Exam Prep Test bank Cybercriminology Marie-Helen 1st Edition - Cybercriminology 1e | Test Bank Maras by Marie Helen Maras. DOCX document preview.

Exam Prep Test bank Cybercriminology Marie-Helen 1st Edition

Test Bank

Chapter 1

Multiple Choice

1. ________ refers to unauthorized access to computer systems and digital devices utilizing the Internet, computers, and related technology.

  1. Cybertrespass
  2. Cybervandalism
  3. Cybertheft
  4. Cyberdeviance
  5. Public order cybercrime

2. ________ refers to the virtual defacement of someone else’s property.

  1. Cybertrespass
  2. Cybervandalism
  3. Cybertheft
  4. Cyberdeviance
  5. Public order cybercrime

3. ________ involves the preying on children, adults, and the elderly through communications, information, and computer technologies.

  1. Cyberdeviance
  2. Public order cybercrime
  3. Cybervice
  4. Cyberpredation
  5. None of the above

4. ________ is an act wherein an individual places a hoax call to emergency services that a crime or other critical incident that requires an emergency police response is underway.

  1. Hacking
  2. Website defacement
  3. Swatting
  4. Wardriving
  5. None of the above

5. _______ refers to the use of the Internet, computers, and related technology to engage in conduct that violates social norms and expectations.

  1. Cyberdeviance
  2. Cybertrespass
  3. Cybervandalism
  4. Cyberpredation
  5. None of the above

6. _______ involves the planning and executing of illegal business ventures online by either hierarchical groups or decentralized networks that often conduct their operations from more than one country.

  1. Cyberdeviance
  2. Cybervice
  3. Cybervandalism
  4. Organized cybercrime
  5. None of the above

7. _______ is a cybercrime committed by individuals, groups, or nations in furtherance of some political goal or agenda.

  1. Public order cybercrime
  2. Political cybercrime
  3. Cybervice
  4. Organized cybercrime
  5. None of the above

8. _________ is a crime committed via the Internet, computers, and related technology that offends the public’s shared norms, morals, values, and customs.

  1. Public order cybercrime
  2. Political cybercrime
  3. Cybervice
  4. Organized cybercrime
  5. None of the above

9. Cybercrime ______________.

  1. occurs on a far greater scale than traditional crime
  2. transcends borders
  3. has the ability to reach and affect individuals around the globe
  4. all of the above
  5. none of the above

10. Cyberspace has transformed and enhanced __________.

  1. the way information is viewed, exchanged, and retrieved
  2. the way in which individuals develop and maintain relationships
  3. trade
  4. the way money is moved
  5. all of the above

Fill-in-the-blank

1. A ______ is an act that violates existing laws.

2. A _______ is a person who violates the law.

3. A _______ is an illicit act that targets digital devices or is committed via the Internet, computers, and related technology.

4. A ______ is a person who utilizes the Internet, computers, and related technology to violate the law.

5. _____ is the system of rules that regulate the public’s actions and provide penalties for noncompliance.

6. Those engaging in _____ drive around areas looking for vulnerable Wi-Fi networks to hack into.

7. _______ is the environment within which communications and other online activities through Internet-enabled digital devices take place.

8. Cybercrime can fall under ______ proposed typologies.

9. ______ is the scientific study of the causes of crime, the scope of crime, the responses to crime by the public, media, social and political institutions, and criminal justice systems, and the ways to control, mitigate, and prevent crime.

10. ______ is the study of cybercrime through the lens of criminology.

True or False

1. Cybertheft refers to the stealing of personal information, medical information, financial information, and/or money via the Internet, computers, and related technology for personal or other use.

2. A cybervice is a crime committed via communications, information, and computer technologies against an individual with whom the perpetrator is communicating or has some form of relationship (real or imagined).

3. An example of an interpersonal cybercriminal is an online child sexual predator.

4. A cybervice is online behavior that is deemed immoral because it violates accepted codes of conduct.

5. An example of cyberdeviance is online paraphilia.

6. Biastophilia involves abnormal sexual desires obtained from violent assaults.

7. Impersonation fraud involves the manipulation of financial markets or the defrauding of investors through deception; it has also been perpetrated online.

8. Skimmers are electronic devices that are used to steal the personal information stored on users’ credit or debit cards and to record the users’ PIN numbers.

9. Impersonation fraud takes advantage of people’s interest in important news stories and celebrities to get individuals to click on links that surreptitiously download malware onto a user’s machine.

10. Lulz is a term used to describe actions that occur at someone’s expense to hurt the individual or create mayhem for enjoyment purposes.

Chapter 2

Multiple Choice

1. _____ is a Part 1 offense in the Uniform Crime Reporting program.

  1. Forgery and counterfeiting
  2. Fraud
  3. Motor vehicle theft
  4. Embezzlement
  5. Drunkenness

2. _____ is a Part 1 offense in the Uniform Crime Reporting program.

  1. Murder
  2. Fraud
  3. Embezzlement
  4. Vagrancy
  5. Gambling

3. _____ is a Part 2 offense in the Uniform Crime Reporting program.

  1. Arson
  2. Forcible rape
  3. Robbery
  4. Disorderly conduct
  5. Burglary

4. _____ is a Part 2 offense in the Uniform Crime Reporting program.

  1. Drug abuse violation
  2. Arson
  3. Aggravated assault
  4. Larceny-theft
  5. Motor vehicle theft

5. An example/examples of Part 1 offenses in the Uniform Crime Reporting program is/are _____________.

  1. arson
  2. burglary
  3. motor vehicle theft
  4. larceny-theft
  5. all of the above

6. The Federal Crime Data report includes data about ______________.

  1. human trafficking
  2. hate crime
  3. criminal computer intrusion
  4. all of the above
  5. none of the above

7. An example/examples of Group B offenses in the National Incident-Based Reporting System is/are ____________.

  1. embezzlement
  2. extortion
  3. bad checks
  4. gambling
  5. all of the above

8. An example/examples of Group A offenses in the National Incident-Based Reporting System is/are __________.

  1. fraud
  2. drunkenness
  3. trespass of real property
  4. disorderly conduct
  5. all of the above

9. An example/examples of an official data source for U.S. crime statistics is/are ____________.

  1. the National Incident-Based Reporting System
  2. the Uniform Crime Reporting program
  3. the National Crime Victimization
  4. all of the above
  5. none of the above

10. The _____ collects victimization data from several countries and victims’ views on their own security.

  1. Crime Survey for England and Wales
  2. International Crime Victim Survey
  3. National Crime Victimization Survey
  4. National Computer Security Survey
  5. National Incident-Based Reporting System

Fill-in-the-blank

1. _______ is viewed as one of the greatest economic and national security threats facing the United States.

2. Since 1958, crime data in the United States have been made available in the FBI _______ publication.

3. The UCR Program in its traditional _______ includes data about Part 1 and Part 2 offenses.

4. _________ can explain why individuals may choose not to report cybercrime.

5. The _____ provides guidance on how organizations can enhance their cybersecurity posture.

6. The __________ is an official crime measurement tool in Canada that collects information about victimization.

7. A _________ asks respondents to report on their own participation in criminal activity.

8. The _______ requires that only the most serious crime of multiple offenses be recorded in the Uniform Crime Reporting program.

9. The _______ collected information from U.S. businesses about cybercrimes they were subjected to.

10. _______ is the probability of harm or damage or threat of harm or damage from a security threat because of vulnerabilities.

True or False

1. Part 1 offenses of the Uniform Crime Reporting program include only property crimes.

2. Part 2 offenses of the Uniform Crime Reporting program include violent crimes and property offenses.

3. Of the offenses listed in Part 1 of the Uniform Crime Reporting program, property crimes are considered the most severe.

4. Arson can be classified as a violent crime or a property crime.

5. If multiple offenses are committed in one criminal incident, only the most serious of the offenses is recorded in the Uniform Crime Reporting program.

6. Unlike the Crime in the United States publication, the National Incident-Based Reporting System does not apply estimation procedures for missing crime data by participating and nonparticipating jurisdictions.

7. Cybercrime is not listed as part of Group A or Group B offenses, but it is recorded in the National Incident-Based Reporting System.

8. The Crime Survey for England and Wales is distributed to households to obtain information about the dark figure of crime.

9. An international measurement tool exists that validly and reliably measures cybercrime against individuals and businesses.

10. Cybersecurity companies’ surveys provide valid and reliable cybercrime data.

Chapter 3

Multiple Choice

1. Victimology refers to the comprehensive scientific study of cybervictims, including the _________________.

  1. victims’ physical characteristics
  2. behavior before, during, and after the crime
  3. medical, psychological, and criminal history
  4. victims’ home life
  5. all of the above

2. ___________ refers to the characteristics of a victim that make the individual more likely than others to become a victim of a crime.

  1. Victim proneness
  2. Victim contribution
  3. Victim provocation
  4. Victim profile
  5. None of the above

3. ____________ refers to the activities of a victim that make the individual susceptible to crime.

  1. Victim proneness
  2. Victim contribution
  3. Victim provocation
  4. Victim profile
  5. None of the above

4. ______ views the victim as the cause of his or her victimization.

  1. Victim proneness
  2. Victim contribution
  3. Victim provocation
  4. Victim profile
  5. None of the above

5. __________ is a theory of victimology.

  1. Expected utility theory
  2. Rational choice theory
  3. Social control theory
  4. Lifestyle exposure theory
  5. All of the above

6. _________ is a theory of victimology.

  1. Social learning theory
  2. Strain theory
  3. Routine activity theory
  4. Anomie theory
  5. All of the above

7. An individual whose personal and professional life does not expose the individual to crime is known as a ____________.

  1. low-exposure victim
  2. medium-exposure victim
  3. high-exposure victim
  4. low-exposure offender
  5. high-exposure offender

8. An individual whose personal and professional life can expose him or her to crime is known as a __________.

  1. low-exposure offender
  2. high-exposure offender
  3. low-exposure victim
  4. medium-exposure victim
  5. high-exposure victim

9. An individual whose personal and professional life continually exposes the individual to crime is known as a__________.

  1. medium-exposure victim
  2. high-exposure victim
  3. low-exposure offender
  4. high-exposure offender
  5. low-exposure victim

10. A _________ is a skilled cybercriminal and engages in meticulous planning and preparation before, during, and after a crime.

  1. situational offender
  2. modus operandi offender
  3. contradictory offender
  4. high-exposure offender
  5. low-exposure offender

Fill-in-the-blank

1. _______ refers to the scientific study of online victimization, the impact of the cybercrime on the cybervictims, and the types of victims who experience cybercrime.

2. ______ holds that the victim is in some way responsible for the victimization.

3. ______ occurs when the victim experiences victimization from the negative attitudes and behaviors of others after the crime or cybercrime.

4. ______ holds that the lifestyle of a person determines whether he or she becomes a victim.

5. ______ refers to the vulnerability to detection and apprehension because of personality traits of the criminal and the environment within which the criminal operates.

6. ______ refers to the likelihood of detection and capture of an offender through the offender’s MO.

7. A ______ is an action of an offender that is designed to evade detection and capture by authorities.

8. A ______ refers to offender behaviors that increase the likelihood of his or her detection and apprehension by authorities before, during, and after a crime.

9. An individual who is a ______ has few skills and lacks the necessary foresight and planning before, during, and after the crime; as such, he or she is more likely to be detected by authorities.

10. Routine activity theory holds that for crime to be committed, two elements must be present—a ______ and a ______—and one element must be absent, that is, a ______.

True or False

1. A cybervictim can be a person, a public or private organization, or society at large.

2. With primary cybervictimization, the victim is the indirect target of the crime secondary cybervictimization.

3. With tertiary cybervictimization, the victim is the target of the cybercrime.

4. Tertiary cybervictimization refers to the impact of cybercrime on society.

5. The reality is that one profile does not fit all cybervictims, not even for similar cybercrimes.

6. A target’s suitability is determined by four criteria, value, inertia, visibility, and accessibility, which can be summed up by the acronym VIVA.

7. Social guardianship refers to the measures taken to protect a user and his or her digital devices and frustrate the attempts of cybercriminals to commit crime.

8. Physical guardianship refers to the presence of third parties that could discourage crime because of their presence.

9. Criminogenic is the term used to describe a state or situation that causes or tends to cause crime.

10. Passive physical guardianship includes protective measures that largely go unnoticed by users and automatically shape users’ behaviors.

Chapter 4

Multiple Choice

1. Rational choice theory is derived from which theory?

  1. Routine activity theory.
  2. Economic theory of crime.
  3. Lifestyle exposure theory.
  4. Strain theory.
  5. Anomie theory.

2. ____________ holds that a person will commit a crime if the expected gain of the illicit act exceeds the utility received by refraining from the conduct or engaging in other actions.

  1. Routine activity theory
  2. Lifestyle exposure theory
  3. Strain theory
  4. Economic theory of crime
  5. Lifestyle exposure theory

3. _________ involves making a clear, cool-headed ends–means calculation after considering all possible courses of action and carefully weighing the pros and cons of each one.

  1. Procedural rationality
  2. Specific rationality
  3. Instrumental rationality
  4. General rationality
  5. Absolute rationality

4. _________ involves comparing options based on their availability and choosing the one that will produce the highest utility.

  1. Procedural rationality
  2. Specific rationality
  3. Instrumental rationality
  4. General rationality
  5. Absolute rationality

5. Opponents of rational choice theory claim that ________________.

  1. certain individuals do not have a choice when engaging in illicit acts
  2. it cannot explain irrational behavior
  3. it disregards emotions in the decision-making process
  4. all of the above
  5. none of the above

6. ____________ claimed that rational choice theory disregards the role of emotions in an offender’s decision to commit a crime.

  1. Cesare Beccaria
  2. Jeremey Bentham
  3. Jack Katz
  4. Gary Becker
  5. Robert Merton

7. The ______ perspective is past oriented.

  1. retributive
  2. utilitarian
  3. incapacitated
  4. rehabilitative
  5. none of the above

8. _________ seeks to inflict harm or deprivation on the offender for the harm or deprivation inflicted on the victim.

  1. Deterrence
  2. Rehabilitation
  3. Retribution
  4. Incapacitation
  5. None of the above

9. _______ holds that those who commit offenses deserve punishment and that the amount of punishment should be proportionate to the degree of wrongdoing.

  1. Routine activity theory
  2. Rational choice theory
  3. Deserts-based theory
  4. Economic theory of crime
  5. Punishment theory

10. From the perspective of utilitarians, punishment should seek to prevent future harm, which can be accomplished through _____________.

  1. incapacitation
  2. rehabilitation
  3. deterrence
  4. all of the above
  5. none of the above

Fill-in-the-blank

1. The view of crime as a rational choice is originally attributed to the __________.

2. _______ holds that a criminal is a rational actor who engages in a cost–benefit analysis to determine whether he or she will commit a crime.

3. ________ is the penalty imposed on an individual by the criminal justice system for an offense committed.

4. Retribution is justified on the principle of _________.

5. ________ is a form of punishment that seeks to discourage future offending.

6. A ______ provides detailed information about who obtained the evidence, when and where the evidence was obtained, how it was obtained, and anyone who accessed the evidence and for what reasons it was accessed.

7. _______ focuses on ways to reduce the opportunities for offending.

8. _______ may cause offenders to change their tactics and targets, but not necessarily desist from the illicit activity.

9.______ physically blocks third-party access to data by making the data unreadable.

10. ________ seeks to repair the harm done by the offender to the victim and the community.

True or False

1. The classical school of criminology includes the work of Cesare Lombroso and Jeremy Bentham.

2. Gary Becker equated crime to an outcome of expected utility theory.

3. Neuroscience research has supported that emotions and rational thought are mutually exclusive.

4. Neuroscience research has supported that an individual influenced by emotion is not capable of rational thought.

5. Utilitarianism is a form of consequentialism.

6. Retributive thinking holds that the goal of punishment is to prevent something in the future.

7. General deterrence seeks to dissuade a perpetrator of a crime from reoffending in the future.

8. Absolute deterrence refers to the ability of the threat of punishment to prevent an individual from engaging in crime.

9. For cyberdeterrence to work, three elements are required: severity, swiftness, and certainty of punishment.

10. Letters rogatory are agreements between countries that dictate the type of assistance to be provided by each nation in criminal investigations and requests for extradition of cybercriminals.

Chapter 5

Multiple Choice

1. __________ moved beyond explanations of actions as an outcome of free choice, choosing instead to explain criminal behavior as a result of internal and external forces.

  1. The classical school of criminology
  2. Positivism
  3. The Chicago school of criminology
  4. Spiritualism
  5. None of the above

2. __________ explains crime and cybercrime as a product of predisposition or underlying motivation.

  1. Rational choice theory
  2. Routine activity theory
  3. Trait theory
  4. Anomie theory
  5. Strain theory

3. Typologies of online groomers include ________________.

  1. intimacy seeker
  2. adaptable groomer
  3. hypersexualized groomer
  4. all of the above
  5. none of the above

4. __________ refers to the conflict experienced by a boy because of an overwhelming but unattainable sexual desire for the parent of the opposite sex.

  1. Oedipus complex
  2. Odysseus complex
  3. Achilles complex
  4. Electra complex
  5. None of the above

5. __________ refers to the conflict experienced by a girl because of an overwhelming but unattainable sexual desire for the parent of the opposite sex.

  1. Oedipus complex
  2. Odysseus complex
  3. Achilles complex
  4. Electra complex
  5. None of the above

6. __________ utilizes a life span development approach in explaining illicit behavior as a product of experiences with caregivers earlier in life.

  1. Trait theory
  2. Arousal theory
  3. Attachment theory
  4. Social bond theory
  5. Strain theory

7. __________ holds that individuals who are aroused or excited by an activity will continue to engage in the act to receive the same stimulation.

  1. Trait theory
  2. Arousal theory
  3. Attachment theory
  4. Addiction theory
  5. Excitement theory

8. __________ refers to the adverse symptoms individuals exhibit when they are not engaged in an addicted behavior.

  1. Relapse
  2. Salience
  3. Tolerance
  4. Withdrawal
  5. Dependency

9. __________ manifests itself in the form of an intense desire for a substance or behavior and inability or extreme difficulty in controlling its potential withdrawal symptoms when the substance is not consumed or the behavior is stopped.

  1. Relapse
  2. Salience
  3. Tolerance
  4. Withdrawal
  5. Dependency

10. __________ refers to the degree to which a behavior dominates an individual’s thinking, feelings, and behavior.

  1. Relapse
  2. Salience
  3. Tolerance
  4. Withdrawal
  5. Dependency

Fill-in-the-blank

1. _______ is a systematic process of inquiry that involves the development, testing, and modification of hypotheses based on observation and experimentation.

2. ________ is the study of facial characteristics to reveal an individual’s personality traits.

3. ________ examines the relationship between criminality and the physical characteristics of the offender.

4. ________ is a term used to describe individuals resembling ancestral human beings.

5. ________ is a hormone associated with sexual fantasies and desires.

6. ________ is associated with an individual’s reasoning, analytical thinking, and logic skills.

7. A ________ is a chemical imbalance, illness, disease, or disability of the mind that impairs a person’s normal psychological functioning.

8. An ________ is a current or former employee of an organization who intentionally seeks to gain unauthorized access to adversely affect the confidentially, integrity, and availability of the organization’s computer information system.

9. ____________ refers to the compulsive overuse of the Internet in a manner that has a detrimental impact on individuals and their personal and professional lives and results in negative emotions when the activity is reduced.

10. The wasting of employer’s time by surfing the Web and engaging in online activities (irrelevant to employment) during work hours is known as _________.

True or False

1. Psychological theories of criminality seek to explain the behavior of offenders and biological predispositions to offending.

2. Psychological theories scientifically study the behavior of offenders and attribute illicit behavior to individual factors.

3. Personality theories have been used to explain cybercrime by attributing cybercrime to elements of an offender’s personality.

4. Ego is the term used to describe the unconscious mental processes that seek immediate gratification of needs.

5. Id is the term used to describe the individual’s conscious, which recognizes the need to delay gratification to achieve long-term goals and creates strategies that enable the maximization of pleasure and minimization of pain from an activity.

6. Autism spectrum disorder is a disorder characterized by repetitive behaviors and social deficits and difficulties in communication.

7. Asperger’s syndrome is a mild form of autism spectrum disorder, and those diagnosed with it are viewed as highly functional individuals.

8. Ego is a term used to describe the individual’s unconscious and conscious mental processes that serve as a moral guide between right and wrong.

9. Narcissistic injury refers to a narcissist’s perceived threat to his or her ego and self-esteem, which can result in violent behavior.

10. Psychoanalytical theories view crime as the outcome of abnormal or dysfunctional mental processes.

Chapter 6

Multiple Choice

1. __________ includes the first major body of works that sought to explain the causes, control, and dynamics of crime spatially by examining neighborhood, community, urban, and environmental factors.

  1. The classical school of criminology
  2. Positivism
  3. The Chicago School of Criminology
  4. Spiritualism
  5. None of the above

2. __________ conceptualized the city as consisting of five primary concentric zones.

  1. Human ecology theory
  2. The concentric zone theory
  3. Strain theory
  4. Anomie theory
  5. None of the above

3. __________ holds that crime occurs in locations where a community is no longer able to regulate the conduct of its members according to accepted conventional norms, values, and beliefs and instead realizes the unconventional values of its residents.

  1. Strain theory
  2. The concentric zone theory
  3. Human ecology theory
  4. Social disorganization theory
  5. None of the above

4. ___________ refers to the ability of residents and the community to control illicit behavior.

  1. Collective efficacy
  2. Social capital
  3. Social disorganization
  4. Human ecology
  5. None of the above

5. __________ refers to the extent to which an individual has developed relations with others and societal institutions over his or her life.

  1. Collective efficacy
  2. Social capital
  3. Social disorganization
  4. Human ecology
  5. None of the above

6. ___________ accept the goals of society and the available means to achieve them.

  1. Conformists
  2. Innovators
  3. Ritualists
  4. Retreatists
  5. Rebels

7. ___________ accept the goals of society but reject the available means to achieve them; instead, they opt to use different and typically illegal means to achieve them.

  1. Ritualists
  2. Retreatists
  3. Rebels
  4. Conformists
  5. Innovators

8. ___________ reject the goals of society but still engage in the legitimate means that can be used to achieve such goals.

  1. Rebels
  2. Conformists
  3. Ritualists
  4. Retreatists
  5. Innovators

9. ___________ reject the goals of society and the legitimate means to achieve them.

  1. Rebels
  2. Conformists
  3. Ritualists
  4. Retreatists
  5. Innovators

10. __________ reject the goals of society and the legitimate means to achieve them; instead, these individuals create new goals and new means to achieve them.

  1. Rebels
  2. Conformists
  3. Ritualists
  4. Retreatists
  5. Innovators

Fill-in-the-blank

1. _______ is a condition in a community whereby its structure and culture do not reflect the values and best interests of its residents.

2. ________ refers to a state of society characterized by normlessness.

3. ________ refers to the discrepancy that exists between what an individual expects in life and what the individual actually gets.

4. According to _________, an individual may perceive himself or herself as being disadvantaged with respect to others in a reference group believed to be in similar situations and having similar attributes.

5. Robert Agnew proposed ________, which explains criminality from strained experiences at individual, interpersonal, and structural levels.

6. _______ explain why these subcultures exist, what type of subculture is created, and why the subcultures persist.

7. _______ proposes that delinquent subcultures that emerge have beliefs, values, and norms different from those of mainstream society.

8. __________ proposes that the social structure provides unequal access to both legitimate and illegitimate means to success.

9. _______ is the study of the relationship between individuals and the environment.

10. _______ comprise a hacking subculture that exploited vulnerabilities of telephone switching networks, enabling them to make free-long distance phone calls.

True or False

1. Broken windows theory holds that persistent disorder and incivility within a community are associated with future occurrences of serious crimes in that area.

2. Robert Merton utilized Durkheim’s anomie concept in his anomie theory.

3. As in Robert Merton’s anomie theory, the American Dream plays a pivotal role in institutional anomie theory.

4. Emotional coping strategies minimize the negative outcomes of the strain, maximize positive outcomes of the strain, or accept responsibility for the strain.

5. Cognitive coping strategies include activities to alleviate or relieve negative emotions.

6. Behavioral coping strategies seek to eliminate or reduce the sources of strain by actively seeking positive stimuli or avoiding negative stimuli.

7. The middle-class measuring rod includes standards for academic performance, language proficiency, and behavior.

8. Corner boys adapt to their environment and engage in actions within their limited means and capabilities that are in line with that of mainstream society.

9. Corner boys are similar to Merton’s conformists.

10. Albert Cohen believed that individuals adapted to strain individually, whereas Robert Merton believed they adapted collectively.

Chapter 7

Multiple Choice

1. ___________ refers to the links of individuals with others.

  1. Attachment
  2. Commitment
  3. Involvement
  4. Belief
  5. None of the above

2. ___________ refers to the time, energy, and resources devoted to conforming behavior.

  1. Attachment
  2. Commitment
  3. Involvement
  4. Belief
  5. None of the above

3. ___________ explains conformity through an individual’s active participation in conventional activities.

  1. Attachment
  2. Commitment
  3. Involvement
  4. Belief
  5. None of the above

4. ___________ refers to the extent to which an individual adheres to conventional norms, values, and attitudes.

  1. Attachment
  2. Commitment
  3. Involvement
  4. Belief
  5. None of the above

5. ___________ adds a positive stimulus following the desired behavior.

  1. Positive reinforcement
  2. Negative reinforcement
  3. Positive punishment
  4. Negative punishment
  5. None of the above

6. ___________ is the removal of a negative stimulus following the desirable behavior.

  1. Positive reinforcement
  2. Negative reinforcement
  3. Positive punishment
  4. Negative punishment
  5. None of the above

7. ___________ is the adding of a negative stimulus following the undesirable behavior.

  1. Positive reinforcement
  2. Negative reinforcement
  3. Positive punishment
  4. Negative punishment
  5. None of the above

8. ___________ involves removing a positive stimulus following the undesirable behavior.

  1. Positive reinforcement
  2. Negative reinforcement
  3. Positive punishment
  4. Negative punishment
  5. None of the above

9. The individual who uses the ___________ neutralization technique claims that a crime was not committed, because harm was not done or the target could afford any losses suffered.

  1. denial of responsibility
  2. denial of injury
  3. denial of the victim
  4. condemnation of condemners
  5. appeal to higher loyalties

10. With the ____________ neutralization technique, individuals divert attention from their actions to the motives of those who are criticizing their conduct.

  1. denial of responsibility
  2. denial of injury
  3. denial of the victim
  4. condemnation of condemners
  5. appeal to higher loyalties

Fill-in-the-blank

1. _________view individuals as being predisposed to criminality and seek to explain the forces that keep individuals from engaging in criminal activity.

2. ________ holds that individuals have an inner and outer containment structure that shields them from the pushes and pulls to commit crime.

3. ________ explains individuals’ obedience to following laws and refrainment from committing crimes.

4. ________ is the subordination of one’s self and taking on the identity of the group.

5. ________ holds that individuals learn criminal or deviant behavior through associations with others and learn the norms, values, and beliefs that validate this illicit or deviant behavior.

6. ________ is the process whereby the desired behavior is reinforced by internal or external sources.

7. ________ is a person’s responses to rewards and punishments.

8. ________ holds that individuals share conventional attitudes, beliefs, and values although they may violate them with their behavior.

9. ________ is the process whereby individuals construct rationalizations for behavior to overcome any internal inhibitions.

10. _________ occurs when an illegal, immoral, or reprehensible act is reconstructed as a righteous and legitimate act in light of the circumstances.

True or False

1. External controls are the traits and characteristics of potential offenders that keep them from offending.

2. Internal controls are the organizations and individuals responsible for keeping a potential offender from committing illicit activity.

3. Outer containment is composed of traits within a person that shield the person from criminal pressures, such as conscientiousness, dependability, maturity, and diligence.

4. Inner containment refers to aspects of one’s social environment that protect a person from destructive outside influences.

5. Social learning theory explains criminality as a learned behavior.

6. Behavior modeling occurs when an individual directly observes a behavior and subsequently emulates it.

7. Developmental and life-course criminology recognizes that whereas offenders’ predisposition to crime and deviance remains stable throughout a person’s lifetime, the manifestations of crime and deviancy during that period may change.

8. The latent trait perspective views human behavior as directed by a master trait that an individual has at birth or develops during childhood.

9. The general theory of crime holds that low self-control accounts for all forms of criminality.

10. The age-graded theory explains variation in criminality as the result of changes in criminal involvement across an individual’s life span.

Chapter 8

Multiple Choice

1. A(n) ___________ is an individual who gains unauthorized access to a system for malicious reasons with the intention of causing harm.

  1. black hat hacker
  2. ethical hacker
  3. white hat hacker
  4. grey hat hacker
  5. elite hacker

2. A(n) ___________ is one that gains authorized access to a system to determine weaknesses and inform the owner, operator, or employer responsible for the system about these vulnerabilities, potentially along with suggestions on how to deal with them.

  1. black hat hacker
  2. ethical hacker
  3. white hat hacker
  4. grey hat hacker
  5. both B and C

3. A(n) ___________ is innovative and has the technical acumen needed to exploit and manipulate systems.

  1. elite hacker
  2. ethical hacker
  3. white hat hacker
  4. script kiddie
  5. grey hat hacker

4. A(n) ___________ engages in hacking by utilizing the tools provided by other hackers; this person does not understand or study computer programming and the tools he or she uses to engage in hacking and other illicit activities.

  1. elite hacker
  2. ethical hacker
  3. white hat hacker
  4. script kiddie
  5. grey hat hacker

5. Who does not play a key role in a moral panic?

  1. Criminal justice agents
  2. The media
  3. The public
  4. Politicians
  5. Businesses

6. Moral entrepreneurs can be _______________.

  1. rule creators
  2. rule enforcers
  3. others
  4. folk devils
  5. both A and B

7. Sensationalized media reports draw attention to an issue and an individual or group; the individuals who are the target of this attention become isolated from society; and this ultimately leads to a greater identification of these individuals with one another, which, in turn, fosters and cultivates deviance and criminality. This process is known as _____________.

  1. defiance amplification
  2. security spiral
  3. signification spirals
  4. signification amplification
  5. none of the above

8. Which of the following is not a key attribute of a moral panic?

  1. Concern
  2. Hostility
  3. Disproportionality
  4. Proportionality
  5. Volatility

9. Which of the following laws was struck down (or at the very least a portion of the law was struck down) by the U.S. Supreme Court as unconstitutional?

  1. Communications of Decency Act of 1996
  2. Child Online Protection Act of 1998
  3. Children’s Internet Protection Act of 2000
  4. Both A and B
  5. All of the above

10. Which of the following laws limited youths’ access to online games in South Korea in an effort to stem what was viewed as a widespread Internet gaming addiction that was believed to develop during childhood?

  1. Juvenile Protection Act of 2011
  2. Shutdown Law of 2011
  3. Cinderella law
  4. Both B and C
  5. All of the above

Fill-in-the-blank

1. _________ examines deviant and criminal taxonomies and how they shape individual identities and influence behavior.

2. _________ explains human behavior as facilitated by symbols whose meanings are derived from and interpretations are modified by social interactions with others.

3. _______ holds that individuals may react to sanctions by defying them if the sanctions are viewed as unjust, which ultimately leads to an increase rather than a decrease in crime.

4. _______ is a school of thought that seeks to shed light on the meanings of individuals’ actions by focusing on how individuals understand, process, interpret, and respond to objects and events.

5. _______ is a positive or negative belief that ultimately materializes because it is believed to be true.

6. _______ is theory positing that labels of deviancy ascribed to individuals by society increase rather than decrease deviant or criminal behavior.

7. ________ holds that individuals believe that the issues on which the media focuses are the most important.

8. ________ posits that the manner in which the media organizes and presents the news influences and colors individuals’ perception of issues and informs them about what issues people should focus on.

9. ________ is a hyperbolic concern and emotional reaction to incidents viewed as threats to the social order because of overblown and exaggerated media reports and reactions to them by politicians, policy makers, lawmakers, and agents of the criminal justice system.

10. _______ seek to influence a target to adapt a behavior and to enforce rules concerning that behavior.

True or False

1. Primary deviance includes acts committed because of the deviant label and societal responses to the deviant act.

2. Script kiddies have also been labeled point-and-clickers.

3. Reintegrative shaming can serve as a way to repair the harm done by the offender to society.

4. Moral panics are characterized by overreactions by criminal justice agents.

5. A grey hat hacker does not fit the black hat or white hat hacker label, falling instead somewhere in between.

6. Deviancy amplification is a term coined by Leslie Wilkins.

7. Stanley Cohen and Jock Young identified two models of media reporting: the market model and the manipulative model.

8. The threat inducing a moral panic is a unique occurrence and not a threat that has existed for some time.

9. A moral panic involves a real threat.

10. Real social issues can be adequately dealt with using online shaming.

Chapter 9

Multiple Choice

1. Online, community policing can occur in the form of _________________.

  1. public–private partnerships between Internet service providers and law enforcement agencies
  2. proactively enforcing terms of service on websites
  3. reporting behavior by participants that violates the law
  4. both B and C
  5. all of the above

2. __________ is a type of feminism that views gender inequality as the outcome of evolutionary differences between men and women.

  1. Conservative feminism
  2. Liberal feminism
  3. Marxist feminism
  4. Radical feminism
  5. Socialist feminism

3. __________ is a type of feminism that promotes women’s economic, social, and political rights and equal treatment between men and women.

  1. Conservative feminism
  2. Liberal feminism
  3. Marxist feminism
  4. Radical feminism
  5. Socialist feminism

4. _________ is a type of feminism that views gender inequality as the product of inequalities in employment between men and women, poorly paid jobs predominantly occupied by women, and the trivialization of women’s domestic work.

  1. Conservative feminism
  2. Liberal feminism
  3. Marxist feminism
  4. Radical feminism
  5. Socialist feminism

5. _________ is a type of feminism that views males’ entitlement and perceived superiority as the reasons for gender inequality, which oppresses women.

  1. Conservative feminism
  2. Liberal feminism
  3. Marxist feminism
  4. Radical feminism
  5. Socialist feminism

6. _________ is a type of feminism that views capitalism and patriarchy as equal and interdependent contributors to gender inequality and women’s oppression by men.

  1. Conservative feminism
  2. Liberal feminism
  3. Marxist feminism
  4. Radical feminism
  5. Socialist feminism

7. _________ is a known female hacker.

  1. Susan Headley
  2. Kim Vanvaeck
  3. Jude Milhon
  4. All of the above
  5. None of the above

8. In a patriarchal society, _________.

  1. control is exerted over women
  2. control over women is viewed as necessary
  3. women are seen as the weaker species
  4. both A and B
  5. all of the above

9. Which causal factor has research identified for male and female offending?

  1. Strain
  2. Differential association
  3. Self-control
  4. Both A and C
  5. All of the above

10. Females in the underworld are disadvantaged in terms of _______________.

  1. the range of career paths available to them
  2. rewards
  3. selection and recruitment
  4. both A and C
  5. all of the above

Fill-in-the-blank

1. _______ holds that capitalist societies precipitate crime by enabling those with power to use laws and enforcement of them to control less powerful groups and suppress any threats to those in power.

2. _______ are unproductive members of society who are considered predators and parasites because they live off of the work of others (i.e., the lower class).

3. _______ differs from radical criminology, which focuses on ways to stop criminal activity through radical societal reform, by paying particular attention to ways to create peace between individuals in society and the criminal justice system.

4. _______ refers to the various feminist ideologies and movements associated with women’s rights and equality with men.

5. _______ explore the struggles between individuals and groups with power differentials.

6. _______ seeks to explain the causes of female criminality and the differences between male and female offenders.

7. _______ refers to the principles and practices of feminists concerning the Internet, computers, and related technology.

8. _______ is a term used to describe the actions that promote a dominant position of men in society and the subordination of women.

9. _______ is a subculture wherein women adopt behaviors that are traditionally attributed to men.

10. ______ is a male-dominated society in which males hold the power and females are controlled.

True or False

1. The bourgeoisie is the working class, those who do not have power or wealth.

2. The proletariat is the upper class, those who have power and wealth.

3. Radical criminology views the enforcement of law as disproportionately affecting those who are less powerful in society, resulting in the elite receiving no sentence or less severe sentences for comparable crimes than those without power.

4. Radical criminologists believe that to reduce conflict in society, existing social structures must be dismantled and the capitalist regime should be replaced with a communist or socialist regime.

5. Cyberutopianism is a school of thought of cyberfeminism that views cyberspace as a forum within which women can be oppressed.

6. Cyberdystopianism is a school of thought of cyberfeminism that views cyberspace as a liberating environment for females.

7. The primitive rebellion hypothesis holds that crime is the rational outcome of the struggle against the existing prevailing conditions a working-class individual is faced with in a capitalist society.

8. Social justice warrior is a term used to describe someone who is viewed as disingenuous and only engaging in social justice activities or discussing social justice issues to elevate that person’s own position.

9. Biological determinism holds that human behavior is attributed to the biological makeup of an individual.

10. The penetration of hacking subcultures by women has been easy.

Chapter 10

Multiple Choice

1. An example/examples of unprotected speech is/are _____________.

  1. false statement of facts
  2. incitement to violence
  3. obscene speech
  4. both B and C
  5. All of the above

2. _________ refers to use of the Internet, computers, and related technology to repeatedly threaten, harass, or frighten another individual.

  1. Cyberextortion
  2. Sexting
  3. Cyberstalking
  4. Revenge porn
  5. All of the above

3. _________ refers to use of the Internet and digital devices to intentionally alarm, annoy, attack, or verbally abuse another individual.

  1. Cyberextortion
  2. Sexting
  3. Cyberharassment
  4. Revenge porn
  5. All of the above

4. Cyberbullying _____________.

  1. can occur at all hours of the day or night
  2. is at times inescapable
  3. can occur anonymously
  4. both A and B
  5. all of the above

5. Cyberbullies use __________ to target victims.

  1. mobile phones
  2. chat rooms
  3. social media
  4. instant messaging
  5. all of the above

6. For cyberbullying, children can be ___________.

  1. imprisoned
  2. placed on probation
  3. fined
  4. given community service
  5. all of the above

7. Which coping strategy is used by victims of cyberbullying in response to the crime committed against them?

  1. Retaliation
  2. Ignoring the cyberbully
  3. Seeking support
  4. Utilizing technical solutions
  5. All of the above

8. Which coping strategy is not often used by victims of cyberbullying in response to the crime committed against them and is not considered as useful as other strategies?

  1. Retaliation
  2. Ignoring the cyberbully
  3. Seeking support
  4. Utilizing technical solutions
  5. All of the above

9. __________ prevention programs are proactive, dealing with problems before they occur.

  1. Primary
  2. Secondary
  3. Tertiary
  4. Crime
  5. None of the above

10. _________ prevention programs are implemented after an undesirable behavior or illicit act has occurred.

  1. Primary
  2. Secondary
  3. Tertiary
  4. Crime
  5. None of the above

Fill-in-the-blank

1. _______ refers to use of the Internet and digital devices to intentionally alarm, annoy, attack, or verbally abuse another individual.

2. _______ is a term used to describe the use of sexually explicit photos or videos of the victim without the victim’s consent to cause the victim distress, humiliation, or harm in some way.

3. _______ occurs when a perpetrator threatens to disseminate sexually explicit photos or videos of the victim online if sexual demands are not met or if sexually explicit images or videos are not sent to the perpetrator.

4. ________ are individuals who are sexually aroused by prepubescent adolescents.

5. ________ refers to the visual, audio, written, or other form of portrayal of sexual activity with a child under 18 years of age that is designed to sexually arouse a viewer.

6. _______ depicts sexual acts with animals or dead bodies and/or that endanger a person’s life or can cause extreme physical harm to breasts, genitals, and/or the anus of an individual.

7. ________ refers to the manipulation tactics an offender uses to gain the victim’s trust and ultimately lead him or her to engage in sexual activities.

8. When perpetrators travel to another country to engage in some form of child sexual exploitation, they engage in ________.

9. A ______ is a fake website that serves no legitimate purpose other than to gather intelligence on criminal activity and to capture the information of child sexual predators who access the site to download child pornography.

10. _______ refers to the generation of sexually explicit content (e.g., nude photos) distributed through messaging services on mobile phones or via the Internet.

True or False

1. Trolls have been known to post highly offensive and inflammatory remarks on memorial pages, celebrity websites, and social media accounts, as well as to online forums utilized by everyday users.

2. There are two primary U.S. federal laws that can be used to prosecute cyberstalking.

3. There are international cyberstalking laws.

4. There is no federal cyberharassment law in the United States.

5. There is no federal cyberbullying law in the United States.

6. The terms cyberharassment and cyberbullying are often used interchangeably.

7. A preferential sex offender accesses material opportunistically and impulsively, often to satisfy a sexual need or curiosity or for economic reasons.

8. A situational offender is driven by sexual desires for children and will actively look for child pornography.

9. Netiquette refers to the appropriate rules of behavior in online forums.

10. Tertiary prevention programs target children most at risk of being bullied, harassed, stalked, or harmed in any way.

Chapter 11

Multiple Choice

1. _________ collects information about users’ web-browsing activities to provide targeted advertising content to the user based on his or her online behavior.

  1. Adware
  2. Freeware
  3. Abandonware
  4. Spyware
  5. All of the above

2. _________ can surreptitiously monitor users’ activity and relay this activity to the person who created or distributed the malware.

  1. Adware
  2. Freeware
  3. Abandonware
  4. Spyware
  5. All of the above

3. __________ is malware designed to enable the remote control of digital devices.

  1. Botcode
  2. Bot
  3. Botnet
  4. Botherder
  5. All of the above

4. A ________ is a person who controls zombie computers.

  1. Botcode
  2. Bot
  3. Botnet
  4. Botherder
  5. All of the above

5. Which of the following elements is common to all types of frauds?

  1. Perceived pressure
  2. Perceived opportunity
  3. Rationalization
  4. All of the above
  5. None of the above

6. When scammers create profiles on online dating websites and even social media websites to lure unsuspecting victims into fake relationships, they engage in ___________.

  1. Investment scams
  2. Click bait scams
  3. Advanced fee scams
  4. Catphishing
  5. All of the above

7. _________ scams involve masquerading as a legitimate entity or business to trick users into revealing some type of information.

  1. Pharming
  2. Phishing
  3. Catphishing
  4. Spamming
  5. None of the above

8. ___________ involves spoofed websites that look identical or nearly identical to the known websites they are pretending to be.

  1. Pharming
  2. Phishing
  3. Catphishing
  4. Spamming
  5. None of the above

9. _________ occurs when an individual bids on an item for sale on a website that is misrepresented in some way by the seller in an effort to deceive the buyer to obtain a financial gain.

  1. Impersonation fraud
  2. Click bait fraud
  3. Investment fraud
  4. Online auction fraud
  5. All of the above

10. _________ are fraudsters or scam artists seeking to sell fake financial information.

  1. Spammers
  2. Rippers
  3. Phishers
  4. Pharmers
  5. None of the above

Fill-in-the-blank

1. A _______ is designed to appear as a legitimate program but actually carries a malicious payload.

2. _______ explains why specific signals are considered reliable, whereas others are not, by examining the signal and the quality it purportedly represents.

3. _______ occurs when an individual assumes the identity of a target by unlawfully obtaining and using the target’s name, Social Security number (SSN), bank account number, or other identifying information to commit a crime.

4. _______ involves using social engineering tactics and other methods to steal a wide variety of data for subsequent criminal use, for example, to obtain goods and services in the target’s name.

5. A ______ enables users to engage in electronic commerce transactions by allowing them to pay using their digital devices.

6. _______ involves the use of an individual’s personal information and medical insurance card data to obtain medical services.

7. The ______ refers to the connection of humans, animals, plants, and inanimate objects in the physical world to the Internet.

8. ______ refers to ownership rights to intangible property.

9. A ______ protects literary or artistic works.

10. A ______ protects symbols and names associated with a particular good or service.

True or False

1. Malware has two main components, payload and propagation techniques.

2. Computer viruses are self-executing and self-propagating.

3. Bots have also been used in spamming campaigns.

4. Online transactions depend on trust in the seller and trust in the platform.

5. Dumps are any stolen credit card or other financial information,

6. An identity theft report is also known as the identity theft affidavit.

7. Digital piracy occurs through illegally streaming, downloading, and distributing movies, TV shows, music, and other copyrighted works.

8. Freeware is software that is no longer available for use.

9. A trademark is obtained to protect an invention.

10. The theft of trade secrets illicitly obtained through the use of the Internet, computers, and related technology is referred to as cyberespionage.

Chapter 12

Multiple Choice

1. With _______, sexual arousal and pleasure are obtained by rubbing or touching another, nonconsenting individual in a public space.

  1. fetishism
  2. frotteurism
  3. exhibitionism
  4. masochism
  5. sadism

2. With _______, sexual arousal and pleasure are obtained from self-inflicted pain or pain inflicted by others.

  1. fetishism
  2. frotteurism
  3. exhibitionism
  4. masochism
  5. sadism

3. With _______, sexual arousal and pleasure are obtained by inflicting pain on others.

  1. fetishism
  2. frotteurism
  3. exhibitionism
  4. masochism
  5. sadism

4. With _______, an individual is sexually attracted to animals or seeks a sexual relationship with animals.

  1. masochism
  2. sadism
  3. zoosadism
  4. zoophilia
  5. fetishism

5. _______ is a condition in which one derives sexual gratification and pleasure from an inanimate object or a nongenital body part.

  1. Fetishism
  2. Frotteurism
  3. Exhibitionism
  4. Masochism
  5. Sadism

6. _______ is a form of paraphilia that is coercive because it violates an individual’s privacy by engaging in unauthorized surveillance of the person.

  1. Exhibitionism
  2. Voyeurism
  3. Frotteurism
  4. Fetishism
  5. Asphyxiophilia

7. _______ involves the receiving of sexual gratification and pleasure from the intentional restriction of oxygen to the brain of others or oneself.

  1. Exhibitionism
  2. Voyeurism
  3. Frotteurism
  4. Fetishism
  5. Asphyxiophilia

8. _______ is the process of receiving sexual gratification and pleasure by watching others engage in sexual acts without their knowledge.

  1. Necrophilia
  2. Scoptophilia
  3. Coprophilia
  4. Urophilia
  5. Asphyxiophilia

9. _______ is the use of the Internet and digital technology to sexually arouse another user through text messages, video streaming services, or the use of cyberdildonics.

  1. Cyberprostitution
  2. Cyberpornography
  3. Cybersex
  4. Prostitution
  5. None of the above

10. _______ is a condition in which an individual engages in self-starvation or eats very little food because of a fear of gaining weight and has a distorted perception of his or her body/weight.

  1. Anorexia
  2. Bulimia nervosa
  3. Bulimia
  4. Asphyxiophilia
  5. Both B and C

Fill-in-the-blank

1. Crimes that violate the moral principles of society are known as ______ offenses.

2. _______ involves the visual, audio, written, or other form of portrayal of sexual activity designed specifically to cause sexual arousal in the user.

3. ______ refers to behavior that violates social norms and expectations.

4. ______ refers to sexual behavior that violates social norms and expectations.

5. ______ refers to the exposure of one’s genitals to an unsuspecting and unwilling third party.

6 ______ refers to the process of giving and receiving sexual arousal and pleasure from inflicting and receiving pain.

7. ______ receive sexual gratification from watching animals being tortured or killed.

8. A _______ receives sexual arousal and pleasure from viewing or having sexual intercourse with corpses.

9. ________ involves engaging in a sexual activity for some form of remuneration.

10. _______ refers to the engagement of children in sexual acts for some form of remuneration.

True or False

1. In the U.S. states that have adultery laws in place, prosecutions are common.

2. Deviant acts are illegal.

3. Pedophilia is the most widely studied deviant behavior.

4. In most countries, bestiality is criminalized as a crime against nature and, to a lesser extent, as an abuse of animals prohibited under animal cruelty laws.

5. Psychoactive substances are illegal.

6. In the United States, to obtain drugs from these online pharmacies, a prescription from a doctor is required before purchasing and shipping drugs.

7. The National Association of Boards of Pharmacy created the Veterinary-Verified Internet Pharmacy Practice Sites (Vet-VIPPS) program to accredit veterinarian pharmacies.

8. Offline gambling sites have a wider clientele base, fewer start-up and maintenance costs, and lower operating costs than online gambling sites.

9. Prohibitionists seek to eradicate the sex work industry by punishing the purchasing of sex and by assisting prostitutes in leaving the sex industry.

10. Regulationists seek to outlaw prostitution on moral grounds.

Chapter 13

Multiple Choice

1. Organized cybercriminals provide ________ for purchase.

  1. stolen data
  2. malicious software toolkits and services
  3. hacking services
  4. pay-per-install services
  5. all of the above

2. ________ is malware designed to facilitate a cybercrime and can be modified to users’ needs.

  1. Crimeware
  2. Ransomware
  3. Cryptoransomware
  4. Spyware
  5. None of the above

3. ________ warns users of the existence of unlicensed applications, child pornography, and other forms of illicit activity on the user’s system.

  1. Crimeware
  2. Ransomware
  3. Cryptoransomware
  4. Spyware
  5. None of the above

4. ________ is malware that is designed to encrypt data on a victim’s system and extort money from victims to release information.

  1. Crimeware
  2. Ransomware
  3. Cryptoransomware
  4. Spyware
  5. None of the above

5. _________ drugs have the greatest potential for abuse and are the only drugs listed in the act that have no medical use.

  1. Schedule I
  2. Schedule II
  3. Schedule III
  4. Schedule IV
  5. Schedule V

6. Darknet sites can be accessed with __________.

  1. Tor
  2. Freenet
  3. Silk Road
  4. Pandora
  5. both A and B

7. A search engine on Darknet is ________.

  1. Tor
  2. Grams
  3. Onion City
  4. Google
  5. both B and C

8. __________ involves willfully entering a country illegally.

  1. Human trafficking
  2. Human smuggling
  3. Debt bondage
  4. Forced labor
  5. None of the above

9. Organ trafficking occurs through ___________.

  1. chat rooms
  2. newsgroups
  3. social media
  4. auction websites
  5. all of the above

10. ________ refers to the illegal capture, trade, and possession of endangered species, protected wildlife, and parts and products thereof.

  1. Wildlife trafficking
  2. Fauna and flora trafficking
  3. Organ trafficking
  4. Both A and B
  5. All of the above

Fill-in-the-blank

1. An ________ can be described as a structured group of three or more persons who act in concert with the goal of committing a serious cybercrime or cybercrimes for financial gain using the Internet.

2. _______ is a service that allows users to upload content and promises not to remove users’ content, even if it is illegal.

3. A _______ is an intermediary server that enables indirect access to the content of other servers.

4. _______ can be described as the process whereby criminals conceal and legitimate illicit funds.

5. The laundering of large amounts of money by engaging in numerous small transactions is known as ________.

6. ________ are virtual currencies that utilize cryptography for security reasons.

7. A ________ is an individual who obtains and transfers money illegally on request and payment by other users.

8. ________ involves the unlawful distribution and sale of drugs in violation of existing national and international laws.

9. Information about Darknet sites can be found on a _______.

10. _______ involves the recruitment of poor individuals to provide/supply organs to those in need from a wealthy country in exchange for a fee.

True or False

1. Marijuana is listed as a Schedule 1 drug.

2. Organizations delivering mail in the United States have been charged for knowingly delivering illicit products from online pharmacies.

3. The surface web includes sites that are password protected and intranets.

4. The deep web is the underworld of cyberspace.

5. The scam markets revealed on the Darknet created distrust.

6. Human smuggling and human trafficking refer to the same illicit activity.

7. An accurate assessment of the nature and extent of human trafficking does not exist.

8. To import, manufacture, or sell firearms, one must be approved for a license, the federal firearms license.

9. Cigarette trafficking is often conducted to evade the cost of cigarettes, which is high in many countries and states because of high taxation rates.

10. Certain forms of trafficking do not have severe penalties, sending the message to those engaging in this conduct that it is a high-reward and low-risk crime.

Chapter 14

Multiple Choice

1. Which of the following cybercrimes can be classified as political cybercrime?

  1. Hacktivism
  2. Cyberterrorism
  3. Cyberwarfare
  4. Both B and C
  5. All of the above

2. Political cybercriminals engage in ___________.

  1. hacking
  2. malware distribution
  3. denial of service (DoS) attacks
  4. distributed denial of service (DDoS) attacks
  5. all of the above

3. Which of the following cybercrimes have hacktivists equated with online civil disobedience?

  1. Website defacement
  2. Malware distribution
  3. Redirecting websites
  4. Data theft and disclosure
  5. All of the above

4. _________ refers to the use of coercive tactics to provoke fear and cause harm or damage with the intention of replacing a capitalist regime with a socialist or communist regime.

  1. Religious terrorism
  2. Left-wing terrorism
  3. Right-wing terrorism
  4. Nationalist-separatist terrorism
  5. Special-interest terrorism

5. ________refers to the use of threats or acts of violence against a particular group that is motivated by notions of racial supremacy or antigovernment and antiregulatory beliefs.

  1. Religious terrorism
  2. Left-wing terrorism
  3. Right-wing terrorism
  4. Nationalist-separatist terrorism
  5. Special-interest terrorism

6. ________ refers to the use of coercive tactics to resolve a specific issue that a group believes warrants immediate attention.

  1. Religious terrorism
  2. Left-wing terrorism
  3. Right-wing terrorism
  4. Nationalist-separatist terrorism
  5. Special-interest terrorism

7. ________ refers to the use of the Internet to target critical infrastructure with the intention of provoking fear and causing damage, serious bodily harm, or death to effect some form of change in the government or population in furtherance of a political, religious, or ideological goal.

  1. Cyberwarfare
  2. Cyberterrorism
  3. Cyberespionage
  4. Hacktivism
  5. Wardriving

8. A _________ is an illegal act conducted by a state to obtain justice for an attack committed against it.

  1. reprisal
  2. retorsion
  3. self-defense
  4. precautionary
  5. none of the above

9. A _______ is a legal act conducted by a harmed country in response to an attack.

  1. reprisal
  2. retorsion
  3. self-defense
  4. precautionary
  5. none of the above

10. _______ holds that the international system creates opportunities for states to both cooperate and engage in self-help and it is up to the state to determine whether to take advantage of these opportunities.

  1. Realism
  2. Security dilemma
  3. Liberalism
  4. Brinkmanship
  5. None of the above

Fill-in-the-blank

1. A _________ engages in cybercrime in furtherance of self-perceived justice to draw attention to his or her cause.

2. ________ involves actions that constitute a nonviolent intentional breach of law.

3. ________ is the practice of spying or using spies, typically by a government, to obtain economic, political, or military information.

4. ________ refer to groups with both the capability and the intent to persistently and effectively target a specific entity.

5. _______ refers to engaging in coercive tactics to cause fear, destruction, harm, or death with the intention of effecting some form of change in the government or population in pursuit of a political, ideological, or religious goal.

6. _______ involves the use of coercive acts in pursuit of what individuals believe to be divinely commanded purposes, representing extremists’ interpretations of their faith.

7. ________ refers to the use of coercive tactics by an ethnic or religious group that believes it is, or in fact is, persecuted by a majority to create an independent homeland.

8. The _______ ultimately holds that countries misinterpret the actions of another nation to improve security as a threat.

9. ________ is the doctrine of military strategy holding that the full-scale use of force by two opposing sides effectively results in the destruction of both in an attack.

10. _______ refers to the process of engaging in continual escalation of actions to the point of a catastrophic outcome with the intention of gaining a favorable outcome.

True or False

1. The tactics, targets, and even modus operandi of political cybercriminals may be similar in nature.

2. One type of cybervigilante is a hacktivist.

3. An example of cyberterrorism is terrorists’ use of the Internet.

4. Cyberwarfare has occurred.

5. Hackback is a tactic that can be used by actors that is in accordance with existing laws.

6. Collective punishment targets those who are not responsible for the illicit behavior.

7. Cyberoffensive tactics are measures that can detect vulnerabilities, patch them, detect attempted cyberattacks, and mitigate their impact with the necessary human and technical resources.

8. Cyberdefensive tactics involve proactive responses designed to penetrate enemy systems and cause harm or damage.

9. Just war theory focuses on elucidating agents’ intentions and strategic decisions with respect to their preferences or the perceived utility and costs of particular actions.

10. Speech directed to incite, or which is likely to incite, imminent lawless, violent action is protected under the First Amendment to the U.S. Constitution.

Document Information

Document Type:
DOCX
Chapter Number:
All in one
Created Date:
Aug 21, 2025
Chapter Name:
Test bank Cybercriminology Marie-Helen
Author:
Marie Helen Maras

Connected Book

Cybercriminology 1e | Test Bank Maras

By Marie Helen Maras

Test Bank General
View Product →

Explore recommendations drawn directly from what you're reading

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party