100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Test Bank for Cyber Crime and Cyber Terrorism 4th Edition By Robert Taylor, Eric Fritsch, Michael Saylor, John Liederbach, William Tafoya (All Chapters, 100% Original Verified, A+ Grade) $29.49
Add to cart

Exam (elaborations)

Test Bank for Cyber Crime and Cyber Terrorism 4th Edition By Robert Taylor, Eric Fritsch, Michael Saylor, John Liederbach, William Tafoya (All Chapters, 100% Original Verified, A+ Grade)

 1 purchase
  • Course
  • Cyber Crime and Cyber Terrorism 4e Robert Taylor,
  • Institution
  • Cyber Crime And Cyber Terrorism 4e Robert Taylor,

Test Bank for Cyber Crime and Cyber Terrorism 4th Edition By Robert Taylor, Eric Fritsch, Michael Saylor, John Liederbach, William Tafoya (All Chapters, 100% Original Verified, A+ Grade) Test Bank for Cyber Crime and Cyber Terrorism 4th Edition By Robert Taylor, Eric Fritsch, Michael Saylor, Joh...

[Show more]

Preview 4 out of 110  pages

  • December 12, 2024
  • 110
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber Crime and Cyber Terrorism 4e Robert Taylor,
  • Cyber Crime and Cyber Terrorism 4e Robert Taylor,
avatar-seller
studentsupport96
Cyber Crime and Cyber Terrorism 4e Robert Taylor, Eric Fritsch, Michael Saylor, John Liederbach,
William Tafoya (Test Bank All Chapters, 100% Original Verified, A+ Grade)Answers At The End Of Each Chapter
Chapter 1 Introduction and Overview of Cyber Crime and Cyber Terrorism


MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

1) Which of the following is MOST true? 1)
A) The character and nature of cybercrime and their frequency of occurrence has changed
significantly since 1995
B) Cybervictimization is likely leveling off
C) Cybercrime is well researched
D) Law enforcement is prepared to handle the newest threats of digital crime

2) Criminal statistics/data on computer crime are: 2)
A) Inconsistent because there is an absence of any attempt to collect offense data systematically
B) Submitted by all federal agencies and represent a fairly accurate picture of the problem
C) Collected by the FBI
D) Very accurate and reliable

3) Network intrusion: 3)
A) Requires punishment imposed for the offenses
B) Often targets the server and may cause harm to the network owners
C) Is characteristic of the computer criminal who commits these offenses
D) Is not sophisticated

4) Data alteration, denial of service, network intrusions, thefts of information, and computer 4)
vandalism are examples of which type of computer crime?
A) Computer as a target
B) Computer as an instrument of a crime
C) Computer as incidental to crime
D) Crimes associated with the prevalence of computers

5) Which type of computer crime describes actions in which the computer is used only to further a 5)
criminal end? In other words, the computer or data contained therein is not the object of the crime.
A) Computer as a target
B) Computer as an instrument of a crime
C) Computer as incidental to crime
D) Crimes associated with the prevalence of computers

6) Intellectual property violations, component theft, counterfeiting, and identity theft are examples of 6)
which type of computer crime?
A) Computer as a target
B) Computer as an instrument of a crime
C) Computer as incidental to crime
D) Crimes associated with the prevalence of computers

7) Child pornography is an example of which type of computer crime? 7)
A) Computer as a target
B) Computer as an instrument of a crime
C) Computer as incidental to crime
D) Crimes associated with the prevalence of computers




1

, 8) Which of following is not a common theme to emerge from the research on the problems of 8)
computer crime?
A) Behavioral approaches of cybercriminals
B) Incidences of network incursion
C) Computer fraud within government agencies
D) The work of hackers

9) Which of the following is MOST true? 9)
A) Early researchers felt that computer crime would be a large problem
B) Case studies offer generalizations on cybercriminals
C) A great deal of effort is dedicated to computer security
D) Most research of cybercrime focuses on behavioral approaches

10) Which of the following is NOT considered in the calculation of costs associated with each type of 10)
computer crime?
A) Anti-virus software
B) Loss of revenue
C) Reputational damage
D) All of the above are considered in the calculation of costs.

11) Which of the following is MOST true? 11)
A) Employers always report computer crimes committed by employees
B) Indirect costs have not traditionally been considered in the calculation of costs
C) Estimates of costs are easy to calculate across different categories of computer crime
D) Estimates concerning the costs of cybercrime are derived from crime statistics

12) Which of the following is NOT an example of indirect cost associated with cyber crime? 12)
A) Damages to international trade B) Damages to innovation
C) Damages to competitiveness D) Physical damages to the computer

13) Which of the following is MOST true? 13)
A) Practitioners in both the criminal justice field and the computer science field typically have
limited knowledge of each other's occupations
B) The authors of the text treat digital crime and digital terrorism as separate concepts
C) The text focuses mainly on Macintosh-based systems
D) All forms of digital crimes are covered in the text

14) Which of the following is NOT an example of Donn Parker's work as an early commentator on 14)
problems associated with computer crime?
A) The observation that researchers felt that computer crime was not worthy of specific explicit
research
B) The observation that losses increase substantially with intentional acts involving computers
C) The ease with which criminals could misuse information
D) The "cyber" prefix to describe computer crimes




2

, 15) Which of the following is MOST true? 15)
A) The public relies on computers for a host of societal functions including military operations,
finance, communications, utilities, and mass transit
B) The public perception is that law enforcement and government officials are well-equipped to
deal with cybercrime
C) Digital crimes are not of great concern to the public
D) Threats of cyberterrorism are grossly exaggerated

16) Which of the following is NOT one of the four categories of computer crime? 16)
A) Computer vandalism
B) The computer as incidental to the crime
C) Crimes associated with the prevalence of computers
D) The computer as a target

17) The Nigerian bank scheme, pyramid schemes, and bunko schemes are examples of which type of 17)
computer crime?
A) Computer as incidental to crime
B) Computer as a target
C) Computer as an instrument of a crime
D) Crimes associated with the prevalence of computers

18) Which country has the highest rate of cybervictimization? 18)
A) United States B) North Korea C) England D) China

19) Which of the following is NOT a characteristic noted by Anderson and colleagues in 2012? 19)
A) Crimes that facilitate other crimes through the proper use of computers
B) New crimes that have been originated since the advent of the Internet
C) Traditional crimes that have changed with the advent of the Internet
D) Traditional crimes that are now "cyber" because they are conducted online

20) Which of the following is MOST true? 20)
A) Cyber crime is another term for digital terrorism
B) Cyber terrorism does not pose as great a threat as digital crime
C) Cyber crime and digital terrorism are not on parallel tracks
D) The processes and dynamics involved in the production of cyber crime and cyber terrorism
are virtually the same

TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.

21) Computer "vandalism" falls under the category of crimes where the computer is a target. 21)

22) Computer crime is not an international problem. 22)

23) Rapid growth in the computer security industry has largely occurred without adequate research on 23)
the nature of cybercrimes and criminals.

24) In general, the threat of computer crime victimization increases with industrialization. 24)

25) Estimates on the cost of cybercrime are largely derived from criminal reports. 25)




3

, 26) Computerized theft never deprives a legitimate owner of a tangible asset. 26)

27) Identity theft is probably the most feared online crime. 27)

28) The full extent of the cost of cybercrime is hard to determine, in part, because some government 28)
and law enforcement officials tend to underreport or underestimate these costs in order to manage
public perceptions and potential fears about the problem.

29) It is relatively easy to place a monetary value on the indirect costs. 29)

30) Research has shown that most dangers of economic computer crimes come from outsiders. 30)

31) Computers may be used as both criminal instruments and instruments of warfare. 31)

32) The Department of Justice systematically collects computer crime data. 32)

33) "Cyber" refers to almost anything "real" or "virtual" attached to a computer or network. 33)

34) The text seeks to merge knowledge of criminal justice and knowledge of computer science. 34)

35) Case studies offer generalizations about trends in cybercriminality or patterns of offending. 35)

SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.

36) Computer vandalism falls under the computer as a ________ classification of computer 36)
crime.

37) The Cuckoo's Egg or ________ is a case study that looks at specific instances of network 37)
incursion.

38) The ________ bank scheme is a computer crime that deprives the legitimate owner of a 38)
tangible asset.

39) Anderson developed a classification scheme in which ________ crime are crimes that have 39)
changed with the advent of the Internet.

40) Malware is often referred to as malicious software or computer ________. 40)


41) One of the earliest commentators on the problems associated with computer crime, Donn 41)
________, recognized the potential for computer-related criminality even in systems that in
comparison to today's systems are archaic.

42) Early studies by the American Bar Association gave estimated costs of cybercrime which 42)
mainly derived from ________ of corporations and government agencies.

43) ________ schemes have found a new source of legitimacy with professional-appearing 43)
websites and official-sounding web addresses.




4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller studentsupport96. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $29.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

65646 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$29.49  1x  sold
  • (0)
Add to cart
Added