Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Criminology The Core Study Set 1
Quiz 14: Crimes of the New Millennium: Cyber Crime, Technology, and Transnational Organized Crimes
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Even the federal government can fall victim to scams as the IRS is expected to lose as much as $21 billion in revenue between 2012 and 2017 due to identity theft.
Question 2
True/False
It is estimated that revenue generated from adult sites each year is greater than all movie box office sales and the combined income of ABC, NBC, and CBS.
Question 3
True/False
Cyberstalking refers to the use of the Internet to steal one's identity for profit.
Question 4
True/False
Online gambling casinos have proven particularly vulnerable to DoS attacks.
Question 5
True/False
The concept of phishing is also known as carding or spoofing.
Question 6
True/False
While email is the most common form of spam, many are not aware that viruses and spam can be sent in the form of instant messaging, online forums, social media and even text messaging.
Question 7
True/False
Criminals have become more technologically sophisticated, routinely using the Internet to carry out their criminal conspiracies.
Question 8
True/False
The most typical use of cyberspace for destructive intent comes in the sending or implanting of disruptive programs, called viruses or worms.
Question 9
True/False
Cybercrimes are vast in scope and place a heavy burden on society
Question 10
True/False
It is estimated that the revenue generated from adult sites each year is greater than all movie box office sales and the combined income of ABC, NBC, and CBS.
Question 11
True/False
Cyberespionage efforts are well-practiced by Chinese organizations, one of which is known as the Titan Rain and has penetrated NASA computers.
Question 12
True/False
While many feel the United States is not vulnerable to cyber attacks, a Chinese espionage ring known as the Titan Rain was able to penetrate a U.S. military base and NASA obtaining the U.S. Army's flight-planning software.
Question 13
True/False
Recent research by Hinduja and Patchin on cyberbullying has found that roughly 46 percent of high school students surveyed had been a victim of cyberbullying and nearly 62 percent reported perpetrating cyberbullying.
Question 14
True/False
The biggest hurdle with deterring file sharing crimes is that the U.S. Criminal Code fails to provide any penalties for first-time offenders in the form of fines or prison time.
Question 15
True/False
In 1998, the United States passed the Identity Theft and Assumption Deterrence Act to meet the threat of phishing and identity theft crimes.
Question 16
True/False
The illegal sale of counterfeit goods and illegal use of intellectual property to commit crime, such as stock manipulation, have been used to support terrorist activities.