Test Questions & Answers Crimes In The Cyber System Ch9 - Complete Test Bank | White Collar Crime 3e by Payne by Brian K. Payne. DOCX document preview.
Chapter 9: Crimes in the Cyber System
Test Bank
Multiple Choice
- What role is the computer playing if it is hacked?
- target of an offense
- tool for a crime
- incidental to a crime
- storage for information about crimes
Learning Objective: 9-1: Describe the concept of computer crime.
Cognitive Domain: Comprehension
Answer Location: Conceptualizing Crime in the Cyber System
Difficulty Level: Medium
- What is usually stolen during theft as a computer crime?
- information
- access to subscriptions
- business plans
- personal information
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses
Cognitive Domain: Comprehension
Answer Location: Theft as a Computer Crime
Difficulty Level: Medium
- The theft of intellectual property is what type of stolen information?
- confidential business information
- property protected by cyber security companies
- information protected by copyright
- works written for publication but not copyrighted
Ans. C
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses
Cognitive Domain: Comprehension
Answer Location: Theft as a Computer Crime
Difficulty Level: Medium
- What computer crime can result from responding to phishing emails?
- piracy
- identity theft
- deletion of data
- virus
Ans. B
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses
Cognitive Domain: Comprehension
Answer Location: Theft as a Computer Crime
Difficulty Level: Medium
- What type of crime do hackers or crackers usually commit?
- unauthorized access
- theft as a computer crime
- cyberterrorism
- virus introduction
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.
Cognitive Domain: Knowledge
Answer Location: Unauthorized Access as a Computer Crime
Difficulty Level: Easy
6. If a computer virus is not introduced into a computer by an intruder, what is the intruder’s probable goal?
- recreational
- cyberterrorism
- obtain information
- protection
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.
Cognitive Domain: Application
Answer Location: Unauthorized Access as a Computer Crime
Difficulty Level: Medium
7. If an offender remotely accesses the control systems of an infant formula
manufacturer and changes the ingredients with a deadly result, what type of crime has been committed?
- phishing
- software crime
- cyberterrorism
- hacking
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.
Cognitive Domain: Comprehension
Answer Location: Virus Introduction as a Computer Crime
Difficulty Level: Medium
- Which of the following cannot be considered a type of software crime?
- copyright violations
- counterfeiting
- piracy
- child pornography
Correct
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.
Cognitive Domain: Comprehension
Answer Location: Software Crime as a Computer Crime
Difficulty Level: Medium
- If someone failed to pay for an item “bought” on eBay, what type
of crime would they be committing?
- internet crime
- extortion
- money laundering
- theft as a computer crime
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.
Cognitive Domain: Comprehension
Answer Location: Internet Crimes
Difficulty Level: Medium
9. White-collar cybercrimes are committed at work either by employees or what
other actor?
- clients
- tech employees
- employers
- hired professionals
Learning Objective: 9-3: Explain what makes cybercrime a white-collar crime.
Cognitive Domain: Comprehension
Answer Location: White-Collar Cybercrime
Difficulty Level: Medium
11. What is one general characteristic of cybercriminals when they are committing a crime?
- They work alone or with a network of other offenders.
- They are paid to commit computer crimes.
- They are often hired to work inside a company.
- They work only as part of a crime network.
Learning Objective: 9-4: Describe the various types of cybercriminals and how they operate.
Cognitive Domain: Comprehension
Answer Location: Characteristics of Cybercriminals
Difficulty Level: Medium
- A group of infected computers online, under the control of one cyber
offender at the same time, is known as what type of computer crime?
- virus
- network
- botnet
- unidentified access
Learning Objective: 9-4: Describe the various types of cybercriminals and how they operate.
Cognitive Domain: Comprehension
Answer Location: Characteristics of Cybercriminals
Difficulty Level: Medium
- Why do cybercriminals form cybergangs?
- Being part of a gang helps to expand their skill sets.
- They are able to keep secrets.
- It is easier to hide their identities as part of a cybergang.
- They form because of their expertise.
Learning Objective: 9-4: Describe the various types of cybercriminals and how they operate.
Cognitive Domain: Comprehension
Answer Location: Characteristics of Cybercriminals
Difficulty Level: Medium
14. When cyber offenders steal information for profit, what is one way they sell stolen information?
- to specific buyers based on what is being sought
- offer dumps of credit card and/or banking information
- auction to cybercriminals for buyers wanting specific items
- check with their networks for buyers
Learning Objective: 9-4: Describe the various types of cybercriminals and how they operate.
Cognitive Domain: Comprehension
Answer Location: Characteristics of Cybercriminals
Difficulty Level: Medium
- Which explanation for computer crime focuses on the degree of knowledge
offenders typically have about computers?
- peer association explanations
- opportunity explanations
- structural changes
- human factors
Learning Objective: 9-3: Explain what makes cybercrime a white-collar crime.
Cognitive Domain: Comprehension
Answer Location: Explaining Computer Crime
Difficulty Level: Medium
- A survey by the Ponemon Institute found that the cost of cyber offending was
highest in which industries?
a. financial, hospitals, and utilities
b. hospitals, energy, and utilities
c. energy, financial, and hospitals
d. utilities, financial, and energy
Learning Objective: 9-5: Analyze the costs of cybercrime to society.
Cognitive Domain: Comprehension
Answer Location: Costs of Cybercrime
Difficulty Level: Medium
- Hospitals are particularly vulnerable to what type of cyberattack?
- malware
- ransomware
- virus
- data loss
Learning Objective: 9-5: Analyze the costs of cybercrime to society.
Cognitive Domain: Comprehension
Answer Location: Costs of Cybercrime
Difficulty Level: Medium
- Over one-third of companies surveyed in a study on cybercrime attributed
some of their cyberattacks to whom?
- professional hackers
- cybergangs
- malicious insiders
- a lone cyber offender
Learning Objective: 9-5: Analyze the costs of cybercrime to society.
Cognitive Domain: Comprehension
Answer Location: Costs of Cybercrime
Difficulty Level: Medium
- What issue arises in regards to preventing computer crimes?
- Offenders have high levels of education.
- Criminal justice officials are not trained to respond to computer crimes.
- Offenses occur very quickly.
- Employees might sense a computer crime occurring.
Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.
Cognitive Domain: Comprehension
Answer Location: Problems Responding to Computer Crimes
Difficulty Level: Medium
20. How do victim characteristics inhibit law enforcement response to computer
crimes?
- Victims try to hide their losses.
- They can’t figure out the extent of the cybercrime.
- Some victims report the crime against them right away.
- Victims often don’t know that they are victims.
Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.
Cognitive Domain: Comprehension
Answer Location: Problems Responding to Computer Crimes
Difficulty Level: Medium
21. What type of computer crime is most prevalent on college campuses?
- piracy
- hacking
- unauthorized access
- online stalking
Learning Objective: 9-7: Analyze why colleges and universities are an attractive target for cybercrime.
Cognitive Domain: Knowledge
Answer Location: Colleges and Cybercrime
Difficulty Level: Easy
22. Efforts to punish cybercriminals to prevent them from committing crimes is what type of strategy?
- employer-based strategies
- police-based strategies
- criminal justice system-based strategies
- retributive strategies
Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.
Cognitive Domain: Comprehension
Answer Location: Retributive Strategies
Difficulty Level: Medium
23. The Computer Fraud and Abuse Act of 1984, broadened in 1996 to make
various aspects of computer offending a federal crime, is what strategy for responding to cybercrime?
- legislative
- policing
- retributive
- hybrid
Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.
Cognitive Domain: Comprehension
Answer Location: Responding to Cybercrime
Difficulty Level: Medium
24. Which of the following is an employee-based strategy employers
use to protect their businesses from computer crime in the workplace?
- employee-initiated audits of their computer use
- employees no longer using computers at home
- employers checking employee usage of databases
- learning to detect suspicious employee computer behaviors
Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.
Cognitive Domain: Comprehension
Answer Location: General Prevention Strategies
Difficulty Level: Medium
25. Why are colleges and universities a possible target for cyber criminals?
- the financial incentive to target campuses
- opportunity for various cybercrimes, both attacks and internet crimes
- piracy and digital piracy opportunities
- the enormous amount of data collected and stored on campuses
Learning Objective: 9-7: Analyze why colleges and universities are an attractive target for cybercrime.
Cognitive Domain: Comprehension
Answer Location: Colleges and Cybercrime
Difficulty Level: Medium
True/False
- Computer crime and cybercrime refer to computer-related behaviors that
are illegal, but not harmful.
Learning Objective: 9-1: Describe the concept of computer crime.
Cognitive Domain: Comprehension
Answer Location: Conceptualizing Crime in the Cyber System
Difficulty Level: Medium
- Two types of crackers exist, those on the inside of a targeted company and
those on the outside.
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.
Cognitive Domain: Comprehension
Answer Location: Unauthorized Access as a Computer Crime
Difficulty Level: Medium
- Piracy is most specifically considered a type of internet crime.
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.
Cognitive Domain: Knowledge
Answer Location: Software Crime as a Computer Crime
Difficulty Level: Easy
- Overpayment fraud is considered theft as a computer crime.
Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.
Cognitive Domain: Knowledge
Answer Location: Internet Crimes
Difficulty Level: Easy
- White-collar cybercrime describes crimes that occur outside of an employer’s
workplace.
Learning Objective: 9-3: Explain what makes cybercrime a white-collar crime.
Cognitive Domain: Comprehension
Answer Location: White-Collar Cybercrime
Difficulty Level: Medium
- The topology of cybercriminals suggests that they may work alone, with
a group of associates, or within a network.
Learning Objective: 9-3: Explain what makes cybercrime a white-collar crime.
Cognitive Domain: Comprehension
Answer Location: Characteristics of Cybercriminals
Difficulty Level: Medium
7. Interference with an individual’s access to their technology because of cyber offending can cause physical and social consequences for the victim.
Learning Objective: 9-5: Analyze the costs of cybercrime to society.
Cognitive Domain: Comprehension
Answer Location: Costs of Cybercrime
Difficulty Level: Medium
8. Opportunity explanations for computer crimes focus on the ease with which
offenses are committed.
Learning Objective: 9-5: Analyze the costs of cybercrime to society.
Cognitive Domain: Comprehension
Answer Location: Explaining Computer Crime
Difficulty Level: Medium
9. Unlike victims of other white-collar crimes that often fail to report their
victimization, most victims of computer-related crimes report offenses.
Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.
Cognitive Domain: Comprehension
Answer Location: Problems Responding to Computer Crimes
Difficulty Level: Medium
10. Complex jurisdictional issues encourage cooperation among law enforcement agencies in their efforts to respond to cybercrime.
Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.
Cognitive Domain: Comprehension
Answer Location: Problems Responding to Computer Crimes
Difficulty Level: Medium
Short Answer
- Analyze the reasons officials have difficulties responding to computer crimes.
Learning Objective: 9-6: Describe the strategies for and problems of
responding to cybercrime.
Cognitive Domain: Analysis
Answer Location: Problems Responding to Computer Crimes
Difficulty Level: Medium
- Describe three characteristics of cybergangs.
Learning Objective: 9-4: Describe the various types of cybercriminals and how
they operate.
Cognitive Domain: Analysis
Answer Location: Characteristics of Cybercriminals
Difficulty Level: Medium
- Describe internet piracy.
Learning Objective: 9-7: Analyze why colleges and universities are an attractive
target for cybercrime.
Cognitive Domain: Analysis
Answer Location: Software Crime as a Computer Crime
Difficulty Level: Medium
- Compare the motives of hackers versus crackers.
Learning Objective: 9-4: Describe the various types of cybercriminals and how
they operate.
Cognitive Domain: Analysis
Answer Location: Unauthorized Access as a Computer Crime
Difficulty Level: Medium
- Describe counterfeiting software crimes.
Learning Objective: 9-2: Summarize the main categories of computer crime that
occur in businesses.
Cognitive Domain: Analysis
Answer Location: Software Crime as a Computer Crime
Difficulty Level: Medium
Essay
- Discuss the issues that complicate responding to cybercrime.
Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.
Cognitive Domain: Analysis
Answer Location: Problems Responding to Computer Crimes
Difficulty Level: Medium
- Choose one of the sectors of critical infrastructure and develop a discussion
about what the consequences and the costs of a cyber offense on that sector might be.
Learning Objective: 9-5: Analyze the costs of cybercrime to society.
Cognitive Domain: Analysis
Answer Location: Costs of Cybercrime
Difficulty Level: Medium
Document Information
Connected Book
Complete Test Bank | White Collar Crime 3e by Payne
By Brian K. Payne