Deck 14: Criminal Justice in the New Millennium: Terrorism, Homeland Security, and Cyber Crime

ملء الشاشة (f)
exit full mode
سؤال
Which one of the following is not one of the theoretical explanations for terrorism discussed in the text?

A)Social learning
B)Socialization
C)Alienation
D)Psychological
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Cyber crime appeared on the radar of criminologists approximately ____ years ago.

A)10
B)15
C)20
D)25
سؤال
____ terrorists use violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views.

A)Revolutionary
B)Political
C)Nationalist
D)Retributive
سؤال
Which of the following is not a type of internet securities fraud?

A)Identity theft
B)Market manipulation
C)Fraudulent offerings of securities
D)Illegal touting
سؤال
Cyber crime is challenging because:

A)it is difficult to detect through traditional law enforcement channels.
B)it is rapidly evolving.
C)its control demands that agents of the justice system develop technical skills.
D)All of these
سؤال
____ terrorists fight for a cause with people anywhere whose ideology and/or religion they find objectionable.

A)Revolutionary
B)Political
C)Nationalist
D)Retributive
سؤال
The term "terror" was associated with unrest in ____ in 1917.

A)France
B)Germany
C)Russia
D)Ireland
سؤال
About ____ percent of cargo containers entering the United States every day get screened.

A)5
B)15
C)30
D)45
سؤال
According to the text, a(n) ____ uses criminal and violent acts to influence an audience beyond the immediate target.

A)terrorist
B)guerilla
C)insurgent
D)revolutionary
سؤال
A(n) ____ is the term for an irregular military band located in rural areas that attack military, police, and government targets.

A)terrorist
B)guerilla
C)insurgent
D)revolutionary
سؤال
There are approximately 130 nuclear research reactors in ____ countries, with two dozen of these having enough highly enriched uranium for one or more nuclear bombs.

A)20
B)30
C)40
D)50
سؤال
The Department of Homeland Security is responsible for securing our nation's borders and transportation systems, which include ____ ports of entry.

A)150
B)250
C)350
D)450
سؤال
Civil libertarians argue that ____ Amendment rights may be violated by the US Patriot Act.

A)First
B)Second
C)Fifth
D)Eighth
سؤال
____ terrorists promote the interests of a minority ethnic or religious group that believes it has been persecuted under majority rule and wishes to carve out its own independent homeland.

A)Revolutionary
B)Political
C)Nationalist
D)Retributive
سؤال
____ created the Anti-Terrorism Information Center to divide the state into operational zones and link federal, state, and local information services into one system to combat terrorism.

A)Alabama
B)California
C)Illinois
D)Texas
سؤال
____ is the illegal acquisition of personal information such as bank passwords and credit card numbers, by masquerading as a trustworthy person/business in what appears to be an official electronic communication.

A)Etailing fraud
B)Phishing
C)Cyber theft
D)Touting
سؤال
In what year did Congress pass legislation authorizing the creation of the Department of Homeland Security?

A)1998
B)2000
C)2002
D)2004
سؤال
Spending on IT and telecommunications will grow by more than 6 percent each year, soon reaching about ____.

A)$200,000
B)$2 million
C)$2 billion
D)$2 trillion
سؤال
Which of the following is not an aim of the USA Patriot Act?

A)To give sweeping new powers to domestic law enforcement and international intelligence agencies to in an effort to fight terrorism
B)To expand the definition of terrorist activities
C)To alter sanctions for violent terrorism
D)All of the above are aims of the USA Patriot Act.
سؤال
____ is the use of computer networks for undermining the social, economic, and political system of an enemy through the destruction of infrastructure.

A)Cyber theft
B)Cyber vandalism
C)Cyber terrorism
D)Cyber movement
سؤال
Which of the following types of cyber crime was not discussed in the text?

A)Cyber terrorism
B)Phishing
C)Etailing
D)Chiseling
سؤال
The Department of Homeland Security is responsible for securing our nation's borders and transportation systems.
سؤال
Cyber terrorism may result in a battered economy in which the government is forced to spend more on the military and cut back on social programs and education.
سؤال
It is difficult to detect and control internet pornography. Congress has struggled to create legislation that will restrict usage without violating ____ Amendment rights.

A)First
B)Fourth
C)Sixth
D)Eighth
سؤال
In what type of cyber crime are small amounts of money subtracted from customers' accounts and added to the account of the thief?

A)Phishing
B)Chiseling
C)Salami fraud
D)Trojan Horse
سؤال
The United States Criminal Code provides penalties for a first time illegal copyright offender of ____ years incarceration and a fine of $250,000.

A)3
B)5
C)7
D)10
سؤال
The salami slice is a computer program secretly attached to a company's computer system.
سؤال
____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.

A)Warez
B)Denial of service attack
C)Market manipulation
D)Cyber theft
سؤال
The view that terrorists suffer psychological abnormality is well accepted by those advocating the psychological view.
سؤال
According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000. A second-time offender will receive 5 years incarceration.
سؤال
Since September 11, 2001, biometrics has been implemented in many facets of the security systems of the United States.
سؤال
Lack of economic opportunity and recessionary economies are positively correlated with terrorism.
سؤال
The term "terrorism" first appeared during the Bolshevik takeover.
سؤال
There is some concern that the Child Online Protection Act controls free speech.
سؤال
____ involves hacking secure computer networks at the enemy's most sensitive military bases, defense contractors, and aerospace companies in order to steal important data or to access their defenses.

A)Cyber terrorism
B)Cyber espionage
C)Cyber bullying
D)Cyber stalking
سؤال
____ is one type of malicious software program that disrupts or destroys existing programs and networks.

A)Computer worm
B)Computer virus
C)Trojan horse
D)Cyber bullying
سؤال
Which type of cyber vandalism appears as a benign application which actually contains codes that can damage the system operations?

A)Mydoom
B)Trojan horse
C)Malware
D)Dhiseling
سؤال
____ is the term used to describe the illegal use of the internet to buy or sell merchandise online.

A)Cyber theft
B)Etailing fraud
C)Market manipulation
D)Denial of service attack
سؤال
Death squads and the use of government troops to destroy political opposition parties are often associated with state-sponsored terrorism.
سؤال
Since 1995, the New York Electronic Crimes Task Force has charged over 1000 individuals with electronic crime losses exceeding ____.

A)$1 million
B)$10 million
C)$1 billion
D)$10 billion
سؤال
Explain what New York City's new Counterterrorism Bureau is doing to deal with the threat of terrorism.
سؤال
____________________ is slang for the processes used to acquire personal information used for identity theft and other fraudulent activities.
سؤال
Elaborate three types of contemporary terrorism.
سؤال
Discuss the purposes of the USA Patriot Act and then detail the concern about this Act by civil libertarians.
سؤال
____________________ is an attack against an enemy nation's technological infrastructure.
سؤال
____________________ occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
سؤال
Discuss the role of the Department of Homeland Security in the fight against terrorism.
سؤال
Discuss the last twenty years in the history of terrorism.
سؤال
Some policy experts suggest that the way to fight terrorism is to use political solutions. Discuss several political solutions to the fight against terrorism using al Qaeda as an example.
سؤال
____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and processed by computer networks.
سؤال
Discuss some of the problems with enforcing cyber laws and recent initiatives to attempt to combat cyber crime.
سؤال
The ____________________ view of terrorism argues that if terrorists suffer psychological deficiencies it is because they have been poorly and improperly socialized.
سؤال
Discuss the evolving role of law enforcement in fighting terrorism.
سؤال
The Department of ____________________ is assigned to prevent the importation of nuclear weapons and material.
سؤال
Compare and contrast two of the prevailing views on the motivation of terrorists.
سؤال
Select and discuss three types of computer crimes.
سؤال
On October 26, 2001, Congress passed the ____________________.
سؤال
The ____________________ is a computer program that appears benign but actually contains something harmful.
سؤال
The FBI is now charged with coordinating intelligence collection with the Border Patrol, Secret Service, and the ____________________.
سؤال
The USAPA expands all four traditional tools of surveillance - wiretaps, search warrants, pen/trap orders, and ____________________.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Criminal Justice in the New Millennium: Terrorism, Homeland Security, and Cyber Crime
1
Which one of the following is not one of the theoretical explanations for terrorism discussed in the text?

A)Social learning
B)Socialization
C)Alienation
D)Psychological
A
2
Cyber crime appeared on the radar of criminologists approximately ____ years ago.

A)10
B)15
C)20
D)25
D
3
____ terrorists use violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views.

A)Revolutionary
B)Political
C)Nationalist
D)Retributive
A
4
Which of the following is not a type of internet securities fraud?

A)Identity theft
B)Market manipulation
C)Fraudulent offerings of securities
D)Illegal touting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
5
Cyber crime is challenging because:

A)it is difficult to detect through traditional law enforcement channels.
B)it is rapidly evolving.
C)its control demands that agents of the justice system develop technical skills.
D)All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ terrorists fight for a cause with people anywhere whose ideology and/or religion they find objectionable.

A)Revolutionary
B)Political
C)Nationalist
D)Retributive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
7
The term "terror" was associated with unrest in ____ in 1917.

A)France
B)Germany
C)Russia
D)Ireland
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
8
About ____ percent of cargo containers entering the United States every day get screened.

A)5
B)15
C)30
D)45
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
9
According to the text, a(n) ____ uses criminal and violent acts to influence an audience beyond the immediate target.

A)terrorist
B)guerilla
C)insurgent
D)revolutionary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
10
A(n) ____ is the term for an irregular military band located in rural areas that attack military, police, and government targets.

A)terrorist
B)guerilla
C)insurgent
D)revolutionary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
11
There are approximately 130 nuclear research reactors in ____ countries, with two dozen of these having enough highly enriched uranium for one or more nuclear bombs.

A)20
B)30
C)40
D)50
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
12
The Department of Homeland Security is responsible for securing our nation's borders and transportation systems, which include ____ ports of entry.

A)150
B)250
C)350
D)450
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
13
Civil libertarians argue that ____ Amendment rights may be violated by the US Patriot Act.

A)First
B)Second
C)Fifth
D)Eighth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ terrorists promote the interests of a minority ethnic or religious group that believes it has been persecuted under majority rule and wishes to carve out its own independent homeland.

A)Revolutionary
B)Political
C)Nationalist
D)Retributive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ created the Anti-Terrorism Information Center to divide the state into operational zones and link federal, state, and local information services into one system to combat terrorism.

A)Alabama
B)California
C)Illinois
D)Texas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ is the illegal acquisition of personal information such as bank passwords and credit card numbers, by masquerading as a trustworthy person/business in what appears to be an official electronic communication.

A)Etailing fraud
B)Phishing
C)Cyber theft
D)Touting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
17
In what year did Congress pass legislation authorizing the creation of the Department of Homeland Security?

A)1998
B)2000
C)2002
D)2004
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
18
Spending on IT and telecommunications will grow by more than 6 percent each year, soon reaching about ____.

A)$200,000
B)$2 million
C)$2 billion
D)$2 trillion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is not an aim of the USA Patriot Act?

A)To give sweeping new powers to domestic law enforcement and international intelligence agencies to in an effort to fight terrorism
B)To expand the definition of terrorist activities
C)To alter sanctions for violent terrorism
D)All of the above are aims of the USA Patriot Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ is the use of computer networks for undermining the social, economic, and political system of an enemy through the destruction of infrastructure.

A)Cyber theft
B)Cyber vandalism
C)Cyber terrorism
D)Cyber movement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following types of cyber crime was not discussed in the text?

A)Cyber terrorism
B)Phishing
C)Etailing
D)Chiseling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
22
The Department of Homeland Security is responsible for securing our nation's borders and transportation systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
23
Cyber terrorism may result in a battered economy in which the government is forced to spend more on the military and cut back on social programs and education.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
24
It is difficult to detect and control internet pornography. Congress has struggled to create legislation that will restrict usage without violating ____ Amendment rights.

A)First
B)Fourth
C)Sixth
D)Eighth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
25
In what type of cyber crime are small amounts of money subtracted from customers' accounts and added to the account of the thief?

A)Phishing
B)Chiseling
C)Salami fraud
D)Trojan Horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
26
The United States Criminal Code provides penalties for a first time illegal copyright offender of ____ years incarceration and a fine of $250,000.

A)3
B)5
C)7
D)10
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
27
The salami slice is a computer program secretly attached to a company's computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
28
____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.

A)Warez
B)Denial of service attack
C)Market manipulation
D)Cyber theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
29
The view that terrorists suffer psychological abnormality is well accepted by those advocating the psychological view.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
30
According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000. A second-time offender will receive 5 years incarceration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
31
Since September 11, 2001, biometrics has been implemented in many facets of the security systems of the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
32
Lack of economic opportunity and recessionary economies are positively correlated with terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
33
The term "terrorism" first appeared during the Bolshevik takeover.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
34
There is some concern that the Child Online Protection Act controls free speech.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
35
____ involves hacking secure computer networks at the enemy's most sensitive military bases, defense contractors, and aerospace companies in order to steal important data or to access their defenses.

A)Cyber terrorism
B)Cyber espionage
C)Cyber bullying
D)Cyber stalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
36
____ is one type of malicious software program that disrupts or destroys existing programs and networks.

A)Computer worm
B)Computer virus
C)Trojan horse
D)Cyber bullying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which type of cyber vandalism appears as a benign application which actually contains codes that can damage the system operations?

A)Mydoom
B)Trojan horse
C)Malware
D)Dhiseling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
38
____ is the term used to describe the illegal use of the internet to buy or sell merchandise online.

A)Cyber theft
B)Etailing fraud
C)Market manipulation
D)Denial of service attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
39
Death squads and the use of government troops to destroy political opposition parties are often associated with state-sponsored terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
40
Since 1995, the New York Electronic Crimes Task Force has charged over 1000 individuals with electronic crime losses exceeding ____.

A)$1 million
B)$10 million
C)$1 billion
D)$10 billion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
41
Explain what New York City's new Counterterrorism Bureau is doing to deal with the threat of terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
42
____________________ is slang for the processes used to acquire personal information used for identity theft and other fraudulent activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
43
Elaborate three types of contemporary terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
44
Discuss the purposes of the USA Patriot Act and then detail the concern about this Act by civil libertarians.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
45
____________________ is an attack against an enemy nation's technological infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
46
____________________ occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
47
Discuss the role of the Department of Homeland Security in the fight against terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
48
Discuss the last twenty years in the history of terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
49
Some policy experts suggest that the way to fight terrorism is to use political solutions. Discuss several political solutions to the fight against terrorism using al Qaeda as an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
50
____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and processed by computer networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
51
Discuss some of the problems with enforcing cyber laws and recent initiatives to attempt to combat cyber crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
52
The ____________________ view of terrorism argues that if terrorists suffer psychological deficiencies it is because they have been poorly and improperly socialized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
53
Discuss the evolving role of law enforcement in fighting terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
54
The Department of ____________________ is assigned to prevent the importation of nuclear weapons and material.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
55
Compare and contrast two of the prevailing views on the motivation of terrorists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
56
Select and discuss three types of computer crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
57
On October 26, 2001, Congress passed the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
58
The ____________________ is a computer program that appears benign but actually contains something harmful.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
59
The FBI is now charged with coordinating intelligence collection with the Border Patrol, Secret Service, and the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
60
The USAPA expands all four traditional tools of surveillance - wiretaps, search warrants, pen/trap orders, and ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.