Under what circumstance can spam become a crime

Assignment Help Other Subject
Reference no: EM131006770

Question 1: Congress has treated computer-related crime as a distinct federal offense since the passage of what legislation?

the National Information Infrastructure Protection Act in 1996

the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984

the Crime Identification Technology Act in 1998

the Identity Theft and Assumption Deterrence Act in 1998

Question 2: Cyber crime is a new breed of offenses that involves the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, and the Internet.

True

False

Question 3: Some spam can simply be an unwanted advertisement. Under what circumstance can spam become a crime?

when it causes emotional distress to a victim

when it involves pornography

when it causes serious harm to a computer or network

when it involves an organized group of spammers

Question 4: What type of cyber threat is represented by Titan Rain?

a cyber fraud threat

a cyber terrorism threat

a cyber espionage threat

Titan Rain does not represent a threat; it is security software.

Question 5: The new phenomenon or form of cyber "entertainment" called ______ involves the use of spoofing technology to call 9-1-1 in order to fake a critical emergency, such as hostage situation, that draws a real-life response from law enforcement.

swatting

pigging

cuffing

copping

Question 6: Because cyber crime is essentially global, international cooperation is required for its control. Which of the following reflects this fact?

the International Information Infrastructure Protection Act

the Family Entertainment and Copyright Act

the Convention on Cybercrime

the Digital Millennium Copyright Act

Question 7: Currently, the Mexican drug cartels are the greatest global drug concern.

True

False

Question 8: When pornography websites send consumers to other sites involuntarily, it is known in the industry as:

tripping

mousetrapping

slagging

ping-ponging

Question 9: Information technology (IT) is the key to the _____ system and is responsible for creating the globalization phenomenon.

political

Internet

economic

social

Question 10: An estimated ____ of cocaine entering the United States transits Mexico.

20%

50%

70%

90%

Question 11: Which of the following statements best reflects cyber crime?

As information technology evolves cyber criminals are rapidly replacing non-cyber offenders.

Innovation brings change and with it new opportunities to commit crime.

Despite the rapid evolution of cyber crime, the justice system has managed to keep pace.

Cyber criminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.

Question 12: "Shadowcrew" was a cyber-terrorism ring whose members allegedly trafficked in 4.5 million stolen credit card numbers and caused total losses in excess of $3 million - money that was used to fund terrorist activities.

False

True

Question 13: It is difficult to prosecute and control Internet pornography because:

Federal legislation has been successfully challenged in the courts under the First Amendment.

As soon as one website is shutdown, another emerges to fill the gap.

Nearly all Internet porn sites are based in foreign countries.

Federal legislation has lagged behind the Internet porn industry.

Question 14: Not all instances of computer theft and computer fraud fall under existing statues because the property stolen:

may be difficult to recover

may be intangible

may be difficult to identify

may be shipped overseas

Question 15: File sharing is a type of illegal copyright infringement that allows users to download music and other copyrighted materials without paying royalties to the copyright holder.

True

False

Question 16: Which type of offenses involves the perpetrator carefully skimming small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection?

financial fraud

theft of information

salami fraud

software fraud

Question 17: Etailing is Internet jargon for the crime of cyber stalking.

False

True

Question 18: The premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents is termed:

cyber espionage

cyber spying

cyber terrorism

cyber stalking

Question 19: What are "cyber smears" and "pump and dumps?"

forms of illegal file sharing

forms of cyber stalking

forms of market manipulation

forms of denial-of-service attacks

Question 20: When an identity thief creates false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:

spamming

phishing

mousetrapping

warez

Question 21: Cyber vandalism is motivated more by profit than a cyber criminal's urge to seek revenge.

False

True

Question 22: The crimes included in RICO:

include state crimes only

include federal crimes only

include both state and federal crimes

include civil liabilities

Question 23: Why do cyber crimes present a compelling challenge for the justice system and law enforcement community?

Cyber crime is rapidly evolving.

Cyber crime is difficult to detect through traditional law enforcement channels.

Cyber crime demands that agents of the justice system develop technical skills that match those of the perpetrators.

Cyber crime presents a compelling challenge for all these reasons.

Question 24: RICO only includes federal crimes.

False

True

Question 25: The FBI uses which model as their standard investigative tool for organized crime groups?

enterprise theory of investigation

organized crime investigation

theory of organized crime investigation

new organized crime investigation

Question 26: The number of websites that advertise or sell prescription drugs is booming. The majority of these sites require that a patient provide a prescription from his or her doctor.

False

True

Question 27: The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.

True

False

Question 28: What is the most common form of spam?

e-mail

instant messaging

mobile phone messaging

Usenet newsgroups

Question 29: Why do cyber crimes present a significant challenge for criminologists?

Because cyber crimes predominately occur only in industrialized countries.

Because, unlike non-cyber crimes, cyber crimes defy accurate measurement.

Because cyber crimes defy long-held assumptions about the cause of crime.

Because cyber crimes are a function of the social environment.

Question 30: The Digital Millennium Copyright Act made it a crime to:

plant slag code into a computer system

steal or attempt to steal someone's identity via the Internet

access computer systems without authorization

circumvent antipiracy measures in most commercial software

Question 31: The Melissa virus (1999) disrupted e-mail around the world causing more than ____ in damage.

$500,000

$1 million

$25 million

$80 million

Question 32: Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984.

True

False

Question 33: Computer worms are similar to viruses except that they use computer networks or the Internet to do what?

"swat" or "shoplist" merchandise

"rip" or "crack" security codes

crash websites

self-replicate

Question 34: This crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions:

illegal touting

fraudulent offerings

market manipulation

deceptive priming

Question 35: What is the difference between a Trojan horse and a virus?

Trojan horses are benign applications.

Trojan horses do not replicate themselves.

Trojan horses are not as destructive.

Trojan horses can penetrate firewalls.

Question 36: A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.

True

False

Question 37: Sharing files with friends who did not pay for them is an example of:

cyber copying

cloning

deceptive copying

copyright infringement

Question 38: Commercial cyber spies target upcoming bids, customer lists, product designs, software source code, voice mail messages, and confidential e-mail messages.

True

False

Question 39: Terrorists groups have used the Internet to fund their operations. How is such funding accomplished?

through fraudulent charitable organizations

through bogus or "shell" companies

through intellectual property crime

Terrorist groups achieve funding via all these mechanisms.

Question 40: ________ is designed to harass or extort money from legitimate users of an Internet service by threatening to prevent the user having access to the service.

theft of service

hijack of service attack

denial-of-service attacks

cheating attacks

Reference no: EM131006770

Questions Cloud

Chemist position with supervisory responsibilities : An African American employee sought promotion to a chemist position with supervisory re- sponsibilities. Promotions were based on the results of "certification" (based on education and work experience) and an interview. Because of his extensive ex..
Position in human resources : A woman applied for a part-time position in human resources. At the time she applied, she was working part-time for a benefits consulting company and received the same benefits as full- time employees.
Problem regarding the image conscious : A 350-pound man interviewed for a job as a sales counselor for a weight-loss center. He was told by the interviewer that he was the "most qualified" applicant but that the regional manager had concerns about his weight. He was later informed that ..
Problem regarding the promotion decision : A woman with four children (6-year-old triplets and an 11-year-old) was passed over for promo- tion in favor of another women with two chil- dren (a 10-year-old and a 15-year-old). One of the three supervisors who made the promotion decision state..
Under what circumstance can spam become a crime : Some spam can simply be an unwanted advertisement. Under what circumstance can spam become a crime
Create a more professional image : A company that sold playground equipment es- tablished a new, unwritten dress code. All em- ployees were expected to purchase and wear khaki pants. Male employees were expected to purchase and wear denim shirts with the company logo. Female employ..
Why slave trade original form of labor deemed insufficient : Why was this original form of labor deemed insufficient? Were other considerations at play in the turn to use of slave labor?
Fleet of nine corporate jets : Exxon Mobil has a fleet of nine corporate jets. The planes carry eight to eleven passengers, have ranges of at least 3000 miles, and fly at top speeds of over 500 nautical miles per hour.
Female deputies on duty : A state regulation required that female prisoners could not be lodged in county jails unless a female deputy was present. Because no female deputies worked the third shift, when most females were brought in, a county jail had to pay overtime to ha..

Reviews

Write a Review

Other Subject Questions & Answers

  How many trees should be planted to maximize yield per acre

A pecan grower estimates from past records that if 20 trees are planted per acre, each tree will average 60 pounds of nuts per year. If for each additional tree planted per acre (up to 15) the average yield per tree drops 2 pounds.

  Discuss the differences in costs and benefits of going

write a memo on a state not federal level business dispute. describe as if you were writing a white paper for your

  Change in amphetamine use and abuse

Examine the change in amphetamine use and abuse in the U.S. from the 1950s to the present. Explain to which schedule amphetamines belong and why they are on the Schedule of Controlled Substances.

  Social institutions contribute to the problem of poverty

How do social institutions contribute to the problem of poverty? How do attitudes and idealogies help perpetuate poverty?

  What sort of supplemental materials make a difference

What do you think of elementary school social studies texts being used in today's classrooms? Have they improved since you were a child? How have they changed? What sort of supplemental materials make a difference?

  Was the real life situation managed as a project

Each student will be required to make a Paper/Presentation to be scheduled at the end of class.  Each student will research a failed real life project and write a paper describing the failure. Was the real life situation managed as a project

  Effect of frequent testing on retention

An educational psychologist studies the effect of frequent testing on retention of class material. In on section of an introductory course(groupA), students are given quizzes each week. A second section of the same course (groupB) receives only tw..

  Three wees ago but havent gotten it yet

I ordered the book three wees ago but havent gotten it yet. I reported this problem and selected to get a copy of same book as fast as they can but i was wondering if you guys will charge extra for this.

  Write two kinds of questionnaire administrations write some

what are two types of questionnaire administrations? what are some of the weaknesses and strength of each of these

  Formulate new and innovative uses of the information

Formulate new and innovative uses of the information from the POS system. Ideally, these ideas should help Alliance better serve its customers by ensuring that adequate quantities of each item are available, that costs are kept low, and that custo..

  The correlation between mood and exercise

The correlation between mood and exercise

  Question regarding the merchandise inventory items

A company just starting in business purchased three merchandise inventory items at the following prices. First purchase $80; Second purchase $95; Third purchase $85. If the company sold two units for a total of $240 and used FIFO costing, the gros..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd