Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Criminal Law
Q:
Crack
a. is substantially more expensive than cocaine.
b. has 10 times less impact than cocaine.
c. has 10 times more impact than cocaine.
d. is less addictive than cocaine.
Q:
Designer drugs are
a. created by adding something to an existing drug.
b. created by omitting something from an existing drug.
c. high-profit drugs for dealers.
d. all of these choices.
Q:
What act did the federal government pass in 1914 that made the sale or use of certain drugs illegal?
a. the Sullivan Act
b. the Mann Act
c. the Harrison Narcotics Act
d. the Little Lindbergh Law
Q:
The primary emphasis of the Federal Drug Enforcement Administration is to
a. stop the flow of drugs.
b. apprehend users.
c. rehabilitate addicts.
d. educate the public regarding the dangers of drug abuse.
Q:
Which of the following crime networks has been called the fastest-growing criminal organization in the United States?
a. the Triads
b. the LCN
c. Eurasian Organized Crime (EOC)
d. the Mexican Mafia
Q:
Barbiturates are classified as
a. narcotics.
b. depressants.
c. hallucinogens.
d. stimulants.
Q:
Rohypnol is a
a. narcotic.
b. depressant.
c. hallucinogen.
d. stimulant.
Q:
Organized crime is not involved in which of the following victimless crimes?
a. loan-sharking
b. sports bribery
c. employment of illegal aliens
d. none of these choices
Q:
Drug addiction is
a. a sudden disease.
b. a progressive disease.
c. fairly easy to cure once addicts admit they need help.
d. not considered a disease.
Q:
If an officer observes what appears to be a drug buy,
a. the officer can make warrantless arrest if there is probable cause.
b. the officer needs to gather physical evidence from the scene before making an arrest.
c. the officer must set up a buy in order to prove that a transfer of drugs has taken place.
d. the officer should call for reinforcements immediately.
Q:
Which of the following is not a distinctive characteristic of organized crime?
a. high-profit and continued-profit crimes
b. definite organization and control
c. strong ideological foundation
d. protection through corruption
Q:
Drugs can be classified as
a. depressants, stimulants, narcotics, hallucinogens, cannabis or inhalants.
b. street drugs, prescription drugs and designer drugs.
c. uppers, downers and everything in between.
d. depressants, stimulants and hallucinogens.
Q:
In a drug investigation, officers can avoid charges of entrapment by
a. having a third party buy the drugs.
b. making two or more buys.
c. making an immediate arrest that is witnessed.
d. using marked buy money.
Q:
Examples of physical evidence of possession or use of controlled substances include
a. the drugs and the apparatus associated with their abuse.
b. the suspect's appearance and behavior.
c. blood and urine tests.
d. all of these choices.
Q:
Using restrictive restraint devices and procedures, such as handcuffing subjects behind their back and placing them facedown, can lead to
a. complaints of abuse.
b. back injuries.
c. positional asphyxia.
d. loss of evidence.
Q:
What role has the federal government played since 2010 to help law enforcement and communities fight drug abuse?
Q:
Choose one of the organized crime groups detailed in the text and describe some of its elements, including the origin of the group, the typical crimes the group engages in and what special challenges the organization creates for investigators.
Q:
What is the purpose of asset forfeitures? How does it help law enforcement?
Q:
How are club drugs and designer drugs similar? How are they different?
Q:
What did the Supreme Court decide in the case of Ashcroft v. Free Speech Coalition (2002) where the issue involved the use of "virtual" child pornography?
Q:
Define the "ON/OFF rule" and explain why it is imperative in any cybercrime investigation.
Q:
Explain why a business or organization might be reluctant to report a computer crime.
Q:
Describe the basic elements of a "reshipper scheme."
Q:
How could the Privacy Protection Act (PPA) impact a computer crime investigation? What issues should be considered?
Q:
What are some of the essential questions that investigators should ask when interviewing employees and staff at a business or organization that has been the victim of computer crime?
Q:
What are some of the guidelines investigators must adhere to when dealing with physical evidence in a computer crime case?
Q:
What are the elements of common protocol for processing a crime scene involving electronic evidence?
Q:
List and briefly describe the various resources (agencies or organizations) available to help law enforcement investigate computer crimes.
Q:
Discuss some of the challenges of investigating a business environment versus a stand-alone computer.
Q:
Outline the NetSmartz program, including its mission and how it has been implemented.
Q:
Discuss some of the difficulties in reporting, investigating and prosecuting Internet crimes that are transnational in scope.
Q:
How can computer crimes be prevented? Who is primarily responsible for putting new policies into place?
Q:
Describe the three general categories of cybercriminals and their respective motivations.
Q:
Outline some examples of the type of computer crime evidence that may be found in an investigation.
Q:
Computer crimes can also include hidden messages or images, which may appear as an innocent cover message or picture. The Greek word for "hidden writing" refers to this process as ____________________.
Q:
____________ is any procedure used in cryptography to convert plain text into cipher-text to prevent anyone but the intended recipient from reading the data.
Q:
Most e-crimes are handled _____________ without involving legal action or law enforcement.
Q:
Because successful criminal prosecution of intellectual property theft requires reliable investigative resources, the Cyber Division and the Intellectual Property Rights Division were created by the ________________ to investigate intellectual property theft and fraud.
Q:
When UCE, also known as _________, is distributed on a massive scale with malicious or contentious content or with intent to defraud, it becomes criminal.
Q:
______________ involves the hijacking of a domain name in order to redirect online traffic toward a bogus Web site.
Q:
Data ____________ is the residual physical representation of data that have been erased.
Q:
A computer program such as Internet Explorer that accesses and displays data from the Internet or other networks is called a(n) ____________.
Q:
Child pornography, fraud and gambling are examples of crimes in which the computer is used as a(n) __________.
Q:
The FBI defines computer crime as "that which involves the addition, deletion, change or theft of _____________ from a computer."
Q:
Worms are more powerful and destructive than viruses.
Q:
Spyware is most commonly used to infiltrate national security systems, with the ultimate goal of disarming national defense systems.
Q:
Cyberterrorism is a premeditated, politically motivated attack against information, computer systems, computer programs and data that results in violence against noncombatant targets.
Q:
Cybercriminals are solitary by nature and do not operate in groups.
Q:
A search warrant is not needed to search a computer connected to the Internet, because there is no expectation of privacy.
Q:
Perverted Justice is an Internet-based organization that is committed to assisting victims of cybercrime.
Q:
Most computer crimes are not prosecuted.
Q:
Unlike computer hard drives, the electronic memory devices within cell phones can be completely erased, leaving no possibility of retrieving deleted items.
Q:
Very few states have enacted computer crime statutes.
Q:
Most computer crimes are committed by insiders.
Q:
Investigators do not need to be concerned that digital evidence may also contain physical evidence such as DNA, fingerprints or serology.
Q:
Virus attacks rank as the most common crime against a computer.
Q:
The terms Internet and Web are basically interchangeable.
Q:
The Privacy Protection Act establishes that investigators are allowed to seize drafts of newsletters or Web pages if there is reason to believe that the seizure is necessary in order to prevent death or serious bodily injury.
Q:
The suffixes ".com," ".gov," and ".int" are common examples of an ISP.
Q:
Keystroke logging is a specific maneuver that initiates a "denial of service" attack.
Q:
Electronic evidence is fragile.
Q:
When removing a computer from a site, the first thing the investigator should do, for safety, is to turn the machine off and unplug the computer from the wall.
Q:
Adware is a covert way to advertise on Web sites without having to pay a fee.
Q:
An attempt to get victims to disclose personal, sensitive information such as passwords and bank account numbers is referred to as phishing.
Q:
IC3 stands for
a. Internet Computer Three.
b. International Computer Classification Corporation.
c. Internet Crime Complaint Center.
d. none of these choices.
Q:
A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a
a. salami slice.
b. logic bomb.
c. super-zapper.
d. Trojan horse.
Q:
Most computer crimes are
a. not reported.
b. reported in excessive amounts to local authorities.
c. reported frequently.
d. reported to the federal government.
Q:
Cybercrime is
a. a local problem.
b. a transnational problem.
c. strictly a federal problem.
d. a minor problem when compared to the losses to the public caused by street crime.
Q:
The biggest difference between traditional evidence and computer evidence is the latter's
a. electronic nature.
b. lack of availability.
c. storage on discs.
d. fragility.
Q:
Common protocol for processing a crime scene involving electronic evidence includes which of the following?
a. Photographing and diagramming the placement of all computer terminals.
b. Holding the IT staff in quarantine until reinforcements arrive.
c. Obtaining a search warrant.
d. Unplugging all computers, telephones and printers.
Q:
What is the name for the process, often considered synonymous with phishing, that involves acquiring unauthorized access to a computer or network through a message using an IP address which appears to be from a trusted host, in an attempt to commit identity theft?
a. snarking
b. spoofing
c. Sniping
d. shadowing
Q:
Which of the following specialists are frequently consulted in the team approach to investigating computer crime?
a. the victim who owns the equipment
b. database processing technicians
c. auditors
d. all of these choices
Q:
Intentionally destroying computer information, programs or hardware using a logic bomb is classified as
a. embezzlement.
b. espionage.
c. extortion.
d. sabotage.
Q:
Electronic evidence and other computer crime evidence may take the form of
a. printers and scanners.
b. VCRs and GPS devices.
c. telephones and fax machines.
d. all of these choices.
Q:
Skimming is defined as
a. monitoring data traveling along a data network.
b. scavenging through a business's garbage looking for useful information.
c. exploiting the telephone system's vulnerabilities to acquire free access and usage in a dial-up Internet provider system.
d. a method in which a device is placed in a card reader to record sensitive information.
Q:
Computer disks should be stored away from
a. strong light.
b. magnetic fields.
c. dust.
d. all of these choices.
Q:
Computer evidence is
a. next to impossible to destroy.
b. destroyed only by fire or intense heat.
c. easy to destroy.
d. preserved by magnetic fields.
Q:
Which of the following statements is not true?
a. A virus attack could lead to the hacking of evidence logs and hijacking of department reports.
b. Security of the police department's computers is basically a nonissue, because most police departments have highly trained computer specialists on staff.
c. Systems that control computer-aided dispatch, records management applications and offender databases should be a top priority for security.
d. Any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department.
Q:
Theft of intellectual property
a. involves the theft of ideas, not property.
b. is hacking into a computer and stealing individual programs, not ideas.
c. involves the pirating of proprietary information and copyrighted material.
d. only applies to written material.
Q:
Which of the following statements is true?
a. A static IP address does not fluctuate and is thus more secure
b. A dynamic IP address fluctuates and is thus more secure.
c. An ISP is a unique number, analogous to a phone number.
d. An IP address is directly linked to the location of the building where the computer can be found.