacking began with the rise of mass-market personal computers in the late 1970s.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
An expert in cybercrimes believes that specialized sanctions,such as confiscating and limiting access to computer equipment,is necessary to deter cybercrimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
Hacker Kevin Mitnick developed a method of getting a trusted insider to perform an action that enables a hacking attack and referred to it as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
Most hackers are young adolescent males.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
When investigators use biological residue found at a crime scene for genetic comparison to aid in identifying criminal suspects,they are using ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
Someone who sends an official-looking e-mail message to try to steal valuable personal information is engaging in ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
The meeting place of computer technology and human psychology that exists only within electronic networks is called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
Web sites are immune to use for criminal activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
Also known as risk analysis,________ involves a thorough assessment of perils facing an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
The combination of computer hardware and software that attempts to duplicate a skilled investigator's decision-making processes when analyzing evidence and recognizing patterns is known as a(n)________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
How might similarities between hacking and playing computer games blur the lines between entertainment and crime?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
Explain how developments in communications have brought into question definitions of long-standing.Which terms need to be redefined and why?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
Describe the range of cybercriminals known as hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
How is the use of computer technology by criminals and law enforcement similar too and different from the use of other types of technology to perpetrate crimes and bring perpetrators to justice?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
Do you agree with President Barack Obama that "the cyberthreat is one of the most serious economic and national security challenges we face as a nation"?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
One method of protecting electronic communications is ________,a method for encoding information to make it unreadable to all but the intended recipient.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
The network diagnostic tool developed by the FBI to intercept suspect personal communications delivered via wireless services is called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
Compare and contrast phone phreaking with phishing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
The sequential record of system activities surrounding an event,a(n)_______,enables investigators to reconstruct,review,and examine what happened during a computer crime after the fact.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
Match between columns
Explorers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Explorers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Explorers
Individuals who focus on defeating copy protection either to play games or as a game
Explorers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Explorers
Individuals who hack for fun and without intending harm
Explorers
Malicious individuals who cause damage to computer systems without seeking gain
Game Players
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Game Players
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Game Players
Individuals who focus on defeating copy protection either to play games or as a game
Game Players
Individuals who make unplanned forays into evolving technology for the sake of discovery
Game Players
Individuals who hack for fun and without intending harm
Game Players
Malicious individuals who cause damage to computer systems without seeking gain
Pioneers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Pioneers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Pioneers
Individuals who focus on defeating copy protection either to play games or as a game
Pioneers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Pioneers
Individuals who hack for fun and without intending harm
Pioneers
Malicious individuals who cause damage to computer systems without seeking gain
Vandals
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Vandals
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Vandals
Individuals who focus on defeating copy protection either to play games or as a game
Vandals
Individuals who make unplanned forays into evolving technology for the sake of discovery
Vandals
Individuals who hack for fun and without intending harm
Vandals
Malicious individuals who cause damage to computer systems without seeking gain
Addicts
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Addicts
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Addicts
Individuals who focus on defeating copy protection either to play games or as a game
Addicts
Individuals who make unplanned forays into evolving technology for the sake of discovery
Addicts
Individuals who hack for fun and without intending harm
Addicts
Malicious individuals who cause damage to computer systems without seeking gain
Scamps
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Scamps
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Scamps
Individuals who focus on defeating copy protection either to play games or as a game
Scamps
Individuals who make unplanned forays into evolving technology for the sake of discovery
Scamps
Individuals who hack for fun and without intending harm
Scamps
Malicious individuals who cause damage to computer systems without seeking gain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
Match between columns
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1996 to protect minors from harmful material on the Internet
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 2002 to create new sentencing guidelines for cybercriminals
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Communications Decency Act (CDA)
Passed in 1996 to protect minors from harmful material on the Internet
Communications Decency Act (CDA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Communications Decency Act (CDA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Communications Decency Act (CDA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
No Electronic Theft Act (NETA)
Passed in 1996 to protect minors from harmful material on the Internet
No Electronic Theft Act (NETA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
No Electronic Theft Act (NETA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
No Electronic Theft Act (NETA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Cyber Security Enhancement Act (CSEA)
Passed in 1996 to protect minors from harmful material on the Internet
Cyber Security Enhancement Act (CSEA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Cyber Security Enhancement Act (CSEA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Cyber Security Enhancement Act (CSEA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.