Deck 14: Todays Challenges in Criminal Justice
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/65
Play
Full screen (f)
Deck 14: Todays Challenges in Criminal Justice
1
In the context of cyber crime, _____ refers to behavior that, while not technically illegal, falls outside society's norms.
A) cyber consumer fraud
B) cyberdeviance
C) data breach
D) cyberattack
A) cyber consumer fraud
B) cyberdeviance
C) data breach
D) cyberattack
B
2
_____ is the illegal production and sale of material depicting sexually explicit conduct involving a child.
A) Child pornography
B) Child abduction
C) Cyberbullying
D) Cyberstalking
A) Child pornography
B) Child abduction
C) Cyberbullying
D) Cyberstalking
A
3
Unlike a worm, a virus:
A) is not a software program.
B) does not interfere with the normal use of a computer.
C) cannot reproduce itself.
D) cannot exist as a separate entity.
A) is not a software program.
B) does not interfere with the normal use of a computer.
C) cannot reproduce itself.
D) cannot exist as a separate entity.
D
4
A website named freegoodz.com allows users to download computer software for free. This has resulted in significant losses for several companies that sell the same software legally. This is an example of _____.
A) smishing
B) piracy
C) cyberstalking
D) hacking
A) smishing
B) piracy
C) cyberstalking
D) hacking
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
5
In the context of the advent of the Internet, identify a true statement about child pornography.
A) The risk of discovery of illegal material has significantly increased.
B) The Internet offers anonymity for the sellers and buyers of child pornography.
C) Law enforcement can easily trace and confiscate original copies of publications on the Internet.
D) Sellers can no longer use force multipliers to target several victims.
A) The risk of discovery of illegal material has significantly increased.
B) The Internet offers anonymity for the sellers and buyers of child pornography.
C) Law enforcement can easily trace and confiscate original copies of publications on the Internet.
D) Sellers can no longer use force multipliers to target several victims.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
6
The term _____ refers to software that is used by hackers to carry out their illegal activities.
A) glitch
B) bug
C) spam
D) malware
A) glitch
B) bug
C) spam
D) malware
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
7
Identity theft involves:
A) stealing personal information and using it to access the victim's financial resources.
B) using one's position in an organization to steal the employer's funds.
C) creating a fake account on websites to solicit members for a donation.
D) listing a product on an auction site and refusing to send the product to the customer despite payment.
A) stealing personal information and using it to access the victim's financial resources.
B) using one's position in an organization to steal the employer's funds.
C) creating a fake account on websites to solicit members for a donation.
D) listing a product on an auction site and refusing to send the product to the customer despite payment.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
8
To get around spam filters, phishers:
A) target small groups of recipients.
B) blast fake e-mails to millions of people at a time.
C) send e-mails only after talking to a prospective recipient.
D) stay away from social networking sites.
A) target small groups of recipients.
B) blast fake e-mails to millions of people at a time.
C) send e-mails only after talking to a prospective recipient.
D) stay away from social networking sites.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
9
Lee received an e-mail that appeared to be from Wiscont Bank, a bank in which he has an account. The e-mail required him to input his account details and password for verification. After a few days, he noticed many unknown withdrawals from his bank account. When he contacted Wiscont Bank, it denied sending any such e-mail. In this scenario, Lee was a victim of _____.
A) cyberstalking
B) phishing
C) hacking
D) troubleshooting
A) cyberstalking
B) phishing
C) hacking
D) troubleshooting
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
10
Cyberstalking involves:
A) using electronic communication to cause a victim to reasonably fear for her or his safety.
B) stealing personal information and using it to access the victim's financial resources.
C) faking the identity of a law enforcement officer in order to defraud victims into paying money.
D) creating a fake account on websites in order to solicit members for a donation.
A) using electronic communication to cause a victim to reasonably fear for her or his safety.
B) stealing personal information and using it to access the victim's financial resources.
C) faking the identity of a law enforcement officer in order to defraud victims into paying money.
D) creating a fake account on websites in order to solicit members for a donation.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
11
In the context of cyberstalking, identify a true statement about true threat.
A) It causes the victim to reasonably fear for his or her safety.
B) It is protected by the First Amendment.
C) It does not require evidence showing that a person actually intends to cause harm.
D) It does not take into consideration the intention of the person issuing the threat.
A) It causes the victim to reasonably fear for his or her safety.
B) It is protected by the First Amendment.
C) It does not require evidence showing that a person actually intends to cause harm.
D) It does not take into consideration the intention of the person issuing the threat.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
12
The term _____ refers to sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information from the recipient.
A) phishing
B) pharming
C) troubleshooting
D) cyberstalking
A) phishing
B) pharming
C) troubleshooting
D) cyberstalking
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following best illustrates cyber fraud?
A) Scott sends a fraudulent mail to hundreds of people claiming that they have won 20 million dollars in a lottery.
B) Sabina hacks the website of a grocery store and steals the credit card information of the store's customers.
C) Frederick lists a Van Gogh painting for auction on his website and does not send the product after receiving payment.
D) Deliwear, an online shopping portal, does not deliver clothes that are ordered online unless customers pay in advance.
A) Scott sends a fraudulent mail to hundreds of people claiming that they have won 20 million dollars in a lottery.
B) Sabina hacks the website of a grocery store and steals the credit card information of the store's customers.
C) Frederick lists a Van Gogh painting for auction on his website and does not send the product after receiving payment.
D) Deliwear, an online shopping portal, does not deliver clothes that are ordered online unless customers pay in advance.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following scenarios best illustrates spear phishing?
A) Tanya clicks on a link that appears to have been e-mailed to her by her colleague and ends up downloading a harmful software.
B) Margaret receives an e-mail from an unknown account claiming that she has won the state lottery and asking for her credit card information.
C) Parker receives an e-mail from an unknown sender claiming to be a charitable organization and requesting him to transfer money as a donation.
D) George opens a pornographic website on his office computer without the knowledge of his co-workers.
A) Tanya clicks on a link that appears to have been e-mailed to her by her colleague and ends up downloading a harmful software.
B) Margaret receives an e-mail from an unknown account claiming that she has won the state lottery and asking for her credit card information.
C) Parker receives an e-mail from an unknown sender claiming to be a charitable organization and requesting him to transfer money as a donation.
D) George opens a pornographic website on his office computer without the knowledge of his co-workers.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
15
Hector, a member of a terrorist organization, hacked into the traffic control system of the state of Greenville, United States. He disrupted the traffic in the state for a day, leading to many automobile accidents. This scenario best exemplifies _____.
A) phishing
B) a true threat
C) cyberstalking
D) a cyberattack
A) phishing
B) a true threat
C) cyberstalking
D) a cyberattack
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
16
Piracy involves:
A) the unauthorized copying and use of intellectual property.
B) sending e-mails to targets in order to acquire sensitive information.
C) the unauthorized sending of bulk e-mails to victims.
D) creating fake accounts in websites in order to solicit members for a donation.
A) the unauthorized copying and use of intellectual property.
B) sending e-mails to targets in order to acquire sensitive information.
C) the unauthorized sending of bulk e-mails to victims.
D) creating fake accounts in websites in order to solicit members for a donation.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is a type of cyber crime that is usually designed to damage a nation's infrastructure, which includes its power companies, water treatment plants, airports, chemical plants, and oil refineries?
A) Cyberdeviance
B) Identity theft
C) Cyberattack
D) Corporate violence
A) Cyberdeviance
B) Identity theft
C) Cyberattack
D) Corporate violence
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following statements is true of botnets?
A) They can move from computer to computer without further human action.
B) They appear to be useful pieces of software, but they do damage when installed.
C) They allow a hacker to "take over" another computer.
D) They function with the knowledge of the targeted computer's owner.
A) They can move from computer to computer without further human action.
B) They appear to be useful pieces of software, but they do damage when installed.
C) They allow a hacker to "take over" another computer.
D) They function with the knowledge of the targeted computer's owner.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is a form of cyberbullying that involves the nonconsensual publication online of explicit sexual images?
A) Pharming
B) Cyber fraud
C) Spear phishing
D) Revenge porn
A) Pharming
B) Cyber fraud
C) Spear phishing
D) Revenge porn
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is a similarity between a virus and a worm?
A) Both can reproduce themselves.
B) Both do not need to be attached to an existing file to move through a network.
C) Both can exist as independent entities.
D) Both do not affect the normal use of a computer.
A) Both can reproduce themselves.
B) Both do not need to be attached to an existing file to move through a network.
C) Both can exist as independent entities.
D) Both do not affect the normal use of a computer.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following statements is true of the Foreign Intelligence Surveillance Court (FISA Court)?
A) It comprises eleven federal judges assigned by the chief justice of the Supreme Court.
B) It gathers the records of surveillance carried out by foreign agents in the United States.
C) It prohibits the electronic monitoring of individuals residing in the United States.
D) It comprises two federal judges assigned by the President of the United States.
A) It comprises eleven federal judges assigned by the chief justice of the Supreme Court.
B) It gathers the records of surveillance carried out by foreign agents in the United States.
C) It prohibits the electronic monitoring of individuals residing in the United States.
D) It comprises two federal judges assigned by the President of the United States.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
22
White-collar crimes:
A) are not bailable.
B) do not involve deception.
C) do not involve physical force.
D) are not punishable.
A) are not bailable.
B) do not involve deception.
C) do not involve physical force.
D) are not punishable.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is an example of a white-collar crime?
A) Homicide
B) Arson
C) Bribery
D) Battery
A) Homicide
B) Arson
C) Bribery
D) Battery
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following Supreme Court cases involved the police's warrantless seizure of phone numbers dialed from the home of a robbery suspect?
A) Muller v. Oregon
B) Browder v. Gayle
C) Smith v. Maryland
D) Batson v. Kentucky
A) Muller v. Oregon
B) Browder v. Gayle
C) Smith v. Maryland
D) Batson v. Kentucky
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following statements is true of pilferage?
A) It involves obtaining credit card numbers through a variety of schemes and using the numbers for personal gain.
B) It involves individuals stealing items from their workplaces.
C) It involves individuals resorting to illegal activity in the stock market.
D) It involves taxpayers underreporting their taxable income or otherwise purposely attempting to evade a tax liability.
A) It involves obtaining credit card numbers through a variety of schemes and using the numbers for personal gain.
B) It involves individuals stealing items from their workplaces.
C) It involves individuals resorting to illegal activity in the stock market.
D) It involves taxpayers underreporting their taxable income or otherwise purposely attempting to evade a tax liability.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
26
National security letters can be used to collect:
A) records of any individual who owns a federally licensed firearm.
B) medical records of any individual residing in or around the United States.
C) funds as a reparation for damages caused by war.
D) financial records such as money transfers and bank accounts.
A) records of any individual who owns a federally licensed firearm.
B) medical records of any individual residing in or around the United States.
C) funds as a reparation for damages caused by war.
D) financial records such as money transfers and bank accounts.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
27
The Brady Bill requires background checks:
A) only for those who purchase guns from gun shows.
B) for applicants who wish to become federally licensed firearms dealers.
C) only for applicants who have a history of procuring firearms.
D) for those who purchase guns from federally licensed firearms dealers.
A) only for those who purchase guns from gun shows.
B) for applicants who wish to become federally licensed firearms dealers.
C) only for applicants who have a history of procuring firearms.
D) for those who purchase guns from federally licensed firearms dealers.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following statements is true of the system of background checks for the purchase of firearms?
A) It is unreliable as it is carried out by firearms dealers.
B) It is conducted by a law enforcement agency, usually the FBI.
C) People with only one prior felony conviction are allowed to purchase firearms.
D) People with a mental illness history can buy firearms so long as they agree to be admitted to a mental health facility.
A) It is unreliable as it is carried out by firearms dealers.
B) It is conducted by a law enforcement agency, usually the FBI.
C) People with only one prior felony conviction are allowed to purchase firearms.
D) People with a mental illness history can buy firearms so long as they agree to be admitted to a mental health facility.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
29
Identify a true statement about white-collar crimes.
A) They are not an official category of criminal behavior in the Uniform Crime Report.
B) They are not connected to financial activities.
C) They usually involve violence.
D) They are usually committed within boundaries of legality.
A) They are not an official category of criminal behavior in the Uniform Crime Report.
B) They are not connected to financial activities.
C) They usually involve violence.
D) They are usually committed within boundaries of legality.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following statements is true about national security letters?
A) They cannot be used to collect travel records held by commercial entities.
B) Government agents do not need judicial permission to issue them.
C) Government agents need to show relevance to a terrorism investigation before issuing them.
D) They cannot be used to collect financial records, such as money transfers.
A) They cannot be used to collect travel records held by commercial entities.
B) Government agents do not need judicial permission to issue them.
C) Government agents need to show relevance to a terrorism investigation before issuing them.
D) They cannot be used to collect financial records, such as money transfers.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following statements is true of the law enforcement's role in fighting cyber crime?
A) The U.S. government has generally adopted a hands-on attitude to control the Internet.
B) County officials and sheriffs' departments traditionally take the lead in law enforcement efforts against cyber crime.
C) Most police departments do not have the training or the resources to effectively manage cyber crime investigations.
D) The FBI is not responsible for enforcing federal criminal statutes involving computer crime.
A) The U.S. government has generally adopted a hands-on attitude to control the Internet.
B) County officials and sheriffs' departments traditionally take the lead in law enforcement efforts against cyber crime.
C) Most police departments do not have the training or the resources to effectively manage cyber crime investigations.
D) The FBI is not responsible for enforcing federal criminal statutes involving computer crime.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
32
_____ is the act of helping a terrorist organization by engaging in any of a wide range of activities, including providing financial support, training, and expert advice or assistance.
A) Material support
B) Red flagging
C) Identity theft
D) Spear phishing
A) Material support
B) Red flagging
C) Identity theft
D) Spear phishing
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
33
The Foreign Intelligence Surveillance Act (FISA) requires permission from a special court to engage in surveillance if the target is a(n):
A) employee of the armed forces of the United States.
B) individual associated with the state government.
C) foreign agent operating within the United States.
D) individual with a previous felony conviction.
A) employee of the armed forces of the United States.
B) individual associated with the state government.
C) foreign agent operating within the United States.
D) individual with a previous felony conviction.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
34
Acresovt, a software company, encodes all the files in its systems in such a way that only its employees can access it with an automatically generated password. This is an example of _____.
A) transcription
B) encryption
C) diversion
D) surveillance
A) transcription
B) encryption
C) diversion
D) surveillance
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
35
_____ is a practice in which companies hire outside experts to act as hackers and attempt to gain access to their systems.
A) Smishing
B) Cyberstalking
C) Penetration testing
D) Spear phishing
A) Smishing
B) Cyberstalking
C) Penetration testing
D) Spear phishing
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
36
_____ involves buying or selling securities on the basis of information that has not been made available to the public.
A) Pilferage
B) Influence peddling
C) Insider trading
D) Embezzlement
A) Pilferage
B) Influence peddling
C) Insider trading
D) Embezzlement
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is a criticism of strict gun control?
A) Strict gun control prevents only law abiding citizens from owning handguns.
B) A person planning to commit a crime with a gun can easily clear a background check.
C) The Federal Bureau of Investigation is not equipped to carry out background check for all applicants.
D) Strict gun laws affect the constitutional rights of felons who have already served their prison sentences.
A) Strict gun control prevents only law abiding citizens from owning handguns.
B) A person planning to commit a crime with a gun can easily clear a background check.
C) The Federal Bureau of Investigation is not equipped to carry out background check for all applicants.
D) Strict gun laws affect the constitutional rights of felons who have already served their prison sentences.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
38
Mike is a businessman in Lakaster, a state in the United States. He is worried that his business rivals might murder him, so he decides to purchase a revolver to defend himself. When he approaches a licensed firearms dealer to apply for the privilege of owning a firearm, he is informed that the process includes a thorough background check by the FBI. Which of the following, if true, is most likely to cause the FBI to prohibit Mike from purchasing the revolver?
A) Mike has worked with the FBI in the past.
B) Mike has a history of felony conviction.
C) Mike has purchased a licensed firearm in the past.
D) Mike has faced significant losses in his business.
A) Mike has worked with the FBI in the past.
B) Mike has a history of felony conviction.
C) Mike has purchased a licensed firearm in the past.
D) Mike has faced significant losses in his business.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
39
The _____ requires a person wishing to purchase a gun from a licensed firearms dealer to complete an application.
A) Brady Handgun Violence Prevention Act
B) Undetectable Firearms Act
C) National Firearms Act
D) Protection of Lawful Commerce in Arms Act
A) Brady Handgun Violence Prevention Act
B) Undetectable Firearms Act
C) National Firearms Act
D) Protection of Lawful Commerce in Arms Act
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
40
_____ occurs when somebody within a company or government sells authority, power, or information to a person outside the company or government who can benefit.
A) Influence peddling
B) Insider trading
C) Consumer fraud
D) Spear phishing
A) Influence peddling
B) Insider trading
C) Consumer fraud
D) Spear phishing
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
41
As a rule, individuals who intend to offer material support to terrorist organizations cannot be denied First Amendment protections.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following statements is true of the Environmental Protection Agency (EPA)?
A) It regulates air quality, water quality, and toxic waste.
B) It helps improve the work environment in corporations.
C) It enforces workplace health and safety standards.
D) It ensures the fair operation of financial markets.
A) It regulates air quality, water quality, and toxic waste.
B) It helps improve the work environment in corporations.
C) It enforces workplace health and safety standards.
D) It ensures the fair operation of financial markets.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following statements is true of corporate violence?
A) It results from policies or actions undertaken by an establishment.
B) It involves stalking in cyberspace using e-mails or text messages.
C) It involves sending e-mails to corporations to acquire sensitive information.
D) It results from the unauthorized copying and use of a victim's intellectual property.
A) It results from policies or actions undertaken by an establishment.
B) It involves stalking in cyberspace using e-mails or text messages.
C) It involves sending e-mails to corporations to acquire sensitive information.
D) It results from the unauthorized copying and use of a victim's intellectual property.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
44
The Brady Bill prohibits people from acquiring firearms for personal purposes.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following statements is true of the Occupational Safety and Health Administration (OSHA)?
A) It improves the quality of rehabilitation centers.
B) It enforces workplace health and safety standards.
C) It ensures the fair operation of financial markets.
D) It regulates air quality, water quality, and toxic waste.
A) It improves the quality of rehabilitation centers.
B) It enforces workplace health and safety standards.
C) It ensures the fair operation of financial markets.
D) It regulates air quality, water quality, and toxic waste.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
46
Odometer fraud involves:
A) manipulating the odometers of taxis to increase taxi fares.
B) stealing odometers from cars and smuggling them to other countries.
C) manipulating the odometers of used cars to charge higher prices.
D) removing odometers from used cars and inserting them in new cars.
A) manipulating the odometers of taxis to increase taxi fares.
B) stealing odometers from cars and smuggling them to other countries.
C) manipulating the odometers of used cars to charge higher prices.
D) removing odometers from used cars and inserting them in new cars.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
47
Different types of malware are used to prevent a computer from being infested with viruses.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following statements is true of the Securities and Exchange Commission (SEC)?
A) It ensures that financial markets operate in a fair manner.
B) It regulates air quality, water quality, and toxic waste.
C) It helps improve the work environment in corporations.
D) It enforces workplace health and safety standards.
A) It ensures that financial markets operate in a fair manner.
B) It regulates air quality, water quality, and toxic waste.
C) It helps improve the work environment in corporations.
D) It enforces workplace health and safety standards.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
49
The Internet has made it difficult for the sellers and buyers of child pornography to hide their identity.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
50
The term _____ refers to a governmental order or rule having the force of law that is usually implemented by an administrative agency.
A) surveillance
B) compliance
C) regulation
D) phishing
A) surveillance
B) compliance
C) regulation
D) phishing
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is an example of corporate violence?
A) A dye-manufacturing company releases toxic waste into a river, causing the death of the river's fish population.
B) Bensen breaks his manager's computer with a hammer after a discussion about the former's performance.
C) Jamie sends confidential information from her office computer to a rival company.
D) A group of hackers breaks into the traffic control system in a city and manipulates it, resulting in a number of automobile accidents.
A) A dye-manufacturing company releases toxic waste into a river, causing the death of the river's fish population.
B) Bensen breaks his manager's computer with a hammer after a discussion about the former's performance.
C) Jamie sends confidential information from her office computer to a rival company.
D) A group of hackers breaks into the traffic control system in a city and manipulates it, resulting in a number of automobile accidents.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
52
Laws that criminalize nonconsensual pornography do not cover sextortion.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
53
In the context of the regulatory justice system, the term _____ refers to the state of operating in accordance with governmental standards.
A) consent
B) compliance
C) good faith
D) restitution
A) consent
B) compliance
C) good faith
D) restitution
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
54
The preferred method of phishing is through the use of worms.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
55
Identify a white-collar crime.
A) Cyberstalking
B) Insurance Fraud
C) Hacking
D) Identity theft
A) Cyberstalking
B) Insurance Fraud
C) Hacking
D) Identity theft
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
56
In the context of mass surveillance, foreign citizens do not enjoy the same protections under the Fourth Amendment as U.S. citizens.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
57
About 86 percent of identity theft victims experience data breaches involving existing bank and credit card accounts.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
58
In the context of the regulatory justice system, the primary goal of regulation is:
A) prevention.
B) compliance.
C) punishment.
D) restitution.
A) prevention.
B) compliance.
C) punishment.
D) restitution.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
59
Tax evasion occurs when taxpayers underreport their taxable income.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
60
In the context of the Brady Bill, an applicant can be prohibited from purchasing a firearm if evidence of illegal drug addiction is uncovered.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
61
Discuss three main techniques used by white-collar criminals to carry out their crimes.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
62
Describe the term intellectual property.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
63
Describe the "zero-days" problem.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
64
Explain the role of the regulatory justice system in fighting white-collar crime.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
65
Explain how cyberattacks impact the regular operations of a state.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck

