Court Express: Trivia Quiz On Court Document Retrieval

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By LOCHOA10
L
LOCHOA10
Community Contributor
Quizzes Created: 1 | Total Attempts: 902
Questions: 15 | Attempts: 904

SettingsSettingsSettings
Court Express: Trivia Quiz On Court Document Retrieval - Quiz

Welcome to the court express trivia quiz on court document retrieval. If you are looking to access documents you can’t get easily get on the internet you can get them from Courtxpress at a fee. Do you know the guidelines that a user must follow to enjoy this service? Take up the quiz below and get to learn more about it.


Questions and Answers
  • 1. 

    1. An FBI computer crime and security survey revealed that virus attacks continue to be the source of:

    • A.

      Financial loss

    • B.

      The greatest financial loss

    • C.

      Proprietary information

    • D.

      Intellectual property

    Correct Answer
    B. The greatest financial loss
    Explanation
    The given answer suggests that virus attacks are the main source of the greatest financial loss. This implies that out of all the mentioned options (financial loss, proprietary information, and intellectual property), virus attacks cause the most significant financial damage. This information could be derived from the FBI computer crime and security survey, which likely analyzed various cyber threats and their associated financial implications.

    Rate this question:

  • 2. 

    1. Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them is generally reffered to as:

    • A.

      Cybercrime

    • B.

      Cyber chips

    • C.

      Chipping

    • D.

      Wormholes

    Correct Answer
    A. Cybercrime
    Explanation
    Cybercrime refers to any illegal behavior that is carried out through electronic operations and specifically targets the security of computer systems and the data processed by them. This can include activities such as hacking, identity theft, online fraud, and spreading malware. Cybercriminals exploit vulnerabilities in computer networks and systems to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational damage. The term "cybercrime" encompasses a wide range of illegal activities conducted in the digital realm, highlighting the need for robust cybersecurity measures to protect against such threats.

    Rate this question:

  • 3. 

    1. Sophisticated criminals use _____________ to cover up their actions and hack into systems of unsuspected consumers.

    • A.

      Unsecured computer terminals

    • B.

      Unsecured computer systems

    • C.

      Unsecured Wi-Fi networks

    • D.

      Unsecured intranet systems

    Correct Answer
    C. Unsecured Wi-Fi networks
    Explanation
    Sophisticated criminals use unsecured Wi-Fi networks to cover up their actions and hack into systems of unsuspected consumers. Unsecured Wi-Fi networks provide an easy entry point for hackers as they can intercept data and gain unauthorized access to connected devices. By using these networks, criminals can remain anonymous and hide their activities, making it difficult to trace back to them. This allows them to exploit the vulnerabilities of unsuspecting consumers and gain unauthorized access to their systems.

    Rate this question:

  • 4. 

    1. Cybercrime falls into three categories; acomputer is a target of criminal activity; acomputer is n intregal part of the crime , and...

    • A.

      Option 2

    • B.

      The computer system is used to commit the crime

    • C.

      The computer is not related to the crime

    • D.

      The computer is an incidental part of the crime

    Correct Answer
    D. The computer is an incidental part of the crime
    Explanation
    In this context, the term "incidental" means that the computer is not the main focus or purpose of the crime, but it is still involved or used in some way. This suggests that the criminal activity may not directly target the computer system, but it is still utilized as a tool or medium to facilitate the crime.

    Rate this question:

  • 5. 

    1. In 2000, the FBI teamed the the U.S. Department of Justice and the national White Collar Center to establish the..

    • A.

      Internet / Cybercrime Network

    • B.

      Internet crime Complaint Center

    • C.

      Internet Crime Research Center

    • D.

      Internet Cybercrime Network

    Correct Answer
    B. Internet crime Complaint Center
    Explanation
    The correct answer is "Internet crime Complaint Center". In 2000, the FBI collaborated with the U.S. Department of Justice and the national White Collar Center to establish the Internet Crime Complaint Center. This center serves as a platform for individuals to report internet-related crimes, such as online fraud, identity theft, and cyber harassment. It also provides resources and assistance to law enforcement agencies in investigating and combating internet crimes.

    Rate this question:

  • 6. 

    1. Although, this crime is not new the Internet is making it one of the signature crimes of the digital era..

    • A.

      Fraud

    • B.

      Financial transaction fraud

    • C.

      Credit card fraud

    • D.

      Identity theft

    Correct Answer
    D. Identity theft
    Explanation
    Identity theft refers to the illegal acquisition and use of someone's personal information, such as their name, social security number, or credit card details, without their consent, usually for financial gain. The statement suggests that while identity theft has been a crime for some time, the internet has made it more prevalent and characteristic of the digital age. This is because the internet provides easy access to personal information and facilitates anonymous transactions, making it easier for criminals to steal identities and carry out fraudulent activities.

    Rate this question:

  • 7. 

    1. What law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes?

    • A.

      The identity theft and assumption deterrence act 1998

    • B.

      The identity theft and fraud statute of 1998

    • C.

      The identity theft computer act of 1999

    • D.

      The identity theft and fraudulent appropriations act 1998

    Correct Answer
    A. The identity theft and assumption deterrence act 1998
    Explanation
    The correct answer is the Identity Theft and Assumption Deterrence Act of 1998. This law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes.

    Rate this question:

  • 8. 

    The average victim of identity theft learns of the theft how many months after the theft?

    • A.

      Ten

    • B.

      Twelve

    • C.

      Fourteen

    • D.

      Three

    Correct Answer
    C. Fourteen
    Explanation
    The correct answer is Fourteen. This means that, on average, victims of identity theft discover the theft fourteen months after it has occurred. This suggests that identity theft can often go undetected for a significant period of time before the victim becomes aware of it. This delay in discovery can allow the thief to cause more damage and make it more difficult for the victim to recover their identity and financial security.

    Rate this question:

  • 9. 

    This technique in identity theft involves the sending of e-mail messages to online payment accounts to update their records with confidential information that is then used by the identity thieves:

    • A.

      Viruses

    • B.

      Worm holes

    • C.

      Phishing

    • D.

      Pooling

    Correct Answer
    C. Phishing
    Explanation
    Phishing is a technique used in identity theft where scammers send deceptive emails to online payment accounts, pretending to be a trusted entity like a bank or a popular website. The emails request the recipients to update their confidential information, such as passwords or credit card details, by clicking on a link provided in the email. However, the link leads to a fake website that collects the entered information, which is then used by the identity thieves for fraudulent activities.

    Rate this question:

  • 10. 

    When computer hackers attempt to shut down a network operation by overloading the system, it is referred to as:

    • A.

      Denial of service

    • B.

      Denial of entry

    • C.

      Log on denial

    • D.

      Denial of system activation

    Correct Answer
    A. Denial of service
    Explanation
    When computer hackers attempt to shut down a network operation by overloading the system, it is referred to as "Denial of service." This term describes the act of intentionally overwhelming a network or website with excessive traffic or requests, causing it to become inaccessible to legitimate users. This can be done through various means, such as flooding the network with a high volume of data or exploiting vulnerabilities in the system. The goal of a denial of service attack is to disrupt the normal functioning of the targeted network or system.

    Rate this question:

  • 11. 

    Another type of hacker commits DOS attacks, disssiminates spam, and defaces websites, believing they are carrying out civil disobedience and to call attention to an issue by their crime.  This type of hacker is called a/n:

    • A.

      Cyberism

    • B.

      Hacktivist

    • C.

      Attack-divas

    • D.

      Virtual attacks

    Correct Answer
    B. Hacktivist
    Explanation
    A hacktivist is a type of hacker who carries out activities such as DOS attacks, spam dissemination, and website defacement with the belief that they are engaging in civil disobedience and bringing attention to a particular issue. Unlike other hackers who may have purely malicious intentions, hacktivists aim to use their actions as a form of activism and protest in the digital realm. They often target organizations or individuals that they perceive as unethical or oppressive, using hacking as a means to voice their dissent and advocate for change.

    Rate this question:

  • 12. 

    One of the best methods to stop a virus by a file that arrives from the Internet is to:

    • A.

      Never turn the computer on unless prompted by a known source

    • B.

      Only use cable systems, not telephone systems

    • C.

      Not open the file in the first place

    • D.

      Save it first, then open it

    Correct Answer
    C. Not open the file in the first place
    Explanation
    The best method to stop a virus from a file that arrives from the Internet is to not open the file in the first place. Opening a file can activate any malicious code embedded within it, potentially infecting the computer with a virus. By refraining from opening suspicious files, the risk of virus infection is significantly reduced.

    Rate this question:

  • 13. 

    1. This interesting and very subliminal type of virus includes virus hoaxes and other types of chain letters, erroneous security alerts.  It can be used to sway, influence or deter your actions.  Even the military is researching its potential.

    • A.

      Hooks

    • B.

      Rubes

    • C.

      Memetic

    • D.

      Vulcan mind meld (VLM)

    Correct Answer
    C. Memetic
    Explanation
    Memetic is the correct answer because the given description mentions that this type of virus includes virus hoaxes and chain letters, which are examples of memes that spread rapidly through social networks. The description also states that this virus can be used to sway, influence, or deter actions, which aligns with the concept of memes affecting people's behavior and beliefs. The mention of the military researching its potential further supports the idea that memetic viruses have significant impact and are worth studying.

    Rate this question:

  • 14. 

    The target of idnetity thieves is often a consumer with poor credit because they will not notice a problem with their credit history.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because identity thieves do not solely target consumers with poor credit. In fact, they target individuals across the credit spectrum. Identity theft can affect anyone, regardless of their credit history. Thieves may use stolen identities to open new lines of credit, make fraudulent purchases, or commit other types of financial fraud. Therefore, it is important for all consumers to be vigilant and regularly monitor their credit history for any signs of fraudulent activity.

    Rate this question:

  • 15. 

    Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Computer hacking refers to the intentional and malicious act of infiltrating a computer system with the intention of achieving a specific objective. This could involve gaining unauthorized access to sensitive information, causing damage or disruption to the system, or using the compromised system for illegal activities. Therefore, the statement "Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose" is accurate and true.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 05, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 12, 2014
    Quiz Created by
    LOCHOA10
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.