AJS572 Week Four Quiz | Documents and Forms | Research Papers

AJS572 Week Four Quiz

AJS572 Week Four Quiz BA-281 Instant Download Price
In Stock
$ 5.99 USD
Quality Academic Papers
Buy and Download Description

AJS/572 Week Four Quiz 1) The reason it is difficult to develop a clear image of computer crime and to predict future trends is that data are not collected to document the nature, trends, and extent of computer crime. A. True B. False 2) As computers become increasingly integrated into daily life and more people utilize the Internet, cybervictimization will decrease. A. True B. False 3) Which is NOT part of the four categories of a computer crime? A. The computer as a target B. The computer as an instrument of the crime C. Crimes associated with the prevalence of computers D. The hard drive of a computer 4) The first step of risk analysis is to A. assess the situation. B. identify the threats. C. provide recommendations. D. contact local law enforcement. 5) A firewall is a device or software program that serves as a checkpoint between the Internet and a network or a stand-alone computer. A. True B. False 6) The greatest problem in computer security is password protection. A. True B. False 7) Cyberstalkers can target victims in A. chat rooms. B. message boards. C. e-mails. D. All of these E. None of these 8) Phishing is a technique where someone is coerced through a lottery ticket. A. True B. False 9) Through phishing scams, criminals attempt to obtain A. bank account numbers. B. birth dates. C. addresses. D. social security numbers. E. All of these 10) Phishers can operate from wherever there is Internet access. A. True B. False 11) An example of victimization that relates to identity theft fraud is A. robbery. B. credit card fraud. C. arson. D. criminal mischief. 12) An example of a method used to steal someone’s identity is A. targeting mailboxes. B. dumpster diving. C. stealing a purse or wallet. D. All of these 13) Current prevention methods that protect individuals from becoming victims of identity theft include the following: A. Educational programs B. New reporting systems C. Victim-assistance programs D. None of these 14) Forms of Internet fraud include the following: A. Burglary B. Arson C. Internet auctions D. Exploitation 15) The term spoofing is used when information has been stolen by a cyberstalker. A. True B. False 16) Credit card schemes involve the use of unlawfully obtaining credit card numbers to order goods and services over the Internet. A. True B. False 17) The term cybertrail refers to A. any convergence of digital evidence that is left behind by a victim. B. any convergence of digital evidence that is left behind by an attorney. C. any convergence of digital evidence that is left behind by the police. D. None of the these 18) The terms digital evidence and electronic evidence are never used interchangeably. A. True B. False 19) Evidence that is used to investigate crimes may be placed into one of the following three categories: relational, temporal, and accountability. A. True B. False 20) The term victimology refers to the study of A. the victim’s rapport with law enforcement. B. the victims’ characteristics. C. the date and time a crime was committed. D. the punishment for the crime. 21) A Trojan horse A. is a term used in the industry to designate good hackers. B. is a tangled code. C. can corrupt data. D. is the art and science of cracking the phone network. 22) The most common operating system is Microsoft® Windows. A. True B. False

AJS/572 Week Four Quiz 1) The reason it is difficult to develop a clear image of computer crime and to predict future trends is that data are not collected to document the nature, trends, and extent of computer crime. A. True B. False 2) As computers
Recent Reviews Be the first to Review this product!
0 0 0 0 reviews