Filters
Question type

Study Flashcards

A virus attack may replace or destroy data on the computer's hard drive and:


A) identify bank accounts and financial records.
B) leave a "back door" open for later entry.
C) obtain one's access codes.
D) defraud the end user.

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Discuss some of the difficulties in reporting, investigating, and prosecuting Internet crimes that are transnational in scope.

Correct Answer

verifed

verified

The global reach of the Internet poses a...

View Answer

The terms Internet and Web are basically interchangeable.

A) True
B) False

Correct Answer

verifed

verified

Which process is often considered synonymous with phishing and involves acquiring unauthorized access to a computer or network through a message using an IP address appearing to be from a trusted host, in an attempt to commit identity theft?


A) snarking
B) spoofing
C) sniping
D) shadowing

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

How could the Privacy Protection Act (PPA) impact a computer crime investigation? What issues should be considered?

Correct Answer

verifed

verified

Investigators must be alert to situation...

View Answer

The biggest difference between traditional evidence and computer evidence is the latter's:


A) electronic nature.
B) lack of availability.
C) storage on discs.
D) fragility.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:


A) salami slice.
B) logic bomb.
C) super-zapper.
D) Trojan horse.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Viruses are more powerful and destructive than worms.

A) True
B) False

Correct Answer

verifed

verified

_______________ is any procedure used in cryptography to convert plain text into cipher-text to prevent anyone but the intended recipient from reading the data.

Correct Answer

verifed

verified

Outline the NetSmartz program, including its mission and how it has been implemented.

Correct Answer

verifed

verified

The National Center for Missing and Expl...

View Answer

Cybercriminals are solitary by nature and rarely operate in groups.

A) True
B) False

Correct Answer

verifed

verified

Outline some examples of the type of computer crime evidence that may be found in an investigation.

Correct Answer

verifed

verified

Digital evidence is often contained on d...

View Answer

How can computer crimes be prevented? Who is primarily responsible for putting new policies into place?

Correct Answer

verifed

verified

Computer crimes can be prevented by educ...

View Answer

An attempt to get victims to disclose personal, sensitive information such as passwords and bank account numbers is referred to as phishing.

A) True
B) False

Correct Answer

verifed

verified

Skimming is defined as:


A) monitoring data traveling along a data network.
B) scavenging through a business's garbage looking for useful information.
C) exploiting the telephone system's vulnerabilities to acquire free access to Internet provider systems.
D) a method in which a device is placed in a card reader to record sensitive information.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Computer evidence is:


A) next to impossible to destroy.
B) destroyed only by fire or intense heat.
C) easy to destroy.
D) preserved by magnetic fields.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Child pornography, fraud, and gambling are examples of crimes in which the computer is used as a(n) _______________.

Correct Answer

verifed

verified

What are the elements of common protocol for processing a crime scene involving electronic evidence?

Correct Answer

verifed

verified

A common protocol for processing a crime...

View Answer

Discuss some of the challenges of investigating a business environment versus a stand-alone computer.

Correct Answer

verifed

verified

In a business environment, multiple comp...

View Answer

NW3C stands for:


A) North West Computer Crime Center.
B) National White Collar Crime Center.
C) New West Crime Center Corporation.
D) National White Collar Criminological Center.

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 69

Related Exams

Show Answer