Test Questions & Answers Crimes In The Cyber System Ch9 - Complete Test Bank | White Collar Crime 3e by Payne by Brian K. Payne. DOCX document preview.

Test Questions & Answers Crimes In The Cyber System Ch9

Chapter 9: Crimes in the Cyber System

Test Bank

Multiple Choice

  1. What role is the computer playing if it is hacked?
  2. target of an offense
  3. tool for a crime
  4. incidental to a crime
  5. storage for information about crimes

Learning Objective: 9-1: Describe the concept of computer crime.

Cognitive Domain: Comprehension

Answer Location: Conceptualizing Crime in the Cyber System

Difficulty Level: Medium

  1. What is usually stolen during theft as a computer crime?
  2. information
  3. access to subscriptions
  4. business plans
  5. personal information

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses

Cognitive Domain: Comprehension

Answer Location: Theft as a Computer Crime

Difficulty Level: Medium

  1. The theft of intellectual property is what type of stolen information?
  2. confidential business information
  3. property protected by cyber security companies
  4. information protected by copyright
  5. works written for publication but not copyrighted

Ans. C

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses

Cognitive Domain: Comprehension

Answer Location: Theft as a Computer Crime

Difficulty Level: Medium

  1. What computer crime can result from responding to phishing emails?
  2. piracy
  3. identity theft
  4. deletion of data
  5. virus

Ans. B

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses

Cognitive Domain: Comprehension

Answer Location: Theft as a Computer Crime

Difficulty Level: Medium

  1. What type of crime do hackers or crackers usually commit?
  2. unauthorized access
  3. theft as a computer crime
  4. cyberterrorism
  5. virus introduction

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.

Cognitive Domain: Knowledge

Answer Location: Unauthorized Access as a Computer Crime

Difficulty Level: Easy

6. If a computer virus is not introduced into a computer by an intruder, what is the intruder’s probable goal?

  1. recreational
  2. cyberterrorism
  3. obtain information
  4. protection

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.

Cognitive Domain: Application

Answer Location: Unauthorized Access as a Computer Crime

Difficulty Level: Medium

7. If an offender remotely accesses the control systems of an infant formula

manufacturer and changes the ingredients with a deadly result, what type of crime has been committed?

  1. phishing
  2. software crime
  3. cyberterrorism
  4. hacking

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.

Cognitive Domain: Comprehension

Answer Location: Virus Introduction as a Computer Crime

Difficulty Level: Medium

  1. Which of the following cannot be considered a type of software crime?
  2. copyright violations
  3. counterfeiting
  4. piracy
  5. child pornography

Correct

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.

Cognitive Domain: Comprehension

Answer Location: Software Crime as a Computer Crime

Difficulty Level: Medium

  1. If someone failed to pay for an item “bought” on eBay, what type

of crime would they be committing?

  1. internet crime
  2. extortion
  3. money laundering
  4. theft as a computer crime

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.

Cognitive Domain: Comprehension

Answer Location: Internet Crimes

Difficulty Level: Medium

9. White-collar cybercrimes are committed at work either by employees or what

other actor?

  1. clients
  2. tech employees
  3. employers
  4. hired professionals

Learning Objective: 9-3: Explain what makes cybercrime a white-collar crime.

Cognitive Domain: Comprehension

Answer Location: White-Collar Cybercrime

Difficulty Level: Medium

11. What is one general characteristic of cybercriminals when they are committing a crime?

  1. They work alone or with a network of other offenders.
  2. They are paid to commit computer crimes.
  3. They are often hired to work inside a company.
  4. They work only as part of a crime network.

Learning Objective: 9-4: Describe the various types of cybercriminals and how they operate.

Cognitive Domain: Comprehension

Answer Location: Characteristics of Cybercriminals

Difficulty Level: Medium

  1. A group of infected computers online, under the control of one cyber

offender at the same time, is known as what type of computer crime?

  1. virus
  2. network
  3. botnet
  4. unidentified access

Learning Objective: 9-4: Describe the various types of cybercriminals and how they operate.

Cognitive Domain: Comprehension

Answer Location: Characteristics of Cybercriminals

Difficulty Level: Medium

  1. Why do cybercriminals form cybergangs?
  2. Being part of a gang helps to expand their skill sets.
  3. They are able to keep secrets.
  4. It is easier to hide their identities as part of a cybergang.
  5. They form because of their expertise.

Learning Objective: 9-4: Describe the various types of cybercriminals and how they operate.

Cognitive Domain: Comprehension

Answer Location: Characteristics of Cybercriminals

Difficulty Level: Medium

14. When cyber offenders steal information for profit, what is one way they sell stolen information?

  1. to specific buyers based on what is being sought
  2. offer dumps of credit card and/or banking information
  3. auction to cybercriminals for buyers wanting specific items
  4. check with their networks for buyers

Learning Objective: 9-4: Describe the various types of cybercriminals and how they operate.

Cognitive Domain: Comprehension

Answer Location: Characteristics of Cybercriminals

Difficulty Level: Medium

  1. Which explanation for computer crime focuses on the degree of knowledge

offenders typically have about computers?

  1. peer association explanations
  2. opportunity explanations
  3. structural changes
  4. human factors

Learning Objective: 9-3: Explain what makes cybercrime a white-collar crime.

Cognitive Domain: Comprehension

Answer Location: Explaining Computer Crime

Difficulty Level: Medium

  1. A survey by the Ponemon Institute found that the cost of cyber offending was

highest in which industries?

a. financial, hospitals, and utilities

b. hospitals, energy, and utilities

c. energy, financial, and hospitals

d. utilities, financial, and energy

Learning Objective: 9-5: Analyze the costs of cybercrime to society.

Cognitive Domain: Comprehension

Answer Location: Costs of Cybercrime

Difficulty Level: Medium

  1. Hospitals are particularly vulnerable to what type of cyberattack?
  2. malware
  3. ransomware
  4. virus
  5. data loss

Learning Objective: 9-5: Analyze the costs of cybercrime to society.

Cognitive Domain: Comprehension

Answer Location: Costs of Cybercrime

Difficulty Level: Medium

  1. Over one-third of companies surveyed in a study on cybercrime attributed

some of their cyberattacks to whom?

  1. professional hackers
  2. cybergangs
  3. malicious insiders
  4. a lone cyber offender

Learning Objective: 9-5: Analyze the costs of cybercrime to society.

Cognitive Domain: Comprehension

Answer Location: Costs of Cybercrime

Difficulty Level: Medium

  1. What issue arises in regards to preventing computer crimes?
  2. Offenders have high levels of education.
  3. Criminal justice officials are not trained to respond to computer crimes.
  4. Offenses occur very quickly.
  5. Employees might sense a computer crime occurring.

Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.

Cognitive Domain: Comprehension

Answer Location: Problems Responding to Computer Crimes

Difficulty Level: Medium

20. How do victim characteristics inhibit law enforcement response to computer

crimes?

  1. Victims try to hide their losses.
  2. They can’t figure out the extent of the cybercrime.
  3. Some victims report the crime against them right away.
  4. Victims often don’t know that they are victims.

Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.

Cognitive Domain: Comprehension

Answer Location: Problems Responding to Computer Crimes

Difficulty Level: Medium

21. What type of computer crime is most prevalent on college campuses?

  1. piracy
  2. hacking
  3. unauthorized access
  4. online stalking

Learning Objective: 9-7: Analyze why colleges and universities are an attractive target for cybercrime.

Cognitive Domain: Knowledge

Answer Location: Colleges and Cybercrime

Difficulty Level: Easy

22. Efforts to punish cybercriminals to prevent them from committing crimes is what type of strategy?

  1. employer-based strategies
  2. police-based strategies
  3. criminal justice system-based strategies
  4. retributive strategies

Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.

Cognitive Domain: Comprehension

Answer Location: Retributive Strategies

Difficulty Level: Medium

23. The Computer Fraud and Abuse Act of 1984, broadened in 1996 to make

various aspects of computer offending a federal crime, is what strategy for responding to cybercrime?

  1. legislative
  2. policing
  3. retributive
  4. hybrid

Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.

Cognitive Domain: Comprehension

Answer Location: Responding to Cybercrime

Difficulty Level: Medium

24. Which of the following is an employee-based strategy employers

use to protect their businesses from computer crime in the workplace?

  1. employee-initiated audits of their computer use
  2. employees no longer using computers at home
  3. employers checking employee usage of databases
  4. learning to detect suspicious employee computer behaviors

Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.

Cognitive Domain: Comprehension

Answer Location: General Prevention Strategies

Difficulty Level: Medium

25. Why are colleges and universities a possible target for cyber criminals?

  1. the financial incentive to target campuses
  2. opportunity for various cybercrimes, both attacks and internet crimes
  3. piracy and digital piracy opportunities
  4. the enormous amount of data collected and stored on campuses

Learning Objective: 9-7: Analyze why colleges and universities are an attractive target for cybercrime.

Cognitive Domain: Comprehension

Answer Location: Colleges and Cybercrime

Difficulty Level: Medium

True/False

  1. Computer crime and cybercrime refer to computer-related behaviors that

are illegal, but not harmful.

Learning Objective: 9-1: Describe the concept of computer crime.

Cognitive Domain: Comprehension

Answer Location: Conceptualizing Crime in the Cyber System

Difficulty Level: Medium

  1. Two types of crackers exist, those on the inside of a targeted company and

those on the outside.

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.

Cognitive Domain: Comprehension

Answer Location: Unauthorized Access as a Computer Crime

Difficulty Level: Medium

  1. Piracy is most specifically considered a type of internet crime.

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.

Cognitive Domain: Knowledge

Answer Location: Software Crime as a Computer Crime

Difficulty Level: Easy

  1. Overpayment fraud is considered theft as a computer crime.

Learning Objective: 9-2: Summarize the main categories of computer crime that occur in businesses.

Cognitive Domain: Knowledge

Answer Location: Internet Crimes

Difficulty Level: Easy

  1. White-collar cybercrime describes crimes that occur outside of an employer’s

workplace.

Learning Objective: 9-3: Explain what makes cybercrime a white-collar crime.

Cognitive Domain: Comprehension

Answer Location: White-Collar Cybercrime

Difficulty Level: Medium

  1. The topology of cybercriminals suggests that they may work alone, with

a group of associates, or within a network.

Learning Objective: 9-3: Explain what makes cybercrime a white-collar crime.

Cognitive Domain: Comprehension

Answer Location: Characteristics of Cybercriminals

Difficulty Level: Medium

7. Interference with an individual’s access to their technology because of cyber offending can cause physical and social consequences for the victim.

Learning Objective: 9-5: Analyze the costs of cybercrime to society.

Cognitive Domain: Comprehension

Answer Location: Costs of Cybercrime

Difficulty Level: Medium

8. Opportunity explanations for computer crimes focus on the ease with which

offenses are committed.

Learning Objective: 9-5: Analyze the costs of cybercrime to society.

Cognitive Domain: Comprehension

Answer Location: Explaining Computer Crime

Difficulty Level: Medium

9. Unlike victims of other white-collar crimes that often fail to report their

victimization, most victims of computer-related crimes report offenses.

Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.

Cognitive Domain: Comprehension

Answer Location: Problems Responding to Computer Crimes

Difficulty Level: Medium

10. Complex jurisdictional issues encourage cooperation among law enforcement agencies in their efforts to respond to cybercrime.

Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.

Cognitive Domain: Comprehension

Answer Location: Problems Responding to Computer Crimes

Difficulty Level: Medium

Short Answer

  1. Analyze the reasons officials have difficulties responding to computer crimes.

Learning Objective: 9-6: Describe the strategies for and problems of

responding to cybercrime.

Cognitive Domain: Analysis

Answer Location: Problems Responding to Computer Crimes

Difficulty Level: Medium

  1. Describe three characteristics of cybergangs.

Learning Objective: 9-4: Describe the various types of cybercriminals and how

they operate.

Cognitive Domain: Analysis

Answer Location: Characteristics of Cybercriminals

Difficulty Level: Medium

  1. Describe internet piracy.

Learning Objective: 9-7: Analyze why colleges and universities are an attractive

target for cybercrime.

Cognitive Domain: Analysis

Answer Location: Software Crime as a Computer Crime

Difficulty Level: Medium

  1. Compare the motives of hackers versus crackers.

Learning Objective: 9-4: Describe the various types of cybercriminals and how

they operate.

Cognitive Domain: Analysis

Answer Location: Unauthorized Access as a Computer Crime

Difficulty Level: Medium

  1. Describe counterfeiting software crimes.

Learning Objective: 9-2: Summarize the main categories of computer crime that

occur in businesses.

Cognitive Domain: Analysis

Answer Location: Software Crime as a Computer Crime

Difficulty Level: Medium

Essay

  1. Discuss the issues that complicate responding to cybercrime.

Learning Objective: 9-6: Describe the strategies for and problems of responding to cybercrime.

Cognitive Domain: Analysis

Answer Location: Problems Responding to Computer Crimes

Difficulty Level: Medium

  1. Choose one of the sectors of critical infrastructure and develop a discussion

about what the consequences and the costs of a cyber offense on that sector might be.

Learning Objective: 9-5: Analyze the costs of cybercrime to society.

Cognitive Domain: Analysis

Answer Location: Costs of Cybercrime

Difficulty Level: Medium

Document Information

Document Type:
DOCX
Chapter Number:
9
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 9 Crimes In The Cyber System
Author:
Brian K. Payne

Connected Book

Complete Test Bank | White Collar Crime 3e by Payne

By Brian K. Payne

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party