Call us 24/7: + 1(925)399 0085

Get your paper done by an expert

No matter what kind of academic paper you need, it is simple and secure to hire an essay writer for a price you can afford at StudyAcer. Save more time for yourself.

WhatsApp + 1(925)399 0085
$ 10
free
  • bibliography
  • title page
  • revisions
per page
19 k happy customers
4.7 out of 5 satisfaction rate
27 writers active

Strayer CRJ320 WK 10 Quiz 10 Chapter 17,21

MULTIPLE CHOICE

1. What type of material should not be used when packaging electronic evidence?
a. waxed paper c. plastic materials
b. cardboard d. paper bags

2. A zombie is a
a. certain type of computer virus.
b. computer that has been rendered immobile by a virus.
c. computer used by hackers to copy other computer programs.
d. computer that has been taken over by another computer.

3. A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a
a. shadow bomb. c. super-program.
b. logic bomb. d. turtle.

4. A virus attack may replace or destroy data on the computer’s hard drive and
a. identify bank accounts and financial records.
b. leave a “back door” open for later entry.
c. obtain one’s access codes.
d. defraud the end user.

5. Port scanning is
a. looking for access into a computer.
b. scanning for a portable computer that is using a wireless system.
c. removing data.
d. linking access codes.

6. Which of the following is not one of the three general categories of cybercriminals?
a. crackers c. criminals
b. vandals d. IT professionals

7. Which of the following statements about reshipper schemes is correct?
a. These schemes typically involve employees of the U.S. Postal Service, UPS, FedEx or other such businesses.
b. The masterminds of reshipper schemes often initiate contact with their victims in chat rooms.
c. Scam artists who organize these schemes are frequently charged with sabotage.
d. These schemes typically involve intercepting a computer being shipped, installing spyware and resending the computer to its final destination.

8. The USA PATRIOT Act, signed by President George W. Bush in 2001, grants
a. roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.
b. total authority to the FBI for wiretapping the communication lines of any U.S. citizen.
c. total authority to the FBI to arrest any noncitizen who is under suspicion of using communication lines to plan a terrorist attack.
d. all of these choices.

9. NW3C stands for
a. North West Computer Crime Center.
b. National White Collar Crime Center.
c. New West Crime Center Corporation.
d. none of these choices.

10. Which of the following statements is true?
a. A static IP address does not fluctuate and is thus more secure
b. A dynamic IP address fluctuates and is thus more secure.
c. An ISP is a unique number, analogous to a phone number.
d. An IP address is directly linked to the location of the building where the computer can be found.

11. Theft of intellectual property
a. involves the theft of ideas, not property.
b. is hacking into a computer and stealing individual programs, not ideas.
c. involves the pirating of proprietary information and copyrighted material.
d. only applies to written material.

12. Which of the following statements is not true?
a. A virus attack could lead to the hacking of evidence logs and hijacking of department reports.
b. Security of the police department’s computers is basically a nonissue, because most police departments have highly trained computer specialists on staff.
c. Systems that control computer-aided dispatch, records management applications and offender databases should be a top priority for security.
d. Any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department.

13. Computer evidence is
a. next to impossible to destroy.
b. destroyed only by fire or intense heat.
c. easy to destroy.
d. preserved by magnetic fields.

14. Computer disks should be stored away from
a. strong light. c. dust.
b. magnetic fields. d. all of these choices.

15. Skimming is defined as
a. monitoring data traveling along a data network.
b. scavenging through a business’s garbage looking for useful information.
c. exploiting the telephone system’s vulnerabilities to acquire free access and usage in a dial-up Internet provider system.
d. a method in which a device is placed in a card reader to record sensitive information.

16. Electronic evidence and other computer crime evidence may take the form of
a. printers and scanners. c. telephones and fax machines.
b. VCRs and GPS devices. d. all of these choices.

17. Intentionally destroying computer information, programs or hardware using a logic bomb is classified as
a. embezzlement. c. extortion.
b. espionage. d. sabotage.

18. Which of the following specialists are frequently consulted in the team approach to investigating computer crime?
a. the victim who owns the equipment c. auditors
b. database processing technicians d. all of these choices

19. What is the name for the process, often considered synonymous with phishing, that involves acquiring unauthorized access to a computer or network through a message using an IP address which appears to be from a trusted host, in an attempt to commit identity theft?
a. snarking c. Sniping
b. spoofing d. shadowing

20. Common protocol for processing a crime scene involving electronic evidence includes which of the following?
a. Photographing and diagramming the placement of all computer terminals.
b. Holding the IT staff in quarantine until reinforcements arrive.
c. Obtaining a search warrant.
d. Unplugging all computers, telephones and printers.

21. The biggest difference between traditional evidence and computer evidence is the latter’s
a. electronic nature. c. storage on discs.
b. lack of availability. d. fragility.

22. Cybercrime is
a. a local problem.
b. a transnational problem.
c. strictly a federal problem.
d. a minor problem when compared to the losses to the public caused by street crime.

23. Most computer crimes are
a. not reported.
b. reported in excessive amounts to local authorities.
c. reported frequently.
d. reported to the federal government.

24. A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a
a. salami slice. c. super-zapper.
b. logic bomb. d. Trojan horse.

25. IC3 stands for
a. Internet Computer Three.
b. International Computer Classification Corporation.
c. Internet Crime Complaint Center.
d. none of these choices.

All Questions are Included…

Our guarantees

Study Acers provides students with tutoring and help them save time, and excel in their courses. Students LOVE us!No matter what kind of essay paper you need, it is simple and secure to hire an essay writer for a price you can afford at StudyAcers. Save more time for yourself. Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Our Homework Writing Disciplines

With a highly diverse team in almost all academic fields including: