Court Express: Trivia Quiz On Court Document Retrieval

15 Questions | Total Attempts: 631

SettingsSettingsSettings
Please wait...
Legal Quizzes & Trivia

Welcome to the court express trivia quiz on court document retrieval. If you are looking to access documents you can’t get easily get on the internet you can get them from Courtxpress at a fee. Do you know the guidelines that a user must follow to enjoy this service? Take up the quiz below and get to learn more about it.


Questions and Answers
  • 1. 
    1. An FBI computer crime and security survey revealed that virus attacks continue to be the source of:
    • A. 

      Financial loss

    • B. 

      The greatest financial loss

    • C. 

      Proprietary information

    • D. 

      Intellectual property

  • 2. 
    1. Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them is generally reffered to as:
    • A. 

      Cybercrime

    • B. 

      Cyber chips

    • C. 

      Chipping

    • D. 

      Wormholes

  • 3. 
    1. Sophisticated criminals use _____________ to cover up their actions and hack into systems of unsuspected consumers.
    • A. 

      Unsecured computer terminals

    • B. 

      Unsecured computer systems

    • C. 

      Unsecured Wi-Fi networks

    • D. 

      Unsecured intranet systems

  • 4. 
    1. Cybercrime falls into three categories; acomputer is a target of criminal activity; acomputer is n intregal part of the crime , and...
    • A. 

      Option 2

    • B. 

      The computer system is used to commit the crime

    • C. 

      The computer is not related to the crime

    • D. 

      The computer is an incidental part of the crime

  • 5. 
    1. In 2000, the FBI teamed the the U.S. Department of Justice and the national White Collar Center to establish the..
    • A. 

      Internet / Cybercrime Network

    • B. 

      Internet crime Complaint Center

    • C. 

      Internet Crime Research Center

    • D. 

      Internet Cybercrime Network

  • 6. 
    1. Although, this crime is not new the Internet is making it one of the signature crimes of the digital era..
    • A. 

      Fraud

    • B. 

      Financial transaction fraud

    • C. 

      Credit card fraud

    • D. 

      Identity theft

  • 7. 
    1. What law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes?
    • A. 

      The identity theft and assumption deterrence act 1998

    • B. 

      The identity theft and fraud statute of 1998

    • C. 

      The identity theft computer act of 1999

    • D. 

      The identity theft and fraudulent appropriations act 1998

  • 8. 
    The average victim of identity theft learns of the theft how many months after the theft?
    • A. 

      Ten

    • B. 

      Twelve

    • C. 

      Fourteen

    • D. 

      Three

  • 9. 
    This technique in identity theft involves the sending of e-mail messages to online payment accounts to update their records with confidential information that is then used by the identity thieves:
    • A. 

      Viruses

    • B. 

      Worm holes

    • C. 

      Phishing

    • D. 

      Pooling

  • 10. 
    When computer hackers attempt to shut down a network operation by overloading the system, it is referred to as:
    • A. 

      Denial of service

    • B. 

      Denial of entry

    • C. 

      Log on denial

    • D. 

      Denial of system activation

  • 11. 
    Another type of hacker commits DOS attacks, disssiminates spam, and defaces websites, believing they are carrying out civil disobedience and to call attention to an issue by their crime.  This type of hacker is called a/n:
    • A. 

      Cyberism

    • B. 

      Hacktivist

    • C. 

      Attack-divas

    • D. 

      Virtual attacks

  • 12. 
    One of the best methods to stop a virus by a file that arrives from the Internet is to:
    • A. 

      Never turn the computer on unless prompted by a known source

    • B. 

      Only use cable systems, not telephone systems

    • C. 

      Not open the file in the first place

    • D. 

      Save it first, then open it

  • 13. 
    1. This interesting and very subliminal type of virus includes virus hoaxes and other types of chain letters, erroneous security alerts.  It can be used to sway, influence or deter your actions.  Even the military is researching its potential.
    • A. 

      Hooks

    • B. 

      Rubes

    • C. 

      Memetic

    • D. 

      Vulcan mind meld (VLM)

  • 14. 
    The target of idnetity thieves is often a consumer with poor credit because they will not notice a problem with their credit history.
    • A. 

      True

    • B. 

      False

  • 15. 
    Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose.
    • A. 

      True

    • B. 

      False

Back to Top Back to top