Student Center
|
Instructor Center
|
Information Center
|
Home
Glossary
Career Opportunities
PowerPoint Presentations
Spotlight on Terrorism
Choose a Chapter
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Chapter 19
Chapter 20
Chapter 21
Chapter Overview
Chapter Outline
Chapter Objectives
Multiple Choice Quiz
Flashcards
Internet Exercises
Interactive Exercise
Feedback
Help Center
Criminal Investigation, 8/e
Charles R. Swanson, University of Georgia
Neil C. Chamelin, Assistant State Attorney, Second Judicial Circuit
Leonard Territo, University of South Florida- Tampa
Computer Crime
Multiple Choice Quiz
1
Which of the following crimes is done using a computer as the instrument?
A)
Computer manipulation
B)
Money laundering
C)
Data alteration
D)
Theft of services
2
In which of the following is the computer incidental to the crime?
A)
Computer manipulation
B)
Money laundering
C)
Data alteration
D)
Theft of services
3
In which of the following is a computer
not
incidental to the crime?
A)
Computer manipulation
B)
Money laundering
C)
Criminal enterprises
D)
Sex crimes
4
Which of the following is an example of a crime associated with the prevalence of computers?
A)
Computer manipulation
B)
Money laundering
C)
Theft of services
D)
Intellectual property violations
5
Which of the following crimes targets a computer?
A)
Denial of service
B)
Money laundering
C)
Theft of services
D)
Intellectual property violations
6
Which of the following best defines computer abuse?
A)
Denial of service
B)
Money laundering
C)
An illegal act in which knowledge of computer technology is used to commit the act
D)
An intentional act involving a computer in which the perpetrator may have gained at the victim’s expense
7
What is a “Hacktivist”?
A)
Politically motivated hacker
B)
Denial of service attacker
C)
A proponent of Napster
D)
A person engaging in an intentional act involving a computer in which the person may have gained at the victim’s expense
8
Which of the following individuals developed one of the first systems to define computer crimes in 1976?
A)
David Carter
B)
Donn Parker
C)
Jay Nelson
D)
Robert Taylor
9
Which of the following is an example of a computer manipulation crime?
A)
An intruder removes valuable information from a computer system.
B)
Hacking
C)
A person alters payroll records to attain a higher rate of pay.
D)
Medical records are altered.
10
An intruder removes valuable information from a computer system. What term describes this crime?
A)
Computer vandalism
B)
Hacking
C)
A person alters payroll records to attain a higher rate of pay.
D)
Data alteration
11
Which of the following is a computer crime that deprives the legitimate owner of a tangible asset?
A)
Hacking
B)
Money laundering
C)
Manipulating the price of a stock
D)
Salami slice
12
Which of the following is
not
a similarity between real-world stalking and cyber stalking?
A)
Most victims are women.
B)
Most stalkers are men.
C)
The stalker and victim are near to each other.
D)
Stalkers are generally motivated by the desire to control the victim.
13
Which of the following crimes may be facilitated by the use of a computer?
A)
Loan-sharking
B)
Drug rings
C)
Prostitution rings
D)
All of the above
14
What was the name of the largest single child pornography sting operation in history?
A)
Wonderland
B)
Operation Cathedral
C)
Carnivore
D)
All of the above
15
What is a telephone “phreaker”?
A)
People who obtain free cellular phone service through theft or forgery of subscriber information or through employee collusion.
B)
People who exploit weaknesses in the cellular network’s technology to defraud the cellular service provider.
C)
People who stalk others on the Internet.
D)
People who trick telephone systems into believing that long-distance and airtime are being legitimately purchased.
16
Which of the following is not a tool utilized by computer criminals?
A)
NMAP
B)
ToneLoc
C)
Cyber-stalker
D)
Cryptanalysis
17
What is the purpose of cryptanalysis software?
A)
Breaking encryption
B)
Taking advantage of a security hole
C)
Impairing or destroying function in a computer
D)
Delivering attack software
18
What is the delivery vehicle of choice for exploit software?
A)
NMAP
B)
Cryptanalysis
C)
Tone Loc
D)
Trojan Horse Programs
19
What is the primary distinction between viruses and worms?
A)
Worms do not rely on a host program to infect.
B)
Worms masquerade as legitimate while causing damage.
C)
Viruses do not rely on a host program to infect.
D)
A computer virus is active without a host.
20
Which of the following is
not
a feature of a “cookie”?
A)
It is saved on the user’s hard drive.
B)
It tracks which sites a computer has visited.
C)
It may assist in an investigation.
D)
They are evil programs that scan the hard drive of a computer.
21
Which of the following describes the demographic profile of a hacker?
A)
White male
B)
14 to 25 years of age
C)
Highly intelligent, yet an underachiever in school
D)
All of the above
22
________________ is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media.
A)
Anonymous remailing
B)
Digital forensic analysis
C)
Using a firewall
D)
None of the above
23
Which of the following techniques is most effective in preventing computer crime?
A)
Backups
B)
Digital forensic analysis
C)
Using a firewall
D)
None of the above
24
Which of the following describes a firewall?
A)
A copy of data
B)
Data that cannot be lost
C)
Digital forensic analysis
D)
Device or software that acts as a checkpoint between a network or stand-alone computer and the Internet
25
Which of the following techniques do
not
help prevent computer crime?
A)
Backups
B)
Digital forensic analysis
C)
Firewalls
D)
Encryption
2002 McGraw-Hill Higher Education
Any use is subject to the
Terms of Use
and
Privacy Policy
.
McGraw-Hill Higher Education
is one of the many fine businesses of
The McGraw-Hill Companies
.