Filters
Question type

The three main categories of cybercrime are cybertheft, cybervandalism, and cyberwars. Using examples, define and discuss each of these categories of cybercrimes.

Correct Answer

verifed

verified

Cybertheft schemes range from illegally ...

View Answer

The new phenomenon or form of cyber "entertainment" called ______ involves the use of spoofing technology to call 9-1-1 in order to fake a critical emergency, such as hostage situation, that draws a real-life response from law enforcement.


A) swatting
B) pigging
C) cuffing
D) copping

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

__________________is responsible for the globalization phenomenon or the process of creating transnational markets, politics, and legal systems-in other words, creating a global economy.

Correct Answer

verifed

verified

Informatio...

View Answer

The premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents is termed:


A) cyberespionage.
B) cyberspying.
C) cyberterrorism.
D) cyberstalking.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Worms, viruses, Trojan horses, logic bombs, and spam are types of cybervandalism. Define each and discuss the differences among these forms of cybervandalism.

Correct Answer

verifed

verified

Cybervandalism ranges from sending destr...

View Answer

Edward Snowden's effort to warn the public about the _____________ is discussed within the context of espionage but could be included as governmental cyberspying.


A) ​NSA spying program
B) ​Obamacare programs's microchip implant requirement
C) ​Department of Homeland Securities Internet fraud program
D) ​Russia's spy network

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Why do cybercrimes present a compelling challenge for the justice system and law enforcement community?


A) Cybercrime is rapidly evolving.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime presents a compelling challenge for all these reasons.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

_________ are software programs that have been illegally posted on the Internet for use by members of a group after the copyright protection has been "ripped" or "cracked."

Correct Answer

verifed

verified

Using the Internet to gather information that is considered private and confidential, whether by an estranged spouse or a foreign business competitor, is termed __________________.

Correct Answer

verifed

verified

Cyberterrorism has been called "an effort by covert forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world." Explain what this means and whether we should be concerned about cyberterrorism.

Correct Answer

verifed

verified

Cyberterrorism can be viewed as an effor...

View Answer

Operation Phish Phry was a successful FBI cybercrime sting operation.

A) True
B) False

Correct Answer

verifed

verified

There are three major types of Internet securities fraud: market manipulation, fraudulent offerings of securities, and __________________.

Correct Answer

verifed

verified

The Digital Millennium Copyright Act made it a crime to:


A) plant slag code into a computer system.
B) steal or attempt to steal someone's identity via the Internet.
C) access computer systems without authorization.
D) circumvent antipiracy measures in most commercial software.

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

To meet the increasing threat of phishing and identity theft, Congress passed the ___________ Act of 1998 (Identity Theft Act) to make it a federal crime.

Correct Answer

verifed

verified

Identity T...

View Answer

Which of the following statements best reflects cybercrime?


A) As information technology evolves, cybercriminals are rapidly replacing non-cyber offenders.
B) Innovation brings change and, with it, new opportunities to commit crime.
C) Despite the rapid evolution of cybercrime, the justice system has managed to keep pace.
D) Cybercriminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

__________________________ is defined as willful and repeated harm inflicted through the medium of electronic text.

Correct Answer

verifed

verified

Information technology (IT) is the key to the _____ system and is responsible for creating the globalization phenomenon.


A) political
B) Internet
C) economic
D) social

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following is most true about cyberbullying?


A) ​Girls are just as likely as boys to be victims.
B) ​Traditional bullying is still more common than cyberbullying.
C) Cyberbullying has been linked to low self-esteem and suicidal tendencies.
D) ​All of the above.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Internet attacks against an enemy nation's technological infrastructure is known as __________________.

Correct Answer

verifed

verified

There are two principal forms of market manipulation, the ________________ and the "cybersmear."

Correct Answer

verifed

verified

Showing 61 - 80 of 95

Related Exams

Show Answer