Deck 16: Hi-Tech Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 16: Hi-Tech Crime
1
In a computer crime, the computer or the ability of the computer is the object of the attack.
True
2
Hi tech crime involves only computer crime.
False
3
When writing a search warrant or seizing computer evidence, a law enforcement official should consider separately each component of the computer system the offender used.
True
4
A denial of service attack is the same as theft of computer services.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Hacking is the process of stealing computer components.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
A computer related crime occurs when the offender uses a computer to commit a traditional crime or stores data on a computer that is evidence of a traditional crime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Computer crime, computer-related crime and technology crime can be grouped together as Hi-Tech Crime because their commission, investigation and prosecution share some strong similarities.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Hi Tech crime often goes unreported because the offender is an "insider."
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
With any fraud it is unnecessary for the offender to gain the victim's confidence.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
A virus is a malicious software application that is designed to replicate itself an spread through a system or network.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
One way that a ________ can shut-down a network is denial of service attack.
A) operator
B) hacker
C) cracker
D) virus
A) operator
B) hacker
C) cracker
D) virus
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
A computer, like all other personal property, is protected by the ________ Amendment.
A) Fourteenth
B) Third
C) Fourth
D) Second
A) Fourteenth
B) Third
C) Fourth
D) Second
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
Because it is a traditional crime that is enabled or enhanced by the Internet, ________ is a computer related crime.
A) a virus
B) child pornography
C) theft of cellular telephone service
D) a denial of service attack
A) a virus
B) child pornography
C) theft of cellular telephone service
D) a denial of service attack
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Some Hi-Tech crimes go unreported because ________.
A) they are discovered so quickly
B) they are so pervasive that reporting it on an individual scale is impossible
C) they create positive publicity
D) none of the above
A) they are discovered so quickly
B) they are so pervasive that reporting it on an individual scale is impossible
C) they create positive publicity
D) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
Though ________, pump and dump schemes and illegal touting, offenders defraud online investors.
A) sham stock offerings
B) 419 scams
C) money laundering
D) pigeon drop schemes
A) sham stock offerings
B) 419 scams
C) money laundering
D) pigeon drop schemes
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Illegal touting occurs when an employee of a ________ publishes false or exaggerated news about a company in exchange for money or stock.
A) illegitimate publication
B) government organization
C) legitimate publication
D) none of the above
A) illegitimate publication
B) government organization
C) legitimate publication
D) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
Although a first responder or investigator may come across a situation wherein she or he does not have a search warrant but is in a position to seize a computer that might contain evidence, the best course of action is to ________ the computer to prevent tampering by the offender and ________.
A) secure; search for the evidence
B) seize; search for the evidence
C) secure; obtain a search warrant
D) seize; obtain a search warrant
A) secure; search for the evidence
B) seize; search for the evidence
C) secure; obtain a search warrant
D) seize; obtain a search warrant
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
It takes special software and hardware tools and expertise to properly conduct a ________ computer evidence. Therefore, the search and seizure of computer evidence is ________.
A) search for; less complex than believed
B) forensic analysis of; computer science
C) search for; senior detectives
D) forensic analysis of; a forensic science
A) search for; less complex than believed
B) forensic analysis of; computer science
C) search for; senior detectives
D) forensic analysis of; a forensic science
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
The most important aspect of search a computer is ________ the search.
A) accomplishing
B) planning
C) conducting
D) executing
A) accomplishing
B) planning
C) conducting
D) executing
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
The method an investigator uses for searching a computer depends on ________ and ________ in the crime.
A) the investigation; the role the offender played
B) the investigation; the role the computer played
C) warrant; the role the computer played
D) warrant; the role the offender played
A) the investigation; the role the offender played
B) the investigation; the role the computer played
C) warrant; the role the computer played
D) warrant; the role the offender played
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is a part of hi-tech crime?
A) Computer Crime
B) Technology Crime
C) Computer Related Crime
D) all of the above
A) Computer Crime
B) Technology Crime
C) Computer Related Crime
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is an act of Software Piracy?
A) Unlicensed duplication of software
B) Making back-up copies for your personal use
C) A denial of service attack
D) Downloading software from a commercial firm
A) Unlicensed duplication of software
B) Making back-up copies for your personal use
C) A denial of service attack
D) Downloading software from a commercial firm
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is an option when searching a computer?
A) Search for the evidence and make a copy of the digital data.
B) Search the files and print out the evidence.
C) Make a complete copy of the hard drive for examination in a computer lab.
D) all of the above
A) Search for the evidence and make a copy of the digital data.
B) Search the files and print out the evidence.
C) Make a complete copy of the hard drive for examination in a computer lab.
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Bringing together people from different jurisdictions and specializations in order to investigate a complex or cross-jurisdictional crime best describes:
A) A state agency
B) A federal agency
C) A task force
D) none of the above
A) A state agency
B) A federal agency
C) A task force
D) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is NOT defined as a computer crime?
A) Child pornography
B) Denial of Service Attack
C) Hacking
D) Theft of computer services
A) Child pornography
B) Denial of Service Attack
C) Hacking
D) Theft of computer services
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is NOT a type of Internet fraud?
A) Cracking
B) Touting
C) 419 Scam
D) Pump and Dump
A) Cracking
B) Touting
C) 419 Scam
D) Pump and Dump
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
The 419 scam is so named because:
A) The Nigerian Criminal Code covering the scam is section 419.
B) The scam was first publicized in a book titled "Fahrenheit 419."
C) The area code of the first suspect was 419.
D) The United States Federal Code covering the scam is section 419.
A) The Nigerian Criminal Code covering the scam is section 419.
B) The scam was first publicized in a book titled "Fahrenheit 419."
C) The area code of the first suspect was 419.
D) The United States Federal Code covering the scam is section 419.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
When writing a search warrant or seizing computer evidence, a law enforcement official should consider separately each component of the computer system the offender used best describes:
A) The Dependent Component Doctrine
B) The Independent Search and Seizure Doctrine
C) The Dependent Search and Seizure Doctrine
D) The Independent Component Doctrine
A) The Dependent Component Doctrine
B) The Independent Search and Seizure Doctrine
C) The Dependent Search and Seizure Doctrine
D) The Independent Component Doctrine
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
A crime that uses or is directed at a technology other than a computer; or, a crime that involved the theft of any technology including computers best describes:
A) Computer Crime
B) Hi Tech Crime
C) Technology Crime
D) Computer Related Crime
A) Computer Crime
B) Hi Tech Crime
C) Technology Crime
D) Computer Related Crime
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
A crime that occurs when the offender uses a computer to commit a traditional crime or stores data on a computer that is evidence of a traditional crime best describes:
A) Computer Crime
B) Computer Related Crime
C) Hi Tech Crime
D) Traditional Computer Crime
A) Computer Crime
B) Computer Related Crime
C) Hi Tech Crime
D) Traditional Computer Crime
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck

