BCJ3312 Final Examination

$34.99

BCJ3312 Final Examination

Description

BCJ3312 Final Examination

BCJ3312 Final Examination

  1. Criminal Justice and the World Wide Web 20204_BCJ3312_02_100
  2. Course Content
  3. Week Eight Materials
  4. Chapter Exam

   INSTRUCTIONS

      1. Description

        Final examination consisting of questions from throughout the semester. Students will have 120 minutes to answer 50 multiple choice questions. Once the examination is started then it must be completed.

      2. Timed Test
        This test has a time limit of 2 hours.
      3. Timer Setting
        This test will save and submit automatically when the time expires.
      4. Force Completion
        Once started, this test must be completed in one sitting. Do not leave the test before clicking Save and Submit.

    Click

Begin

    1.  to start: Final Examination. Click

Cancel

     to go back.

QUESTION 1

  1. The purpose of the Internet Crime Complaint Center (IC3) is to:
receive reports of Internet crime from the public
to serve as an investigative lead for victims of Internet-based crime
to refer victims to local investigators
none of the above

2 points   

QUESTION 2

  1. When an identity thief creates false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim’s personal information, it is called:​
a. ​phishing.
b. ​mousetrapping.
c. ​warez.
d. ​spamming.

2 points   

QUESTION 3

  1. The European Union is experimenting with having online social media companies remove hate speech under the provisions of their Terms of Service agreements.
True
False

2 points   

QUESTION 4

  1. Sexting has long been linked to the controversial legal issue of:
homicide
child pornography
statutory rape
none of the above are related to sexting

2 points   

QUESTION 5

  1. Loverspy is known as:​
a. ​​the high-profile Internet child pornographer.
b. ​​one of the most damaging cyberspying programs ever.
c. ​​a Trojan horse virus.
d. ​​the inventor of catfishing.

2 points   

QUESTION 6

  1. In the video concerning Patrick Macchione clips were shown that would best be described as:
online harassment
cyber bullying
online terrorism
cyber stalking

2 points   

QUESTION 7

  1. Following the Pope decision the courts now generally use a ______ standard when determining whether an otherwise osbcene work has erious literary of political value.
the reasonable person standard
the political person standard
the modern person standard
none of these are used by the courts.

2 points   

QUESTION 8

  1. The primary federal statute that regulates the abuse of computer systems is known as the:
Trade Secrets Act
Identity Theft and Assumption Act
CAN-SPAM Act
Computer Fraud and Abuse Act

2 points   

QUESTION 9

  1. One of the techniques the Avalanche group employed was the use of _________ to cripple competitors by flooding their websites with data requests; often without the owners of the compromised systems even realizing their machines were involved.
botnets
trojan ponies
bitcoin
none of the above

2 points   

QUESTION 10

  1. The history of pornography shows that the first example of pornographic art appears to have come from:
5200 BCE
79 AD
1929
1969

2 points   

QUESTION 11

  1. From early 2011, Ross Ulbricht, aka ______________, administered the hidden services website Silk Road as a massive illegal marketplace. This proved the viability of a large-scale TOR-based online marketplace for illegal goods.
The Princess Bride
Blackbeard the Pirate
Dread Pirate Roberts
The Bride of Chucky

2 points   

QUESTION 12

  1. The Internet Watch Foundation (IWF) uses the term _______ in places of child pornography.
Child sexual images
Pornography-related sexual abuse
Images of Pornographic Children
Child sexual abuse images

2 points   

QUESTION 13

  1. According to this week’s materials more than ____ states now have laws against revenge porn.
four
eight
twelve
fifty two

2 points   

QUESTION 14

  1. Theft through the illegal reproduction and distribution of movies, software, games, and music is estimated to cost U.S. industries _____ worldwide each year.​
a. ​$20 billion
b. ​more than $100 billion
c. ​$35 billion
d. ​$93 billion

2 points   

QUESTION 15

  1. The theft of intellectual property rights is referred to as:
digital theft
counterfeiting
trademark imaging
cyber-piracy

2 points   

QUESTION 16

  1. The author of chapter two in the text claims that the thinking on crime reduction must be incorporated into the mainstream of central government decision-making.
this statement is true
this statement is false
there is insufficent information in this answer to make a determination.

2 points   

QUESTION 17

  1. The _______ consists of areas of the web that are accessible only through the use of specialized browsers, such as a TOR browser, and utilize non-recognizable web addresses that are readable only by those browsers:
deep web
dark web
TOR web
Onion web

2 points   

QUESTION 18

  1. Macchione disputes his conviction to this day and claims that he was not a cyber stalker but instead he was guilty of:
typing under the influence
talking to an ex-girlfriend after being told to stop
communicating with a partner who was able to manipulate the police
typing messages to the wrong person

2 points   

QUESTION 19

  1. The Internet Watch Foundation (IWF) does not use the term child pornography because:
the term does not have an international meaning
the term acts to legitimize sexual abuse of children and not pornography
the term acts a means of helping individuals locate sexual abuse images
none of these are correct

2 points   

QUESTION 20

  1. Jobs and Wozniak were known to sell ______, which were illegal devices used to generate the tones telephones once used to switch long distance calls; these devices allowed user to make free long distance calls.
phone boxes
blue boxes
Woz box
Apple phones

2 points   

QUESTION 21

  1. Which of the following is true according to the week’s readings as the law relates to obscene materials.
The law protects obscene materials that minors willingly participate in
The law protects obscene materials that minors participate in if older than 14
The law protects all obscene materials
The law does not protect obscene materials as Free Speech

2 points   

QUESTION 22

  1. _______% of Americans are believed to use social media as a means of obtaining their news.
48
58
68
108

2 points   

QUESTION 23

  1. Child sexual abuse images is another term now used for:
Child obscenity
Child pornography
Child erotica
None of the above

2 points   

QUESTION 24

  1. The German law passed in 2017 forced Facebook, Twitter and Twitter remove the following within a certain time frame or receive civil fines:
defamatory/fake news
hate speech
“illegal content”
all of the above

2 points   

QUESTION 25

  1. In 2017 Germany passed a law that required Facebook and other social media websites responsible to remove hate speech within _____ hours of notification or face civil fines.
12 hours
24 hours
36 hours
48 hours

2 points   

QUESTION 26

  1. Cyberterrorism is a handy battlefield for terrorists because it can strike directly at what target that bombs will not affect?​
a. ​the energy infrastructure of an enemy
b. ​the defense infrastructure of an enemy
c. ​the economy of an enemy
d. ​the hearts and minds of the citizens of an enemy

2 points   

QUESTION 27

  1. Shoplistingis a type of ___ fraud that involves purchasing or finding legitimate retail receipts, stealing the products listed on the receipts, returning the items to the retailer for store credit or a gift card, and then selling the gift card on the Internet at a discount for quick cash.​
a. ​e-tailing
b. ​phishing
c. ​spamming
d. ​vishing

2 points   

QUESTION 28

  1. According to Daphne Keller users of social media in the United States may be unconstitutionally constrained in their posting because of European rules that require stricter speech regulation on social media platforms.
True
False

2 points   

QUESTION 29

  1. When a cybercriminal makes direct contact with you through phone calls, emails or even in person, and trick you into revealing information by earning your trust, they have engaged in:
Cyberstalking
Cyber Deception
Malvertising
Social Engineering

2 points   

QUESTION 30

  1. In the Miller decision the court ruled that a jury in an obscenity case should be held to a ____________ standard and not a ___________ standard.
national; local
statewide; international
local; rural
local; national

2 points   

QUESTION 31

  1. In the Saxe decision the Supreme Court ruled that a school district’s disciplinary code was unconstitutional because it was deemed to be:
overbroad and vague
cruel and unusual
vaguely cruel
none of the above

2 points   

QUESTION 32

  1. On May 19, 1998 members of the hacker group L0pht claimed before congress that security was so poor that they could shut down the Internet in:
15 minutes
30 minutes
45 minutes
60 minutes

2 points   

QUESTION 33

  1. According to the textbook the term cybercrime means nothing more than:
A crime that involves a networked group of computers
any harmful behavior that is somehow related to a computer
a behavior that involves complete avoidance of technology
none of the above are mentioned in the textbook

2 points   

QUESTION 34

  1. According to Standford Law Professor and former Google attorney Daphne Keller tech giants are facing increased pressure to clamp down on:
content
personal pages
software integration
none are discussed.

2 points   

QUESTION 35

  1. One Superior Court judge, when tasked with uncovering an answer to the question of technology, discovered some compelling results. After surveying jurors over several months of complex criminal trials, the judge found that ____________ responded positively to the inclusion of technology.
25 to 40%
41 to 60%
61 to 71%
72% or greater

2 points   

QUESTION 36

  1. Macchione met his victim, Pratt, or at least introduced himself as which of the following?
Fellow church member
Fellow student from college class
Former co-worker
Anonymous admirer.

2 points   

QUESTION 37

  1. “State of Surveillance” examines new technologies police departments are using to fight crime and the civil liberties concerns raised by these tools. Law enforcement agencies say that many of the technologies make it easier to solve and, in some cases, even prevent crime. But privacy advocates warn that expanded databases could become ________ that are increasingly populated with information about law-abiding citizens.
botnets
information nets
information dumps
dragnets

2 points   

QUESTION 38

  1. Which crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions?​
a. ​illegal touting
b. ​fraudulent offerings
c. ​deceptive priming
d. ​market manipulation

2 points   

QUESTION 39

  1. The Internet Crime Complaint Center (IC3) was established in _____ to receive reports of Internet crime from the public:
1998
2000
2008
2016

2 points   

QUESTION 40

  1. Child pornography is often defined as:
a form of pornography that is only legal in two countries.
a form of sexual expression that depicts adults who appear to be children engaged in sexually and non-sexually explicit conduct.
a form of sexual expression often involving the depiction of children engaged in sexually explicit conduct
none of the above best describe the term.

2 points   

QUESTION 41

  1. In the presentation on “How Eurpose Censors What Americans Say Online” an example is used showing how ____________ used terms of service and DMCA violation claims to shut down 4000 critics.
The Republican Party
The Democratic Party
The Church of Scientology
The Church of Jesus Christ of Latter Day Saints

2 points   

QUESTION 42

  1. Which type of offense involves the perpetrator carefully skimming small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection?​
a. ​financial fraud
b. ​salami fraud
c. ​information theft
d. ​software fraud

2 points   

QUESTION 43

  1. The first legislation to address the transportation, distribution or recieving of child pornography via computer was the:
Child Online Act
Child Protection and Obscenity Enforcement Act
The Protection Act
Internet Child Protection from Obscenity Act

2 points   

QUESTION 44

  1. _________ is the act of coercing an individual or organization to pay in exchange for gaining back access to stolen cyber assets.
cyber black mail
digital black mail
digital theft
digital extortion

2 points   

QUESTION 45

  1. When Pratt initially went to the police they seemd to dismiss her claims because she said that:
She had never met him in person
That he had never sent her a live video
That he did not know where she lived
That he had never threatened her

2 points   

QUESTION 46

  1. The use of wide area surveillance has been tested in which of the following cities?
Philidelphia
Baltimore
Dayton
all of the above

2 points   

QUESTION 47

  1. Which is accurate about cyberbullying?​
a. ​​All of the above are accurate regarding cyberbullying.
b. ​​Girls are just as likely as boys to be victims.
c. ​Traditional bullying is still more common than cyberbullying.​
d. ​Cyberbullying has been linked to low self-esteem and suicidal tendencies.

2 points   

QUESTION 48

  1. According to your assigned readings most telecom crime is addressed by ________, which creates a sense of isolation and fewer arrests and investigations.
law enforcement agencies
district attorney’s office
telecom companies themselves
government agencies

2 points   

QUESTION 49

  1. The _______ decision was decided by the Supreme Court and addressed determination of which standard was best for assessing whether obscene material contains serious literary, artistic or scientific value.
Illinois v. State
State v. Johnson
Ashcroft v. Coalition
Pope v. Illinois

2 points   

QUESTION 50

  1. ________ is the blending of hacking and activism.
hackertivism
hacktivism
hackervism
none of the above

v101020

BCJ3312 Final Examination