1/209
this includes all quiz questions and answers for modules 1-6 of CJE4694 (Cyber Crime) in preparation for the midterm
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Rapid growth in the computer security industry has largely occurred without adequate research on the nature of cybercrimes and criminals.
true
Which of following is not a common theme to emerge from the research on the problems of computer crime?
behavioral approaches of cybercriminals
Computers may be used as both criminal instruments and instruments of warfare.
true
Case studies offer generalizations about trends in cybercriminality or patterns of offending.
false
The expanded use of Social Security numbers is the primary reason for the ease of identity theft.
true
Intellectual property violations, component theft, counterfeiting, and identity theft are examples of which type of computer crime?
crimes associated with the prevalence of computers
The text seeks to merge knowledge of criminal justice and knowledge of computer science.
true
Which of the following is not a characteristic noted by Anderson and colleagues in 2012?
crimes that facilitate other crimes through the proper use of computers
Which of the following is most true?
Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations.
It is relatively easy to place a monetary value on the loss of intellectual property.
false
The Department of Justice systematically collects computer crime data.
false
Which of the following is not one of the three major credit reporting bureaus that control the information on all persons applying for credit in the United States?
Trans Credit
The full extent of computer theft is unknown because many thefts go unreported.
true
Child pornography is an example of which type of computer crime?
computer as incidental to crime
Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.
computer as an instrument of a crime
Research has shown that most dangers of economic computer crimes come from outsiders.
false
"Cyber" refers to almost anything "real" or "virtual" attached to a computer or network.
true
Computerized theft never deprives a legitimate owner of a tangible asset.
false
According to the authors of the text, another term for digital crime is:
cybercrime
The salami slice technique, pyramid schemes, and bunko schemes are examples of which type of computer crime?
computer as an instrument of a crime
Criminal statistics/data on computer crime are
virtually nonexistent; there is no centralized source.
In general, the threat of computer crime victimization increases with industrialization.
true
Which of the following is most true?
The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same.
Which of the following is most true?
Cybercrime has significantly increased since the 1990s.
Which of the following is most true?
It can take months or even years to identify an actual monetary value for the loss of intellectual property.
Computer crime is not an international problem.
false
Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer.
true
Which of the following is most true?
A great deal of effort is dedicated to computer security.
Which of the following is not considered in the calculation of costs associated with each type of computer crime?
All of the above are considered in the calculation of costs.
Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of computer crime?
Computer as a target
Estimates on the cost of cybercrime are largely derived from criminal reports.
false
The primary difference between data alteration and network intrusion is the
intent of the intruder.
Which of the following is not one of the four categories of computer crime?
computer vandalism
Which of the following is most true?
The public relies on computers for a host of societal functions.
Which of the following is not an example of Donn Parker's work as an early commentator on problems associated with computer crime?
The "cyber" prefix to describe computer crimes.
Website defacement is a form of:
information attack
Which of the following is one of the four categories that encompasses cyberterrorism and/or information warfare?
promotion
Which of the following is not true?
The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.
Critical infrastructure is not an attractive target to terrorists.
false
What major category of information warfare/cyberterror do "cyber-plagues" fall into?
Information attacks
Which of the following is not a wave in the development of warfare as identified by Alvin Toffler?
Renaissance wave
An unauthorized intrusion is easy to identify once it has occurred.
false
What major category of information warfare/cyberterror does "cryptography" fall into?
Technological facilitation
According to the Russian perspective, cybercrime and cyberterrorism are acceptable techniques of information warfare.
true
The nation of Japan currently poses a larger threat to the United States in terms of information warfare than that posed by China.
false
The greatest threat to civil aviation security is:
heavy reliance on other types of infrastructure.
Which of the following is least true?
Cyberterrorism is defined by the group perpetrating it.
Which is not a category of cyberterrorism?
Physical attacks
A virus is a piece of code that attaches itself to other instructions within a computer.
true
A worm is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker.
true
Using a cell phone to encourage a flash mob is a form of:
cyber and technological facilitation.
The type of attack the hacker group "Anonymous" carried out against the private intelligence industry provider Stratfor is considered:
unauthorized intrusions
It is estimated that 100 million attacks against U.S. businesses and governments take place each day.
true
Distributed denial-of-service attacks are an example of:
information attacks.
Which of the following is not true?
Al Qaeda produced the computer virus "Stuxnet."
Which of the following is not a component of information warfare?
Propaganda
Requesting funds for a terrorist organization through a chat room is an example of:
direct solicitation
What major category of information warfare/cyberterror does "recruiting" fall into?
Promotion
Information warfare is always a component of cyberterrorism.
false
Which of the following is not one of the five essential components of infrastructure?
Government
A cryptographic key is necessary to read encoded material.
true
Data hiding is difficult to accomplish, but relatively easy to discover in Internet files.
False
The United States is likely the nation that is most vulnerable to digital terrorism.
True
Infrastructure attacks are those attacks designed to destroy a system that includes critical data.
true
The Internet is the best tool for propaganda and recruitment among terrorists.
true
What major category of information warfare/cyberterror does "data hiding" fall into?
Technological facilitation
Despite its contention that modern technological advancements are incompatible with fundamentalist Islam culture, al Qaeda has become a primary foe in the digital terrorism area.
true
Which of the following is least true?
The Chinese government restricts the use of cyber warfare to the Chinese military.
Information attacks are the use of cyber communication to distribute or coordinate plans for a terrorist attack, incite an attack, or otherwise assist in the facilitation of terrorism.
false
What major category of information warfare/cyberterror does "website defacement" fall into?
Information attacks
The propagation of a worm that does not actually damage anything and is more of a nuisance than anything else is a form of denial of injury according to Sykes and Matza's techniques of neutralization.
true
Psychological theory identifies the specific reasons a person becomes a pedophile.
false
Deterrence theory assumes that individuals are rational actors.
true
Which of the following is not a reason that choice theory became popular among criminologists in the 1970s?
Crime-producing traits and factors were discovered.
An individual that engages in computer crime, fraud, and robbery in an effort to obtain financial success has adopted which form of Merton's modes of adaptation?
Innovation
According to Agnew's General Strain Theory, which of the following is NOT a source of strain?
Cultural goal of economic success
A ritualist rejects the cultural goal of economic success but accepts the institutionalized means to obtain the cultural goal.
true
According to Merton, a(n) __________ accepts the goal of economic success but rejects the institutionalized means to obtain it.
innovator
A subculture is a set of values, norms, and beliefs that differ from those of the dominant culture.
true
"Three strikes and you're out" is an example of policy based on choice theory.
true
White-collar crime cannot be applied to contemporary strain theory because of the assumption that only lower-class individuals commit crimes.
false
According to Hirschi, which of the following is NOT an element of the social bond?
Emotional
According to Cohen and Felson, crime occurs when there is a convergence in time and space of three factors. Which of the following is NOT one of those factors?
An adequate sight line from the location
A university enacts a policy in which any student that is caught illegally downloading media files will be automatically expelled from the university. The university hopes that students will be deterred from engaging in illegal downloading. This policy is an example of which theory?
Choice Theory
Social control theory assumes that people will violate the law.
true
Many hackers acknowledge their activities are illegal, but legitimize and justify the actions using various rationales.
true
Which technique of neutralization occurs when an individual believes his actions were beyond his control?
Denial of responsibility
Sutherland's theory of differential association clearly explains how behavior is learned.
false
__________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future.
Specific deterrence
A judge tells a defendant, "You are sentenced to prison not because of your crimes, but so that others will not engage in the same crimes." This is an example of which type of deterrence:
General deterrence
Which of the following is NOT a personality characteristic conducive to crime identified by the Gluecks?
Lack of self-esteem
According to Kohlberg, right corresponds to seeing one's own needs met, taking responsibility for oneself, and allowing others to do the same in which stage of moral development?
Hedonistic orientation stage
A terrorist group that hacks into an electrical power grid in order to cause a massive blackout and disrupt normalcy in the name of economic equality has subscribed to which theory?
Political theory
Which of the following is NOT a characteristic of Marxist thought?
Political change can be achieved without conflict.
Hackers appear to exhibit a subculture that includes:
all of the above
Cohen and Felson argue that the motivation to commit crime and the supply of offenders are constant.
true
Research has shown that the threat of arrest greatly deters would-be criminals.
false
Which of the following theorists developed a learning theory of crime?
Sutherland
Which of the following is NOT a finding of Holt and Bossler's empirical study of routine activities theory and online harassment?
Personal and peer involvement in deviance had no influence on the risk of online harassment.
According to Kohlberg, which two stages of moral development are completed by age 7?
Punishment and obedience orientation stage and hedonistic orientation stage