McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Career Opportunities
PowerPoint Presentations
Spotlight on Terrorism
Chapter Overview
Chapter Outline
Chapter Objectives
Multiple Choice Quiz
Flashcards
Internet Exercises
Interactive Exercise
Feedback
Help Center


Swanson, Criminal Investigation 8/e
Criminal Investigation, 8/e
Charles R. Swanson, University of Georgia
Neil C. Chamelin, Assistant State Attorney, Second Judicial Circuit
Leonard Territo, University of South Florida- Tampa

Computer Crime

Multiple Choice Quiz



1

Which of the following crimes is done using a computer as the instrument?
A)Computer manipulation
B)Money laundering
C)Data alteration
D)Theft of services
2

In which of the following is the computer incidental to the crime?
A)Computer manipulation
B)Money laundering
C)Data alteration
D)Theft of services
3

In which of the following is a computer not incidental to the crime?
A)Computer manipulation
B)Money laundering
C)Criminal enterprises
D)Sex crimes
4

Which of the following is an example of a crime associated with the prevalence of computers?
A)Computer manipulation
B)Money laundering
C)Theft of services
D)Intellectual property violations
5

Which of the following crimes targets a computer?
A)Denial of service
B)Money laundering
C)Theft of services
D)Intellectual property violations
6

Which of the following best defines computer abuse?
A)Denial of service
B)Money laundering
C)An illegal act in which knowledge of computer technology is used to commit the act
D)An intentional act involving a computer in which the perpetrator may have gained at the victim’s expense
7

What is a “Hacktivist”?
A)Politically motivated hacker
B)Denial of service attacker
C)A proponent of Napster
D)A person engaging in an intentional act involving a computer in which the person may have gained at the victim’s expense
8

Which of the following individuals developed one of the first systems to define computer crimes in 1976?
A)David Carter
B)Donn Parker
C)Jay Nelson
D)Robert Taylor
9

Which of the following is an example of a computer manipulation crime?
A)An intruder removes valuable information from a computer system.
B)Hacking
C)A person alters payroll records to attain a higher rate of pay.
D)Medical records are altered.
10

An intruder removes valuable information from a computer system. What term describes this crime?
A)Computer vandalism
B)Hacking
C)A person alters payroll records to attain a higher rate of pay.
D)Data alteration
11

Which of the following is a computer crime that deprives the legitimate owner of a tangible asset?
A)Hacking
B)Money laundering
C)Manipulating the price of a stock
D)Salami slice
12

Which of the following is not a similarity between real-world stalking and cyber stalking?
A)Most victims are women.
B)Most stalkers are men.
C)The stalker and victim are near to each other.
D)Stalkers are generally motivated by the desire to control the victim.
13

Which of the following crimes may be facilitated by the use of a computer?
A)Loan-sharking
B)Drug rings
C)Prostitution rings
D)All of the above
14

What was the name of the largest single child pornography sting operation in history?
A)Wonderland
B)Operation Cathedral
C)Carnivore
D)All of the above
15

What is a telephone “phreaker”?
A)People who obtain free cellular phone service through theft or forgery of subscriber information or through employee collusion.
B)People who exploit weaknesses in the cellular network’s technology to defraud the cellular service provider.
C)People who stalk others on the Internet.
D)People who trick telephone systems into believing that long-distance and airtime are being legitimately purchased.
16

Which of the following is not a tool utilized by computer criminals?
A)NMAP
B)ToneLoc
C)Cyber-stalker
D)Cryptanalysis
17

What is the purpose of cryptanalysis software?
A)Breaking encryption
B)Taking advantage of a security hole
C)Impairing or destroying function in a computer
D)Delivering attack software
18

What is the delivery vehicle of choice for exploit software?
A)NMAP
B)Cryptanalysis
C)Tone Loc
D)Trojan Horse Programs
19

What is the primary distinction between viruses and worms?
A)Worms do not rely on a host program to infect.
B)Worms masquerade as legitimate while causing damage.
C)Viruses do not rely on a host program to infect.
D)A computer virus is active without a host.
20

Which of the following is not a feature of a “cookie”?
A)It is saved on the user’s hard drive.
B)It tracks which sites a computer has visited.
C)It may assist in an investigation.
D)They are evil programs that scan the hard drive of a computer.
21

Which of the following describes the demographic profile of a hacker?
A)White male
B)14 to 25 years of age
C)Highly intelligent, yet an underachiever in school
D)All of the above
22

________________ is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media.
A)Anonymous remailing
B)Digital forensic analysis
C)Using a firewall
D)None of the above
23

Which of the following techniques is most effective in preventing computer crime?
A)Backups
B)Digital forensic analysis
C)Using a firewall
D)None of the above
24

Which of the following describes a firewall?
A)A copy of data
B)Data that cannot be lost
C)Digital forensic analysis
D)Device or software that acts as a checkpoint between a network or stand-alone computer and the Internet
25

Which of the following techniques do not help prevent computer crime?
A)Backups
B)Digital forensic analysis
C)Firewalls
D)Encryption