Chapter 14 the struggle against nonbelievers

subject Type Homework Help
subject Pages 9
subject Words 2488
subject Authors Larry K. Gaines, Roger LeRoy Miller

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
1. What is also known as “influence peddling and occurs in the business world when somebody within a company sells
influence, power, or information to a person outside the company who can benefit?
a. bribery b. embezzlement
c. consumer fraud d. tax evasion
2. Which of the following is NOT a characteristic of a white-collar criminal?
a. has legal access to the place where the crime occurs
b. uses physical means to get somewhere he or she should not be
c. is spatially separated from the victim
d. behaves in a manner that is legitimate
3. The ________ has become the lead agency when it comes to white-collar crime, particularly in response to recent
financial scandals.
a. FBI
b. CIA
c. FDA
d. DEA
4. Any criminal activity occurring via a computer in the virtual community of the Internet is a:
a. cybercrime. b. white-collar crime.
c. property crime. d. computer crime.
page-pf2
5. When the perpetrator uses the Internet or some form of electronic communication to harass and stalk the victim, this
is known as:
a. phishing. b. intellectual property theft.
c. cyberbullying. d. cyberstalking.
6. When a consumer orders an item online and it is never delivered, this is an example of:
a. white-collar crime. b. cyber theft.
c. online retail fraud. d. online auction fraud.
7. Which of the following is an example of intellectual property?
a. books b. films
c. music d. all of these
8. What is the preferred method of phishing?
a. hacking b. spam
c. worms d. viruses
page-pf3
9. A software program that is capable of reproducing itself as it spreads from one computer to the next is a(n):
a. virus. b. botnet.
c. worm. d. spam.
10. The theft of personal information is known as:
a. cyber theft. b. cyberstalking.
c. cyber fraud. d. identity theft.
11. Which of the following is NOT one of the designations of being “mentally defective”?
a. is a danger of herself or himself to others
b. lacks the mental capacity to manage his or her own affairs
c. has been found insane or incompetent to stand trial by a criminal or military court
d. has a history of hurting animals
12. The Amendment to the U.S. Constitution states, “A well regulated Militia, being necessary to the security
of a free State, the right of the people to keep and bear Arms, shall not be infringed.
a. Second
b. Fourth
c. Fifth
d. Sixth
page-pf4
13. Terrorists have evolved into , free of control by or allegiance to any nation, and use violence to further political
goals.
a. nonstate actors b. enemy combatants
c. unlawful combatants d. al Qaeda
14. Osama bin Laden’s al Qaeda group has its origins in:
a. Iraq. b. Saudi Arabia.
c. Afghanistan. d. Pakistan.
15. Which of the following is NOT one of the struggles or exertions (jihad) required of the Muslim faith?
a. the struggle against modernization
b. the struggle against evil in oneself
c. the struggle against nonbelievers
d. the struggle against evil outside of oneself
16. Which piece of legislation gives federal law enforcement officers the power to arrest and prosecute any individual
who provides “material support or resources” to a “terrorist organization”?
a. Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
b. Criminal Justice Model
c. The Liberty Seven
d. USA Patriot Act
page-pf5
17. :The primary purpose of the AEDPA is to fight terrorism by:
a. easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents
quicker access to terror suspects.
b. creating harsher penalties for those convicted of terrorist acts.
c. cutting off the financial support funneled to terrorist organizations.
d. establishing the Department of Homeland Security.
18. The Antiterrorism and Effective Death Penalty Act was passed in response to:
a. September 11, 2001. b. the Oklahoma City Bombing.
c. Pearl Harbor. d. the anthrax mailings.
19. Placing undercover agents in a position to gain information from hostile foreign intelligence services is a form of:
a. electronic surveillance. b. human-source collection.
c. open-source collection. d. counterintelligence.
20. In a military tribunal, there is no right to trial by jury, as guaranteed by the Amendment.
a. Fourth b. Fifth
c. Sixth d. Eighth
page-pf6
21. Which of the following occurs in a military tribunal?
a panel of military officers acts in place of the judge and jury and decides questions of “both fact and law
a. all members of the panel or jury must agree to convict the individual
b. the defendant has a right to a trial by a jury
c.
d. the traditional rules of evidence apply
Case 14-1
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a
Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After
Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious
beliefs. Bobby’s parents went through his belongings, including his computer, when he was meeting with his religious
advisors one evening. They became alarmed because they found bomb-making training manuals and communications
with people in the Middle East who appeared to be terrorists.
22. What law allows the government to monitor and possibly apprehend Bobby if he is determined to be a suspected
terrorist?
a. Antiterrorism and Effective Death Penalty Act
b. Foreign Intelligence Surveillance Act
c. Homeland Security Act
d. Patriot Act
23. What law gives law enforcement officers the power to arrest and prosecute Bobby if it is determined that he has
provided support to a foreign terrorist organization?
a. Antiterrorism and Effective Death Penalty Act
b. Foreign Intelligence Surveillance Act
c. Homeland Security Act
d. Patriot Act
page-pf7
24. Bobby decides to take a return trip to the Middle East. His parents are very opposed. They express their concern to
Bobby but he is intent to make the trip despite their objections. They are concerned that Bobby may decide to
commit a terrorist act at the airport. What agency should Bobby’s parents contact in order to ensure that he does not
cause harm while on the plane?
a. FEMA
b. TSA
c. U.S. Citizenship and Immigration Services
d. U.S. Coast Guard
25. Bobby ends up traveling overseas with another gentleman, Thomas, from his prayer group. They end up meeting
with a terrorist group who want Bobby and Thomas to bomb the stadium during the Super Bowl. The leaders of the
terrorist organization delineate the entire plan and tell Bobby and Thomas that $10,000 will be transferred into each
of their bank accounts. Unknown to Bobby, Thomas is an undercover agent with the FBI who is there to gain
information on Bobby and the terrorist organization. This undercover agent is utilizing what type of intelligence
strategy?
a. electronic surveillance
b. human-source collection
c. counterintelligence
d. intelligence sharing
page-pf8
Case 14-2
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already
has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes
against the unsuspecting men who respond to Julie’s online profile.
26. Julie begins corresponding with Bart. Bart becomes very interested in Julie quickly. He wants to meet her for dinner
one evening. Julie tells Bart that she does not feel comfortable with Bart driving to her home. She tells him that she
will meet him at the restaurant next Saturday. A few days later Julie sends Bart an e-mail and informs him that her
car broke down and she does not have the money to repair it. Bart is eager to meet Julie for their planned dinner so
he agrees to send Julie the money to fix her car. The misrepresentation that Julie made about her car to deceive Bart
is called a(n):
a. cyberfraud.
b. online retail fraud.
c. identity theft.
d. white-collar crime.
27. Julie eventually meets a man named William for dinner. After they have dinner, William leaves his credit card and
driver’s license on the table to pay for the meal. William excuses himself to go to the restroom. While William is
gone Julie writes down his full name, driver’s license number, and date of birth. She also writes down the number of
the credit card and the expiration date. When Julie gets home she and her boyfriend James use Williams information
to open up a credit card in his name. This crime is a(n):
a. cyberfraud.
b. online retail fraud.
c. identity theft.
d. white-collar crime.
page-pf9
28. After his first date with Julie, William expressed to Julie that he wants to continue seeing her. Julie told William to
call her the next day. William called the next day and left a message for Julie. Julie did not return his phone call.
William continued to call Julie several times a day and send her text messages and e-mails. As Julie continues to
ignore his calls and messages William becomes angry and starts aggressively harassing her via e-mail and text
message. William's behavior is considered to be:
a. cyberstalking.
b. cyberbullying.
c. phishing.
d. piracy.
29. Julie’s boyfriend James is a computer genius. He used to work as a programmer for a major computer software
company but was terminated when he got into a fight with his supervisor. James is angry that he was terminated. He
used his computer to break into the database of his old company to get all the information for all the clients. James’s
actions make him a(n):
a. botnet.
b. cyberstalker.
c. hacker.
d. pirate.
30. Since James is out of work he is looking for any way to earn money. Besides using Julie to commit crimes against
unsuspecting men for profit, James illegally copies online intellectual property such as films, music, and software.
James’ actions make him guilty of:
a. cyberstalking.
b. cyberbullying.
c. phishing.
d. piracy.
page-pfa
31. White-collar crime is an official category of criminal behavior measured by the federal government in the Uniform
Crime Report.
a. True
b. False
32. Federal officials prosecute white-collar crime using the investigatory powers of several different federal law
enforcement agencies.
a. True
b. False
33. Phishing scams have spread to text messaging and social-networking sites.
a. True
b. False
34. Most cybercrimes are new crimes.
a. True
b. False
page-pfb
35. Identity theft existed prior to the Internet.
a. True
b. False
36. The computer is the instrument of a crime such as when the computer itself is stolen.
a. True
b. False
37. Spam is a computer program that can automatically replicate itself over a network and interfere with the normal use
of a computer.
a. True
b. False
38. About one third of American households possess at least one firearm.
a. True
b. False

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.