Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Criminal Justice in Action The Core Study Set 3
Quiz 14: Crucial Issues in Criminal Justice
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
The theft of personal information is known as:
Question 2
Multiple Choice
A software program that is capable of reproducing itself as it spreads from one computer tothe next is a(n) :
Question 3
Multiple Choice
The Amendment tothe U.S. Constitution states, "A well-regulated Militia, being necessary tothe security of a free State, the right of the people tokeep and bear Arms, shall not be infringed."
Question 4
Multiple Choice
Which of the following is NoT a characteristic of a white-collar criminal?
Question 5
Multiple Choice
The U.S. Supreme Court case ____________________ was crucial for differentiating "mere speech," which is protected by the First Amendment of the U.S. Constitution, from a true threat, which is not, concerned the racially charged issue of cross burning.
Question 6
Multiple Choice
A ________________ threat is an act of speech or expression that is not protected by the First Amendment because it is done with the intention placing a specific victim or group of victims in fear of unlawful violence.
Question 7
Multiple Choice
Any criminal activity occurring via a computer in the virtual community of the Internet is a:
Question 8
Multiple Choice
What is alsoknown as "influence peddling" and occurs in the business world when somebody within a company sells influence, power, or information toa person outside the company whocan benefit?
Question 9
Multiple Choice
Which of the following is NoT one of the designations of being "mentally defective" ?
Question 10
Multiple Choice
What is the preferred method of phishing?
Question 11
Multiple Choice
With the advent of the Internet, child pornography has become much easier todisseminate for three specific reasons. Which of the following is NoT one of these reasons.
Question 12
Multiple Choice
Which of the following is an example of intellectual property?
Question 13
Multiple Choice
_______________ refers tolegal notices that compel the disclosure of customer records held by banks, telephone companies, Internet service providers, and other companies tothe agents of the federal government.
Question 14
Multiple Choice
The primary purpose of the AEDPA is tofight terrorism by:
Question 15
Multiple Choice
Section 702 of the FISA Amendment Act permits eavesdropping (not merely metadata collection) without a warrant of foreign persons toobtain information related toall of the following items, except:
Question 16
Multiple Choice
Which federal law gives federal law enforcement officers the power toarrest and prosecute any individual whoprovides "material support or resources" toa "terrorist organization"?
Question 17
Multiple Choice
Until the 1970s, policies regarding surveillance, or the governmental monitoring of individuals or groups that posed national security threats tothe United States, were primarily the domain of the______________