Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.Why is the Internet such an attractive operational location for criminal enterprises? A.Criminals can profit by stealing and selling information. B.Cyberspace gives criminals a worldwide

1.Why is the Internet such an attractive operational location for criminal enterprises?

A.Criminals can profit by stealing and selling information.

B.Cyberspace gives criminals a worldwide reach.

C.The World Wide Web is relatively anonymous.

D.All of the above.

E.None of the above.

2.Which of the following is not categorized as a type of digital virus?

A.TSRAM

B.Multi-partite

C.Salami

D.Parasitic

3.Which of the following can investigate but not prosecute domestic Internet crimes?

A.Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF).

B.Internet Crime Complaint Center (IC3).

C.United States Postal Inspection Service.

D.Federal Bureau of Investigation (FBI).

4.Which of the following is most accurate regarding crime in cyberspace?

A.Money laundering is seldom carried out in cyberspace.

B.PayPal is a form of money laundering in cyberspace.

C.The ability to make oneself anonymous in cyberspace is an important advantage to the criminal.

D.Crimes carried out in cyberspace would most likely be committed by "Neolithic era" criminals.

5.Which of the following statements is most accurate with regard to cyber security?

A.Piggybacking and impersonation are viruses susceptible to antivirus software.

B.The E-SIGN Act resulted in improved cyber security.

C.Passwords are the most effective form of authenticating valid users.

D.Biometrics verification techniques include fingerprints, palm prints, voice prints, signatures retina scans and facial recognition.

6.Which of the following is not associated with increased risk regarding insider cyber fraud?

A.Supervisors can implement strict controls over information system personnel.

B.Insiders are often aware of the "holes" in the system of internal controls in the digital environment.

C.Operators, media librarians, hardware technicians and other staff members hold positions with high levels of access privilege.

D.Insider computer fraudsters are often very intelligent.

7.Which of the following is true concerning computer fraud and computer crime?

A.Computer crime is defined as an act where the computer hardware, software or data is altered, destroyed, manipulated or compromised.

B.Computer fraud and computer crime are seldom used interchangeably.

C.Law enforcement crime fighters have been ahead of technologically savvy criminals is identifying the types of computer-based crimes that perpetrators are likely to attempt.

D.Computer crime suggests that the computer's owner is the perpetrator whereas computer fraud suggests that the computer owner is a victim..

8.Which of the following is not an approach used to combat money laundering in cyberspace?

A.Identify and reduce the ability to make anonymous financial transactions.

B.Require confidential financial transactions.

C.Coordinate international money movement regulations.

D.Facilitate international information sharing.

9.Which of the following is not categorized as a type of digital virus?

A.TSRAM

B.Multi-partite

C.Salami

D.Parasitic

10.Which of the following statements is most accurate with regard to "hacking?

A.Logic bombs and data leakage are not considered forms of hacking.

B.Social engineering is a required tool of hackers.

C.The most direct way of gaining access to a computer is through "back doors" in software programming.

D.A hacker may assume a number of different disguises to accomplish deception.

11.Which of the following type of economic damages related to computer crimes is not

considered a special case?

A.Physical injury to a person.

B.Damage to a computer that could have an impact on national security.

C.Threats to public health or safety.

D.Damage to a computer that causes a company to file for bankruptcy.

12.Why is Internet fraud particularly difficult to police?

A.More people are on-line feeding leads to police.

B.Con artists are more convincing on-line than they are when operating in person.

C.Nearly 70 percent of Internet consumers are shredding documents, destroying required transaction information needed for investigation and prosecution.

D.Law enforcement may lack the training, resources and jurisdiction to investigate and prosecute reported cases of Internet fraud.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Principles

Authors: Jerry J Weygandt, Donald E Kieso, Paul D Kimmel

8th Edition

0471980196, 9780471980193

More Books

Students also viewed these Accounting questions

Question

4. What means will you use to achieve these values?

Answered: 1 week ago