Question
1.Why is the Internet such an attractive operational location for criminal enterprises? A.Criminals can profit by stealing and selling information. B.Cyberspace gives criminals a worldwide
1.Why is the Internet such an attractive operational location for criminal enterprises?
A.Criminals can profit by stealing and selling information.
B.Cyberspace gives criminals a worldwide reach.
C.The World Wide Web is relatively anonymous.
D.All of the above.
E.None of the above.
2.Which of the following is not categorized as a type of digital virus?
A.TSRAM
B.Multi-partite
C.Salami
D.Parasitic
3.Which of the following can investigate but not prosecute domestic Internet crimes?
A.Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF).
B.Internet Crime Complaint Center (IC3).
C.United States Postal Inspection Service.
D.Federal Bureau of Investigation (FBI).
4.Which of the following is most accurate regarding crime in cyberspace?
A.Money laundering is seldom carried out in cyberspace.
B.PayPal is a form of money laundering in cyberspace.
C.The ability to make oneself anonymous in cyberspace is an important advantage to the criminal.
D.Crimes carried out in cyberspace would most likely be committed by "Neolithic era" criminals.
5.Which of the following statements is most accurate with regard to cyber security?
A.Piggybacking and impersonation are viruses susceptible to antivirus software.
B.The E-SIGN Act resulted in improved cyber security.
C.Passwords are the most effective form of authenticating valid users.
D.Biometrics verification techniques include fingerprints, palm prints, voice prints, signatures retina scans and facial recognition.
6.Which of the following is not associated with increased risk regarding insider cyber fraud?
A.Supervisors can implement strict controls over information system personnel.
B.Insiders are often aware of the "holes" in the system of internal controls in the digital environment.
C.Operators, media librarians, hardware technicians and other staff members hold positions with high levels of access privilege.
D.Insider computer fraudsters are often very intelligent.
7.Which of the following is true concerning computer fraud and computer crime?
A.Computer crime is defined as an act where the computer hardware, software or data is altered, destroyed, manipulated or compromised.
B.Computer fraud and computer crime are seldom used interchangeably.
C.Law enforcement crime fighters have been ahead of technologically savvy criminals is identifying the types of computer-based crimes that perpetrators are likely to attempt.
D.Computer crime suggests that the computer's owner is the perpetrator whereas computer fraud suggests that the computer owner is a victim..
8.Which of the following is not an approach used to combat money laundering in cyberspace?
A.Identify and reduce the ability to make anonymous financial transactions.
B.Require confidential financial transactions.
C.Coordinate international money movement regulations.
D.Facilitate international information sharing.
9.Which of the following is not categorized as a type of digital virus?
A.TSRAM
B.Multi-partite
C.Salami
D.Parasitic
10.Which of the following statements is most accurate with regard to "hacking?
A.Logic bombs and data leakage are not considered forms of hacking.
B.Social engineering is a required tool of hackers.
C.The most direct way of gaining access to a computer is through "back doors" in software programming.
D.A hacker may assume a number of different disguises to accomplish deception.
11.Which of the following type of economic damages related to computer crimes is not
considered a special case?
A.Physical injury to a person.
B.Damage to a computer that could have an impact on national security.
C.Threats to public health or safety.
D.Damage to a computer that causes a company to file for bankruptcy.
12.Why is Internet fraud particularly difficult to police?
A.More people are on-line feeding leads to police.
B.Con artists are more convincing on-line than they are when operating in person.
C.Nearly 70 percent of Internet consumers are shredding documents, destroying required transaction information needed for investigation and prosecution.
D.Law enforcement may lack the training, resources and jurisdiction to investigate and prosecute reported cases of Internet fraud.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started