1/271
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
The primary destruction resulting from a dirty bomb is usually a result of
panic.
NIMS stands for
National Incident Management System.
The group HAMAS is
a militant Palestinian Islamic movement in the West Bank and Gaza Strip.
Weapons of mass destruction (WMDs) can contain
all of these choices
(biological elements,
nuclear agents,
chemical agents.)
The Al-Aqsa Martyrs Brigades are
a group formed in the refugee camps in the West Bank of Israel.
Certain experts believe that because of the difficulty in obtaining materials, the least likely type of terrorism to occur is
bioterrorism.
Which of the following is not one of the ways in which the USA PATRIOT Act significantly improved the nation's counterterrorism efforts?
allowing for political assassinations with presidential approval
"Terrorism that initiates, or threatens to initiate, the exploitation or attack on information systems" is the FBI's definition of which type of terrorism?
cyberterrorism
What did members of Aum Shinrikyu, a new-age cult, release into the Tokyo subway system, killing 12 and sending 5,000 to the hospital?
sarin gas
Which of the following is not a type of chemical weapon?
immune agents
A sleeper cell is
a group of terrorists who blend into a community until called to action
What does ALF stand for?
Animal Liberation Front
Which of the following crimes is not normally associated with funding terrorism?
contract killing
The "contagion effect" refers to
the fact that the coverage of terrorism inspires more terrorism.
The FBI categorizes terrorism in the United States as either
domestic or international.
Which was a case of domestic terrorism?
bombing of the Alfred P. Murrah Federal Building in Oklahoma City in 1985
The Earth Liberation Front (ELF) is an example of what type of organization?
ecoterrorist
A common tactic that enables a weaker state or nonstate entity, such as a terrorist group, to achieve an advantage over a stronger adversary is known as what?
asymmetric warfare
The term intifada means
uprising
At the federal level, what is the name of the lead agency for responding to acts of domestic terrorism?
Homeland Security/FEMA
The number one priority in any terrorist-preparedness plan should be
communication between local, state and federal law enforcement agencies.
Which of the following is not one of the four common types of chemical weapons?
"knockout" agents
The Army of God is
a pro-life, antiabortion group in the United States.
The method most likely to be used by terrorists is
explosives.
Which toxin is both a biological and a chemical weapon, is more than 1,000 times as poisonous as cyanide and, in its purest form, can kill an adult in an amount no bigger than a grain of table salt?
ricin
Using restrictive restraint devices and procedures, such as handcuffing subjects behind their back and placing them facedown, can lead to
positional asphyxia.
Examples of physical evidence of possession or use of controlled substances include
all of these choices.
(the drugs and the apparatus associated with their abuse,
the suspect's appearance and behavior,
blood and urine tests.)
In a drug investigation, officers can avoid charges of entrapment by
making two or more buys.
Drugs can be classified as
depressants, stimulants, narcotics, hallucinogens, cannabis or inhalants.
Which of the following is not a distinctive characteristic of organized crime?
strong ideological foundation
If an officer observes what appears to be a drug buy,
the officer can make warrantless arrest if there is probable cause.
Drug addiction is
a progressive disease.
Organized crime is not involved in which of the following victimless crimes?
None of these choices
Rohypnol is a
Depressant
Barbiturates are classified as
depressants
Which of the following crime networks has been called the fastest-growing criminal organization in the United States?
Eurasian Organized Crime (EOC)
The primary emphasis of the Federal Drug Enforcement Administration is to
stop the flow of drugs
What act did the federal government pass in 1914 that made the sale or use of certain drugs illegal?
the Harrison Narcotics Act
Designer drugs are
all of these choices.
(created by adding something to an existing drug,
created by omitting something from an existing drug,
high-profit drugs for dealers.)
Crack
has 10 times more impact than cocaine
Which of the following provides revenue to law enforcement for antidrug efforts?
asset forfeiture
The major legal evidence in prosecuting drug sale cases is
the actual transfer of the drug from the seller to the buyer.
The RICO Act of 1970 is one of the major federal acts that
make it permissible to use circumstantial rather than direct evidence to enforce conspiracy violations.
Surveillance is used in narcotics investigations to
all of these choices.
(protect the money put up to make the buy,
provide credibility for the buy,
provide information to establish probable cause for an arrest.)
With reference to drugs, OTC stands for
over-the-counter.
Designer drugs, which are illicit drugs that are offshoots of the legal drugs from which they are created, may cause the muscles to stiffen and give the appearance of someone suffering from Parkinson's disease. These illicit drugs are referred to as what type of drugs?
analogs
Drugs found on a person during a legally conducted search
may be seized
Which of the following is not one of the four groups that make up the Mafia?
the Fratelli Gambino
Club drugs, prescription narcotics and ultra-pure forms of DXM, an ingredient found in OTC cough medication,
can all be purchased online and shipped directly to the user's home—transactions that are extremely difficult for law enforcement to detect.
The U.S. Congress has defined a drug addict as
any person who both habitually uses any habit-forming narcotic drug so as to endanger the public morals, health, safety or welfare, and is or has been so far addicted to the use of habit-forming narcotic drugs as to have lost the power of self-control with reference to the addiction.
A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:
a. salami slice.
b. logic bomb.
c. super-zapper.
d. Trojan horse.
d. Trojan horse.
A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a:
a. shadow bomb.
b. logic bomb.
c. super-program.
d. turtle.
b. logic bomb.
A virus attack may replace or destroy data on the computer's hard drive and:
a. identify bank accounts and financial records.
b. leave a "back door" open for later entry.
c. obtain one's access codes.
d. defraud the end user.
b. leave a "back door" open for later entry.
A zombie is a computer:
a. used to spoof or falsify IP and e-mail addresses.
b. that has been rendered nonfunctional by a virus.
c. used by hackers to copy other computer programs.
d. that has been taken over by another computer.
d. that has been taken over by another computer.
Common protocol for processing a crime scene involving electronic evidence includes which of the following?
a. photographing and diagramming the placement of all computer terminals
b. holding the IT staff in quarantine until reinforcements arrive
c. obtaining a search warrant
d. unplugging all computers, telephones, and printers
c. obtaining a search warrant
Computer disks should be stored away from:
a. magnetic fields
b. metal.
c. partials.
d. light .
a. magnetic fields
Computer evidence is:
a. next to impossible to destroy.
b. destroyed only by fire or intense heat.
c. easy to destroy.
d. preserved by magnetic fields.
c. easy to destroy.
Cybercrime is:
a. a local problem.
b. a transnational problem.
c. strictly a federal problem.
d. a minor problem.
b. a transnational problem.
Digital evidence is often contained on:
a. printers and scanners.
b. VCRs and GPS devices.
c. hard drives or CDs.
d. telephones and fax machines.
c. hard drives or CDs.
IC3 stands for:
a. International Computer Crime Categorization.
b. International Computer Classification Corporation.
c. Internet Crime Complaint Center.
d. Internet Computer Crime Commission
c. Internet Crime Complaint Center.
Intentionally destroying computer information, programs, or hardware using a logic bomb is classified as:
a. embezzlement.
b. espionage.
c. extortion.
d. sabotage.
d. sabotage.
Most computer crimes are:
a. not reported.
b. reported in excessive amounts to local authorities.
c. reported frequently.
d. reported to the federal government.
a. not reported.
NW3C stands for:
a. North West Computer Crime Center.
b. National White Collar Crime Center.
c. New West Crime Center Corporation.
d. National White Collar Criminological Center.
b. National White Collar Crime Center.
Port scanning is:
a. looking for access into a computer.
b. scanning for a portable computer that is using a wireless system.
c. removing data.
d. linking access codes.
a. looking for access into a computer.
Skimming is defined as:
a. monitoring data traveling along a data network.
b. scavenging through a business's garbage looking for useful information.
c. exploiting the telephone system's vulnerabilities to acquire free access to Internet provider systems.
d. a method in which a device is placed in a card reader to record sensitive information.
d. a method in which a device is placed in a card reader to record sensitive information.
The USA PATRIOT Act, signed by President George W. Bush in 2001, grants:
a. roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.
b. total authority to the FBI for wiretapping the communication lines of any U.S. citizen.
c. total authority to the FBI to arrest any noncitizen who is under suspicion of using communication lines to plan a terrorist attack.
d. roving authority to the FBI for wiretapping the communication lines of any American.
a. roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.
The biggest difference between traditional evidence and computer evidence is the latter's:
a. electronic nature.
b. lack of availability.
c. storage on discs.
d. fragility.
d. fragility.
Theft of intellectual property:
a. involves the theft of ideas, not property.
b. is hacking into a computer and stealing individual programs, not ideas.
c. involves the pirating of proprietary information and copyrighted material.
d. only applies to written material.
c. involves the pirating of proprietary information and copyrighted material.
What type of material should be used when packaging electronic evidence?
a. cellophane
b. aluminum
c. plastic materials
d. paper bags
d. paper bags
Which of the following is one of the three general categories of cybercriminals?
a. pharmer
b. hacker
c. white hat
d. IT professionals
b. hacker
Which of the following specialists are frequently consulted in the team approach to investigating computer crime?
a. mathematicians
b. auditors
c. social media specialists
d. logicians
b. auditors
Which of the following statements about reshipper schemes is correct?
a. These schemes typically involve employees of the U.S. Postal Service, UPS, FedEx, or similar businesses.
b. The masterminds of reshipper schemes often initiate contact with their victims in chat rooms.
c. Scam artists who organize these schemes are frequently charged with sabotage.
d. These schemes involve intercepting a computer, installing spyware, and sending the computer to its destination.
b. The masterminds of reshipper schemes often initiate contact with their victims in chat rooms.
Which of the following statements is true?
a. A static IP address does not fluctuate and is thus more secure.
b. A dynamic IP address fluctuates and is thus more secure.
c. An ISP is a unique number, analogous to a phone number.
d. An IP address is directly linked to the location of the building where the computer can be found.
b. A dynamic IP address fluctuates and is thus more secure.
Which of the following statements is true?
a. Because most police departments have limited reliance on computers, a cyberattack is unlikely to have significant consequences.
b. Security of the police department's computers is basically a nonissue, because most police departments have highly trained computer specialists on staff.
c. Systems that control computer-aided dispatch, records management applications and offender databases are a low priority for security.
d. Any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department.
d. Any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department.
Which process is often considered synonymous with phishing and involves acquiring unauthorized access to a computer or network through a message using an IP address appearing to be from a trusted host, in an attempt to commit identity theft?
a. snarking
b. spoofing
c. sniping
d. shadowing
b. spoofing
Motor vehicle thefts are often associated with:
stripping vehicles for parts and accessories or reselling vehicles for profit
The profit on stripped auto parts and accessories is:
extremely high
Installing brighter lights in areas where cars are parked has been successfully used to combat auto theft.
True
A possible indication of a stolen vehicle might include which of the following?
a sloppily applied dealer's sticker
When the police use a car to try to trap a car theft suspect by placing it in a high crime area, the vehicle is called a ____ car.
bait
If an officer stops a vehicle, what might suggest that the car is stolen?
wearing gloves in hot weather
What is the name of the program instituted in New York City that gives the police permission to stop any vehicle being driven between 1 A.M. and 5 A.M. if the vehicle has a sticker indicating that the owner of the vehicle participates in this program?
CAT
A crime in which a stolen vehicle assumes the identity of a legally owned, or nonstolen, vehicle of a similar make and model is called:
vehicle cloning
Which agency cooperates with the police in motor vehicle theft?
NICB
The state with the most auto thefts is currently:
California
A business that takes stolen cars apart to sell the parts for a profit is known as a:
chop shop
The most important means of identifying an automobile is its:
VIN
What does NCIC stand for?
National Crime Information Center
A juvenile or young person who takes a car for some "thrills or excitement" may be guilty of:
joyriding
Legitimate ownership of a motor vehicle exists when the vehicle is any EXCEPT which of the following?
being loaned to another
Which type of physical evidence should officers be particularly careful to search for in a vehicle theft case?
evidence that rake and pick guns were used
In order to rule out the possibility of a false report of vehicle theft, officers should check to see if:
someone wanted to provide an alibi for crashing the car
The Vehicle Identification Number of an automobile is:
an unduplicated number assigned by the manufacturer
For purposes of theft, the definition of a motor vehicle includes which of the following?
homemade motor vehicles, such as kit cars
The secure-idle system is a means of preventing the theft of construction vehicles.
False
The elements of motor vehicle theft are:
intentionally taking or driving a motor vehicle without the consent of the owner or the owner's authorized agent
The National Insurance Crime Bureau Web site suggests a four-layered approach to combat auto theft: common sense, visible and audible warning devices, immobilizing devices, and:
tracing devices
Transporting a stolen vehicle across state lines is a violation of what act?
Dyer Act
Which of the following is recommended as a way to improve an officer's ability to recognize stolen vehicles?
Take time to check suspicious persons and vehicles
Someone who needs an alibi or a cover-up for an accident or even for misplacing the car may:
file a false police report