criminal justice pearson chapter 18 question and a
Written for
PEARSON (PEARSON)
PEARSON
PEARSON
All documents for this subject (2020)
Seller
Follow
flyhigher329
Reviews received
Content preview
Criminal Justice Pearson Chapter 18
_____ is a nontechnical type of cyberintrusion that relies heavily on human interaction
and often involves tricking people into breaking normal security procedures. - correct
answer Social engineering
Social engineering involves persuading administrators or telephone users to give details
of passwords or other things by pretending to be staff, suppliers, or trusted individuals—
even police officers.
__________ uses official-looking e-mail messages to elicit responses from victims,
directing them to phony websites. - correct answer Phishing
Phishing is a relatively new form of high technology fraud using e-mail. Phishing e-mails
typically instruct individual recipients to validate or update account information before
their accounts are canceled.
Which of the following statements about the National Law Enforcement and Corrections
Technology Center (NLECTC) is true? - correct answer The NLECTC focuses on
identifying and developing new products and technologies designed for criminal justice
applications.
The NLECTC concentrates on four areas of advancing technology: (1) communications
and electronics, (2) forensic science, (3) transportation and weapons, and (4) protective
equipment.
Which of the following statements best represents the increasing consensus about the
effects of social networking technologies on law enforcement operations? - correct
answer The use of social media by police is increasing rapidly.
Police departments can both benefit and suffer from recent developments in social
networking. The adoption of social media by law enforcement agencies is growing
exponentially.
Which of the following best describes expert systems? - correct answer Expert
systems analyze evidence and recognize patterns.
, Expert systems are computer hardware and software that attempt to duplicate the
decision-making processes used by skilled investigators in the analysis of evidence and
in the recognition of patterns that such evidence might represent.
Which of the following statements best describes criminalistics? - correct answer
Criminalistics refers to the use of technology and scientific techniques in the service of a
criminal investigation.
Criminalistics is a subfield of criminal justice. Criminalistics applies scientific techniques
to the detection and evaluation of criminal evidence in pursuit of a criminal investigation.
Tony received an e-mail asking for his bank details. He opened the e-mail, which stated
that his bank account would be frozen if he failed to provide the necessary information
within 24 hours. Realizing the e-mail was a hoax, he notified his bank. The operation of
his computer was not affected. Tony was a victim of which of the following cybercrimes?
- correct answer Phishing
Phishing is a relatively new form of high-technology fraud that uses official-looking e-
mail messages to produce responses from victims. It directs them to illegitimate
websites, often seeking information to defraud the computer user/victim. Phishing e-
mails typically instruct recipients to validate or update account information before their
accounts are canceled.
Which of the following would constitute an act of bioterrorism? - correct answer In
2001, letters containing anthrax were mailed to the offices of several U.S. Senators and
to a number of news media offices.
Bioterrorism involves the intentional or threatened use of viruses, bacteria, fungi, or
toxins from living organisms to produce death or disease. Anthrax is a deadly
bacterium. The bioterror attack resulted in five deaths.
Nexus is an online file-sharing service. On its website, it promotes its services as a way
for users to download copyrighted digital content. Blake, a hardcore gamer, downloaded
an unauthorized copy of a new video game using Nexus. Blake installs the game on his
computer and also sends it to his friend Larry. Which of the following statements
regarding this scenario is correct? - correct answer Blake has committed software
piracy because he downloaded an unauthorized copy of the game from Nexus and sent
a copy to Larry.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller flyhigher329. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.