Chapter 15 Essentially Global International Cooperation

subject Type Homework Help
subject Pages 9
subject Words 26
subject Authors Larry J. Siegel

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
54. The two main mediums for cyberbullying include:
a. cell phones and Internet. b. Internet and graffiti.
c. word of mouth and cell phones. d. graffiti and word of mouth.
55. Because cybercrime is essentially global, international cooperation is required for its control. Which of the
following reflects this fact?
a. the International Information Infrastructure Protection Act
b. the Family Entertainment and Copyright Act
c. the Convention on Cybercrime
d. the Digital Millennium Copyright Act
56. The Digital Millennium Copyright Act made it a crime to:
a. plant slag code into a computer system.
b. steal or attempt to steal someones identity via the Internet.
c. access computer systems without authorization.
d. circumvent antipiracy measures in most commercial software.
page-pf2
57. What type of cyberthreat is represented by Titan Rain?
a. a cyberfraud threat
b. a cyberterrorism threat
c. a cyberespionage threat
d. Titan Rain does not represent a threat; it is security software.
58. The premeditated, politically motivated attack against information, computer systems, computer programs, and
data that results in violence against noncombatant targets by subnational groups or clandestine agents is termed:
a. cyberespionage. b. cyberspying.
c. cyberterrorism. d. cyberstalking.
59. Cyberterrorism is a handy battlefield for terrorists because it can strike directly at what target that bombs will not
affect?
a. the economy of an enemy
b. the defense infrastructure of an enemy
c. the hearts and minds of the citizens of an enemy
d. the energy infrastructure of an enemy
page-pf3
60. Cyberterrorism is more efficient and less dangerous than more traditional forms of terrorist activity because:
a. less industrialized countries have less sophisticated IT.
b. there is no need to infiltrate enemy territory.
c. cyberterrorism strikes more fear in the minds and hearts of citizens.
d. it involves little financial outlay to develop a plan of attack.
61. It may be that hackers are regularly mistaken for terrorists. According to some experts, how many cases of
cyberterrorism have been recorded?
a. none b. two hundred
c. two thousand d. two hundred thousand
62. Terrorists groups have used the Internet to fund their operations. How is such funding accomplished?
a. through fraudulent charitable organizations
b. through bogus or shell companies
c. through intellectual property crime
d. all of the above
page-pf4
63. The widespread use of computers and the Internet has ushered in the age of information technology in most
industrialized societies.
a. True
b. False
64. Cybercrime is a new breed of offenses that involves the theft and/or destruction of information, resources, or
funds utilizing computers, computer networks, and the Internet.
a. True
b. False
65. Cybervandalism is motivated more by a profit than a cybercriminal’s urge to seek revenge.
a. True
b. False
66. The number of Web sites that advertise or sell prescription drugs is booming. The majority of these sites require
that a patient provide a prescription from his or her doctor.
a. True
b. False
page-pf5
67. File sharing is a type of copyright infringement that allows users to download music and other copyrighted
materials without paying royalties to the copyright holder.
a. True
b. False
68. Online gambling casinos have been particularly vulnerable to denial-of-service attacks.
a. True
b. False
69. In the case of MGM Studios, Inc. v. Grokster, the Court held that software distributors could not be sued for
inducing copyright infringement for marketing file-sharing software.
a. True
b. False
70. A variation of a phishing scheme is spear-phishing.
a. True
b. False
page-pf6
71. The Black Shirt Mafia was one of the largest online identity-theft organizations, with roots in Pennsylvania, whose
illegally obtained money was used to fund terrorist activities.
a. True
b. False
72. Voice over Internet Protocol (VoIP) is a technology that allows people to make voice calls using a broadband
Internet connection instead of a regular phone line.
a. True
b. False
73. Operation Phish Phry was a successful FBI cybercrime sting operation.
a. True
b. False
74. In 2004, the Identity Theft Penalty Enhancement Act was signed into law; the act increases existing penalties for
the crime of identity theft.
a. True
b. False
page-pf7
75. E-tailing is Internet jargon for the crime of cyberstalking.
a. True
b. False
76. Cyberstalking was made famous in the 2007 case of O.J. Simpson and his then girlfriend Megan Huff.
a. True
b. False
77. A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user
makes certain input that sets the slag code in motion.
a. True
b. False
78. Because of a new portion of the D.A.R.E. program, cyberbullying has decreased by nearly 27% in recent years.
a. True
b. False
page-pf8
79. Commercial cyberspies target upcoming bids, customer lists, product designs, software source code, voice mail
messages, and confidential e-mail messages.
a. True
b. False
80. Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit
Access Device and Computer Fraud and Abuse Law in 1984.
a. True
b. False
81. The Internet Fraud Complaint Center, based in Fairmont, West Virginia, is run by the FBI and the National White
Collar Crime Center.
a. True
b. False
82. The Convention on Cybercrime, ratified by the U.S. Senate in August 2006, is the first international treaty that
addresses the definition and enforcement of cybercrime.
a. True
b. False
page-pf9
83. The Electronic Crimes Task Force is operated by the DEA.
a. True
b. False
84. Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit
Access Device and Computer Fraud and Abuse Law in 1984.
a. True
b. False
85. Cybercrime has been pervasive and rapidly evolving; however, law enforcement agencies at the federal, state,
and local levels have managed to keep a step ahead of cyber offenders.
a. True
b. False
page-pfa
86. Define cybercrime, and explain why it is such an important concern in today’s global economy.
87. The three main categories of cybercrime are cybertheft, cybervandalism, and cyberwars. Using examples, define
and discuss each of these categories of cybercrimes.
88. Define illegal copyright infringement, and discuss what is involved in stealing intellectual property.
page-pfb
89. Define what is meant by phishing and identity theft.
90. Worms, viruses, Trojan horses, logic bombs, and spam are types of cybervandalism. Define each and discuss the
differences among these forms of cybervandalism.
page-pfc
91. What is meant by cyberbullying, and how do cyberbullies "attack" their victims?
92. What is cyberstalking, and how has this crime changed some previous notions of criminal behavior?
page-pfd
93. What does research show about the problems with cyberbullying in relation to young adults/adolescents?
94. Discuss the legal and enforcement efforts that have been implemented to control cybercrime.
page-pfe
95. Cyberterrorism has been called “an effort by covert forces to disrupt the intersection where the virtual electronic
reality of computers meets the physical world. Explain what this means and whether we should be concerned
about cyberterrorism.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.