Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Criminal Law
Q:
What is not a characteristic of transnational organize crime?
a. It is usually structured along hierarchical lines
b. Transnational organized crime has economic gain as its primary goal
c. Transnational criminal syndicates employ predatory tactics
d. Syndicates only provide illegal materials and do not engage in laundering money.
Q:
The Convention on Cybercrime is the first international treaty that addresses the definition and enforcement of cyber crime. Which of the following is not inclusive of the treaty?
a. It focuses on improving investigative techniques and increasing cooperation among nations.
b. It includes a list of crimes that each signatory state must incorporate into their own law.
c. It limits law enforcement agencies' power by protecting Internet service providers from having to monitor people's online viewing habits.
d. It requires signatory states to cooperate whenever possible in the investigations and prosecution of cyber criminals.
Q:
Because cyber crime is essentially global, international cooperation is required for its control. Which of the following reflects this fact?
a. the International Information Infrastructure Protection Act
b. the Family Entertainment and Copyright Act
c. the Convention on Cybercrime
d. the Digital Millennium Copyright Act
Q:
Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit Access Device and Computer Fraud and Abuse Law in what year?
a. 1974
b. 1984
c. 1996
d. 1998
Q:
Cyber terrorism may be a handy battlefield for terrorists because it can strike directly at what target that bombs will not effect?
a. the economy of an enemy
b. the defense infrastructure of an enemy
c. the hearts and minds of the citizens of an enemy
d. the energy infrastructure of an enemy
Q:
The premeditated, politically motivated attack against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents is termed:
a. cyber espionage
b. cyber spying
c. cyber terrorism
d. cyber botnetting
Q:
What type of threat is represented by Titan Rain?
a. a cyber fraud threat
b. a cyber terrorism threat
c. a cyber espionage threat
d. Titan Rain does not represent a threat, it is security software
Q:
What cyber crime has been committed when a person illegally uses the Internet to gather information that is considered private and confidential?
a. cyber terrorism
b. cyber spying
c. cyber stalking
d. cyber theft
Q:
Cyber bullying is the willful and repeated harm inflicted through the medium of electronic text. While traditional bullying involves a physical power differential between the victim and offender, cyber bullying involves:
a. an online power differential
b. a cyber spying power differential
c. a social power differential
d. Cyber bullying involves all these differentials.
Q:
Tricking others into harassing or threatening a victim by impersonating the victim on Internet bulletin boards and/or chat rooms is a type of:
a. federal offense
b. cyber terrorism
c. cyber stalking
d. e-tailing
Q:
Under what circumstance can spam become a crime?
a. when it causes emotional distress to a victim
b. when it involves pornography
c. when it causes serious harm to a computer or network
d. when it involves an organized group of spammers
Q:
What is the most common form of spam?
a. e-mail
b. instant messaging
c. mobile phone messaging
d. Usenet newsgroups
Q:
A _______________ is a program that is secretly attached to a computer system, monitors the network's work output, and waits for a particular signal such as a date to appear and then deletes or corrupts data.
a. virus
b. Trojan horse
c. logic bomb
d. worm
Q:
What is the difference between a Trojan horse and a virus?
a. Trojan horses are benign applications.
b. Trojan horses do not replicate themselves.
c. Trojan horses are not as destructive.
d. Trojan horses can penetrate firewalls.
Q:
Cybervandals have developed a new form of "entertainment" called _____________ in which they call 911 and fake an emergency that draws a response from law enforcement in the form of special tactical teams.
a. e-hooking
b. e-tailing
c. vishing
d. swatting
Q:
Computer worms are similar to viruses except that they use computer networks or the Internet to do what?
a. remain dormant for longer periods of time
b. "rip" or "crack" security codes
c. crash websites
d. self-replicate
Q:
Cyber vandals are generally more motivated by what?
a. thrill
b. need
c. greed
d. malice
Q:
Website damage or defacement is a type of:
a. cyber vandalism
b. cyber terrorism
c. cyber espionage
d. cyber theft
Q:
What cyber crime involves failure to deliver on promised purchases or the substitution of cheaper or used material for higher quality purchases?
a. phishing
b. e-tailing
c. spamming
d. mousetrapping
Q:
What is not a common phishing scam?
a. Account verification scams where the victim is directed to a bogus website by clicking the legitimate-looking address.
b. The Nigerian 419 scam where an alleged representative of a foreign government asking the victim to help move money from one account to another.
c. Free credit report through Experian, TransUnion and Equifax.
d. An e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling.
Q:
When an identity thief creates false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:
a. spamming
b. phishing
c. mousetrapping
d. warez
Q:
Identify theft is a type of cyber crime that has grown at surprising rates over the past few years. What statement is not true?
a. Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
b. Opening new lines of credit is the most common goals of credit card thieves.
c. Some identity theft schemes are extremely elaborate.
d. Much is known about the extent of identity theft.
Q:
This crime occurs when individuals make securities recommendations and fail to
disclose that they are being paid to disseminate their favorable opinions:
a. illegal touting
b. fraudulent offerings
c. market manipulation
d. deceptive priming
Q:
According to the U.S. Criminal Code, what is the penalty for a first-time offender who allows Internet users to download music and other copyrighted material without paying the artists and record producers their rightful royalties?
a. A fine of $25,000
b. A year in prison and a $10,000 fine
c. Five year prison term and a $250,000 fine
d. Five year incarceration term or a $500,000 fine
Q:
Theft through the illegal reproduction and distribution of movies, software, games, and music, is estimated to cost U.S. industries __________ worldwide each year.
a. $20 billion
b. $5 billion
c. $519 million
d. $500 million
Q:
Those who illegally obtain software and then "crack" or "rip" its copyright protections, before posting it on the Internet for other members of the group to use are engaging in:
a. mousetrapping
b. spamming
c. e-tailing
d. warez
Q:
What "industry" has been particularly vulnerable to denial of service attacks?
a. financial institutions
b. nuclear power plants
c. online gambling casinos
d. defense industry manufacturers
Q:
Attempts to extort money from legitimate users of an Internet service by threatening to prevent the users from having access to the service is called:
a. denial-of-service
b. web defacement
c. cyber terrorism
d. cyber vandalism
Q:
It is difficult to prosecute and control Internet pornography because:
a. federal legislation has been successfully challenged in the courts under the First Amendment
b. as soon as one website is shutdown another emerges to fill the gap
c. nearly all Internet porn sites are based in foreign countries
d. federal legislation has lagged behind the Internet porn industry
Q:
When pornography websites send consumers to other sites involuntarily it is known in the industry as:
a. tripping
b. mousetrapping
c. slagging
d. ping-ponging
Q:
Not all instances of computer theft and fraud fall under common-law statues because the property stolen:
a. may be difficult to recover
b. may be intangible
c. may be difficult to identify
d. may be shipped overseas
Q:
Which is viewed by the offender as a criminal benefit of cyber theft?
a. It offers the luxury of anonymity.
b. It offers far less competition from other thieves.
c. It offers the assurance of a light sentence if arrested and convicted.
d. It offers the assurance of non-arrest.
Q:
Cybercrime presents a compelling challenge for the justice system and law enforcement community. What statement is false with regard to such challenges?
a. Cybercrimeis rapidly evolving with new schemes being created daily.
b. Cybercrime is difficult to detect through traditional law enforcement channels.
c. Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
d. Cybercrime necessitates a lighter sentence due to limited state and federal laws.
Q:
Information technology (IT) is the key to the _______ system and is responsible for creating the globalization phenomenon.
a. business
b. Internet
c. economic
d. social
Q:
Cybercrime is defined as:
a. a type of white-collar crime
b. a type of organized crime
c. a type of enterprise crime
d. a type of Internet crime
Q:
Which of the following statements best reflects cybercrime?
a. As information technology evolves cyber criminals are increasingly replacing non-cyber offenders.
b. Innovation brings change and with it new opportunities to commit crime.
c. Despite the rapid evolution of cyber crime the justice system has managed to keep pace.
d. Cyber criminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.
Q:
___________________ is induced by force, fraud, or coercion and facilitated by social problems and disorder, such as disruptions in the global economy, war and social unrest.
Q:
________________________________takes place in more than one state or country and involves ongoing criminal enterprise groups whose ultimate purpose is personal economic gain through illegitimate means.
Q:
The ___________________________is the first international treaty that addresses the definition and enforcement of cyber crime and focuses on improving investigative techniques and increasing cooperation among nations.
Q:
_________________ occurs when a person uses the Internet to steal someone's identity and/or impersonate the victim to open a new credit card account or conduct some other financial transaction.
Q:
__________________ can be viewed as an effort by covert forces to undermine the social, economic, and political systems of an enemy nation by destroying its electronic infrastructure and disrupting its economy.
Q:
Illegally using the Internet to gather information considered private and confidential, whether by an estranged spouse or a foreign business competitor, is termed __________.
Q:
Computer viruses and worms are types of __________.
Q:
_____________ involves the creation of false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information.
Q:
_______ refers to cyber offenders who illegally obtain software and then "rip" or "crack" its copyright protection before posting it on the Internet for members of the group to use.
Q:
There are three major types of Internet securities fraud: market manipulation, fraudulent offerings of securities, and _________________.
Q:
__________________ refers to the use of the Internet, e-mail, or other electronic communication devices to pursue, harass, or threaten another person.
Q:
______________ are malicious aggressors who seek implicit or explicit pleasure or profit through the mistreatment of other individuals. Instead of using their physical power, the power differential of these offenders may simply stem from their net proficiency.
Q:
__________________ is aimed at undermining the social, economic, and political system of an enemy nation by destroying its electronic infrastructure and disrupting its economy.
Q:
Some cyber criminals are less motivated by profit than they are by the urge to commit ______________. Such criminals aim their malicious attacks at disrupting, defacing, and destroying technology that they find offensive.
Q:
________________ encompasses offenses that can be singular or ongoing but typically involves the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, and the Internet.
Q:
Provide some historical perspective on the evolution of organized crime and reasons for its decline in recent history.
Q:
Discuss transnational organized crime. What is its primary goal is and how it is achieved?
Q:
Discuss the at least three legal and/or enforcement efforts implemented to control cybercrime.
Q:
Cyber terrorism has been called "an effort by covert forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world." Explain what this means and we should be concerned about cyber terrorism.
Q:
Define cyber-spying and discuss the motivations by those who engage in this behavior.
Q:
Compare and contrast at least three arguments regarding the legalization of drugs.
Q:
Substance abuse remains a major social problem in the United States. A number of different drug control strategies have been tried with varying degrees of success. Differentiate between source control and interdiction strategies.
Q:
Many causes of substance abuse have been put forward. Identity and discuss three views.
Q:
Drug use is not a new phenomenon. Discuss the history of drug use and abuse and early factors related to the current stringent U.S. drug laws
Q:
Discuss the relationship between obscenity and pornography. Why is this relationship so complex? What efforts have been made to control pornography and why it is difficult to do so?
Q:
Some feminists have staked out conflicting views of prostitution. Discuss both viewpoints and where they are in agreement.
Q:
Identify and discuss 3 types of prostitutes.
Q:
Discuss the history of prostitution and the origin of the word. What impact does this term have on society today?
Q:
What are paraphilias? Identify and explain two crimes that fall under the category of paraphilias.
Q:
Who are moral crusaders and how have their views and efforts shaped our society and legal system?
Q:
The concepts of law and morality are tightly interwoven. Discuss how morality impacts the law and why some scholars believe these two concepts cannot be separated.
Q:
The drug trade is an important source of foreign revenue, a fact that makes source control difficult if not impossible.
Q:
About one-fourth of all adult AIDS cases have occurred among IV drug users.
Q:
Interdiction strategies are meant to intercept drug supplies as they enter the country.
Q:
Source control is designed to capture and punish known international drug dealers and deter those who are considering entering the drug trade.
Q:
The 1984 Controlled Substances Act created a coordinated national drug policy under a "drug czar."
Q:
Research on gateway drugs indicates that many American youths have tried marijuana. Sadly, most of these adolescent users progress to crack or heroin abuse.
Q:
The psychological view of the cause of substance abuse have found that many addicts exhibit psychopathic or sociopathic behavior characteristics, forming what is called an addiction-prone personality.
Q:
When it comes to defining obscenity, the Miller doctrine of obscenity has been praised for spelling out how community standards are to be determined.
Q:
The problem of controlling pornography centers on the definition of obscenity.
Q:
Prostitutes who work the streets in plain sight of police are called call girls.
Q:
Prostitutes known as circuit travelers move around in groups of two or three to lumber, labor, and agricultural camps.
Q:
Some paraphilias, such as wearing clothes normally worn by the opposite sex, can be engaged in by adults in the privacy of their homes and do not involve a third party; these are usually out of the law's reach.
Q:
Asphyxiophilia is the wearing of clothes normally worn by the opposite sex.