Computer Technology And The Internet

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By MrsQ
M
MrsQ
Community Contributor
Quizzes Created: 5 | Total Attempts: 3,269
| Attempts: 240 | Questions: 70
Please wait...
Question 1 / 70
0 %
0/100
Score 0/100
1. Computer forensics test results are repeatable when the same results are obtained when using the same methods in the same testing environment.

Explanation

The statement is true because computer forensics test results should be repeatable. This means that if the same methods are used in the same testing environment, the results should be consistent and reproducible. This is important in computer forensics as it ensures the reliability and validity of the findings. By being able to obtain the same results multiple times, it increases confidence in the accuracy of the forensic analysis and strengthens the overall credibility of the investigation.

Submit
Please wait...
About This Quiz
Internet Security Quizzes & Trivia

This quiz titled 'Computer Technology and the Internet' explores various aspects of cybercrime, including hacking, DDoS attacks, and computer worms. It assesses knowledge on how cybercrimes utilize technology... see moreand the Internet, aiming to enhance understanding of cybersecurity measures. see less

2. The Fourth Amendment provides everyone in the United States (e.g., citizens, non-citizens, illegal immigrants, foreign nationals visiting the United States for work or education) with the right to be free from unreasonable searches and seizures.

Explanation

The Fourth Amendment of the United States Constitution guarantees protection against unreasonable searches and seizures for all individuals within the country, regardless of their citizenship or immigration status. This means that everyone, including citizens, non-citizens, illegal immigrants, and foreign nationals visiting for work or education, has the right to be free from searches and seizures that are not based on probable cause or a valid warrant. Therefore, the statement is true.

Submit
3. Cyberharassment is a crime that occurs when an individual uses the internet, email, mobile phones, fixed telephony or other forms of communications to intentionally irritate, attack, alarm or otherwise bother another individual.

Explanation

Cyberharassment is indeed a crime that involves using various forms of communication, such as the internet, email, mobile phones, or fixed telephony, to intentionally irritate, attack, alarm, or bother another individual. This can include actions like sending threatening messages, spreading false information, or posting derogatory comments online. As such, the statement "Cyberharassment is a crime that occurs when an individual uses the internet, email, mobile phones, fixed telephony or other forms of communications to intentionally irritate, attack, alarm or otherwise bother another individual" is true.

Submit
4. Online auction frauds often mimic real-life auction frauds.

Explanation

Online auction frauds often mimic real-life auction frauds because scammers use similar tactics to deceive and defraud unsuspecting victims. They may create fake listings, manipulate bidding processes, or misrepresent the condition or authenticity of items, just like in real-life auctions. This similarity allows scammers to exploit the trust and excitement associated with auctions, making it easier for them to deceive and steal from individuals participating in online auctions.

Submit
5. Embezzlement occurs when an employee misappropriates the funds entrusted to him or her by the company.

Explanation

Embezzlement refers to the act of an employee unlawfully taking or misusing funds that have been entrusted to them by the company. This can involve stealing money, manipulating financial records, or diverting funds for personal gain. Therefore, the statement "Embezzlement occurs when an employee misappropriates the funds entrusted to him or her by the company" is true.

Submit
6. An example of telecommunications fraud is phone phreaking.

Explanation

Phone phreaking refers to the act of manipulating telecommunication systems to make free or unauthorized calls. It involves exploiting vulnerabilities in the system to bypass billing mechanisms. This is considered a form of telecommunications fraud because it involves unauthorized access and misuse of telecommunication services. Therefore, the statement that phone phreaking is an example of telecommunications fraud is true.

Submit
7. Routine border searches do not require reasonable suspicion, probable cause, or a warrant to be conducted

Explanation

Routine border searches do not require reasonable suspicion, probable cause, or a warrant to be conducted because they fall under the "border search exception" to the Fourth Amendment's warrant requirement. The government has the authority to conduct searches at the border to protect national security and prevent the entry of contraband or illegal goods. These searches are considered necessary and routine for the functioning of border control and are therefore exempt from the usual requirements of reasonable suspicion, probable cause, or a warrant.

Submit
8. A cyberbully usually poses as the victim as a form of retaliation for something the victim has done (whether real or perceived) to the cyberbully.

Explanation

A cyberbully often pretends to be the victim as a way to seek revenge for something they believe the victim has done to them. This can be either a real or perceived action. By posing as the victim, the cyberbully aims to further harm and intimidate the actual victim. This behavior is common in cyberbullying cases, where individuals use deception to target and harass others online.

Submit
9. The Taxpayer Browsing Protection Act 1997 was passed to criminalize federal and state employees' unauthorized browsing of taxpayer information.

Explanation

The Taxpayer Browsing Protection Act 1997 was enacted to make it illegal for federal and state employees to access taxpayer information without authorization. This legislation aims to protect the privacy and confidentiality of taxpayer data, ensuring that only authorized individuals have access to such sensitive information. By criminalizing unauthorized browsing, the act serves as a deterrent and reinforces the importance of maintaining the security of taxpayer information. Therefore, the given answer, "True," is correct.

Submit
10. For an AMBER alert to be issued, the abducted child must be 17 years old or older.

Explanation

An AMBER alert is not limited to children who are 17 years old or older. In fact, AMBER alerts are specifically designed to be issued for children who are 17 years old or younger and believed to be in immediate danger of abduction. Therefore, the correct answer is False.

Submit
11. The most common hacking technique is ___________________.

Explanation

The most common hacking technique is password cracking. This involves attempting to gain unauthorized access to a system or account by guessing or cracking the password. This technique is commonly used because many individuals use weak or easily guessable passwords, making it easier for hackers to gain access. Additionally, there are various tools and methods available to hackers that can assist in cracking passwords, further contributing to its prevalence as a hacking technique.

Submit
12. The computer is used as a tool to commit which of the following crimes?

Explanation

The computer can be used as a tool to commit all of the mentioned crimes. Copyright infringement involves illegally copying or distributing copyrighted material. Embezzlement refers to the fraudulent appropriation of funds or assets entrusted to someone's care. Cyberharassment involves using electronic communication to harass, threaten, or intimidate someone. Phishing is a form of online scam where individuals are tricked into revealing sensitive information. Thus, all of these crimes can be facilitated or carried out using a computer.

Submit
13. _____________ schemes involve soliciting investors to contribute to investment opportunities that promise high returns for little to no risk.  The money provided by new investors is used to pay existing investors. The money provided by new investors is used to pay existing investors, but none of the money that an investor provides is actually invested anywhere.

Explanation

A Ponzi scheme involves soliciting investors to contribute to investment opportunities that promise high returns for little to no risk. The money provided by new investors is used to pay existing investors, but none of the money that an investor provides is actually invested anywhere. This creates a cycle of using new investors' funds to pay off previous investors, giving the illusion of legitimate returns. However, the scheme eventually collapses when there are not enough new investors to sustain the payouts, leading to significant financial losses for those involved.

Submit
14. Criminals can steal a person's identity by

Explanation

Criminals can steal a person's identity by hacking into a computer and obtaining the individual's private data. This can include accessing personal information such as social security numbers, bank account details, and passwords. Additionally, they can steal a person's identity by stealing their mail, which may contain sensitive documents or personal information. Lastly, criminals can bribe an employee who has access to the victim's personal data, allowing them to gain unauthorized access to the information. Therefore, all of the mentioned methods can be used by criminals to steal a person's identity.

Submit
15. __________ are spoken words in a conversation or the words written in a message.

Explanation

Content data refers to the actual words spoken or written in a conversation or message. It includes the information, ideas, opinions, or any other form of communication conveyed through language. This can include text messages, emails, phone conversations, or any other form of communication where words are used to convey meaning. Non-content data, on the other hand, refers to metadata or information about the communication such as the time, date, duration, or participants involved. Traffic data refers to the information about the transmission of the communication, and location data refers to the geographical location associated with the communication.

Submit
16. A __________ does not need user activity to make copies of itself and spread.

Explanation

A worm is a type of malicious software that can replicate itself without any user interaction or activity. Unlike viruses and Trojan horses, which often require user action to spread, worms are capable of independently spreading across a network or system. Therefore, a worm does not need user activity to make copies of itself and spread.

Submit
17. The victims of work at home scams are usually

Explanation

The correct answer is "all of the above." The victims of work at home scams can include stay-at-home mothers, disabled individuals, persons who are unemployed, and individuals that are desperately seeking some form of income. This is because scammers often target vulnerable individuals who are looking for ways to make money from the comfort of their own homes.

Submit
18. Who can consent to a search if they have the authority over the property?

Explanation

All of the above individuals can consent to a search if they have authority over the property. This means that if any of these individuals have ownership or control over the property, they can give consent for a search to be conducted by law enforcement. It is important to note that consent must be given voluntarily and knowingly, without any coercion or duress.

Submit
19. _______________ is used to track users' online activities and deliver targeted pop-up ads to users.

Explanation

Adware is used to track users' online activities and deliver targeted pop-up ads to users. Unlike spyware, which is designed to gather information without the user's knowledge, adware is typically installed with the user's consent, often bundled with free software. Adware is not as harmful as a computer virus or a worm, as its main purpose is to display advertisements rather than causing damage to the user's system. Therefore, the correct answer is Adware.

Submit
20. Public investigations are conducted by

Explanation

Public investigations can be conducted by government agencies and law enforcement agencies. Government agencies have the authority and resources to investigate various matters of public interest, such as corruption, fraud, or safety violations. Law enforcement agencies, on the other hand, are responsible for investigating criminal activities and enforcing the law. Both these entities play a crucial role in conducting public investigations to ensure the safety, security, and well-being of the society. Therefore, the correct answer is "both a and b."

Submit
21. The Fourth Amendment applies to searches conducted by private individuals, businesses, and nongovernmental agencies.

Explanation

The Fourth Amendment only applies to searches conducted by government entities, such as law enforcement agencies. Private individuals, businesses, and nongovernmental agencies are not bound by the Fourth Amendment and therefore are not subject to its restrictions on searches and seizures.

Submit
22. An employee has a reasonable expectation of privacy in the contents of his or her locker at a workplace if

Explanation

If the lock on the locker was provided by the employee, it suggests that the employee took the initiative to secure their personal belongings and maintain privacy. This implies that the employee intended for the contents of the locker to be private and not accessible to others. Therefore, the employee can reasonably expect privacy in the contents of their locker.

Submit
23. Cyberterrorists may seek unauthorized access to critical infrastructure computer systems to:

Explanation

Cyberterrorists may seek unauthorized access to critical infrastructure computer systems in order to block communications systems, disrupt air traffic control, shut down electric utilities, and contaminate water. This means that they can cause significant damage and disruption to various essential services, posing a serious threat to public safety and national security.

Submit
24. Which of the following is malware?

Explanation

Both a virus and spyware are considered malware. A virus is a type of malicious software that can replicate itself and spread to other computers, causing harm to the system. Spyware, on the other hand, is designed to secretly gather information about a user's activities without their consent. Both of these forms of malware can cause significant damage to a computer system and compromise user privacy and security. Therefore, the correct answer is "both a and b".

Submit
25. __________ are known for posing as legitimate companies and government agencies and using misleading or disguised hyperlinks and fake e-mail return addresses to trick Internet users into revealing their personal information.

Explanation

Phishers are individuals or groups who pretend to be reputable organizations or government agencies in order to deceive internet users into divulging their personal information. They often use misleading hyperlinks and fake email return addresses to trick people. This allows them to collect sensitive data such as passwords, credit card numbers, and social security numbers. Phishing is a form of cybercrime that can lead to identity theft and financial loss for unsuspecting victims.

Submit
26. __________ is any kind of writing, video, or sound recording material whose authenticity needs to be established if introduced as evidence in a court of law.

Explanation

A documentary is any kind of writing, video, or sound recording material whose authenticity needs to be established if introduced as evidence in a court of law. This means that if a documentary is presented as evidence in a court case, it must be proven to be genuine and accurate in order for it to be considered valid. This is because documentaries can be edited or manipulated to present a particular viewpoint or narrative, so it is important to verify their authenticity before accepting them as evidence.

Submit
27. The __________ amended existing legislation to remove any unnecessary burdens in criminal investigations.

Explanation

The USA Patriot Act of 2001 amended existing legislation to remove any unnecessary burdens in criminal investigations. This act was passed in response to the September 11th terrorist attacks and aimed to enhance the ability of law enforcement agencies to detect and prevent terrorism. It expanded the powers of the government to conduct surveillance, gather intelligence, and share information among different agencies. The act also allowed for easier access to electronic communications and records, making it easier for law enforcement to gather evidence in criminal investigations.

Submit
28. To be valid, the warrant must specifically state ______________.

Explanation

The correct answer is "all of the above." In order for a warrant to be valid, it must specifically state the crime or crimes being investigated, the location to be searched, and the items to be seized. All of these elements are necessary to ensure that the search and seizure are conducted within the boundaries of the law and protect individuals' rights.

Submit
29. __________ occurs when an offender uses a victim's identity to obtain money, goods, or services.

Explanation

Financial identity theft occurs when an offender uses a victim's identity to obtain money, goods, or services. This can include stealing credit card information, accessing bank accounts, or applying for loans or credit in the victim's name. The goal of the offender is to financially benefit from the victim's identity without their knowledge or consent. This type of identity theft can have serious financial consequences for the victim, including damaged credit, loss of funds, and difficulty resolving fraudulent charges.

Submit
30. Traffic data includes

Explanation

The correct answer is "all of the above" because traffic data in the context of telecommunication refers to the information collected and analyzed about telephone calls, including telephone numbers (both originating and receiving), customer information (such as name and address), and dialed numbers (the numbers dialed by the caller). Therefore, all of these elements are included in traffic data.

Submit
31. Which of the following crimes would not have been possible without the use of computer technology and the Internet?

Explanation

Both hacking and malware would not have been possible without the use of computer technology and the Internet. Hacking refers to unauthorized access to computer systems, networks, or data, which relies on computer technology and the Internet to breach security measures. Similarly, malware, which includes malicious software such as viruses, worms, or ransomware, is designed to exploit vulnerabilities in computer systems and spread through the Internet. Therefore, both crimes require the use of computer technology and the Internet to carry out their illegal activities.

Submit
32. To protect yourself from becoming a victim of identity theft, you should take the following precautions:

Explanation

To protect yourself from becoming a victim of identity theft, it is recommended to take multiple precautions. Obtaining a credit report and checking your credit score helps in identifying any suspicious activity related to your credit accounts. Checking bank accounts frequently for unusual activity allows you to detect any unauthorized transactions or signs of identity theft. Shredding documents containing personal information before discarding them ensures that sensitive information cannot be accessed by others. Therefore, taking both these precautions (b and c) is necessary to protect yourself from identity theft. Additionally, since option (d) includes both these precautions, it is the correct answer.

Submit
33. The standard of proof in a civil trial is

Explanation

The standard of proof in a civil trial is preponderance of evidence. This means that the party bringing the claim must prove that it is more likely than not that their version of the facts is true. This standard is lower than "beyond a reasonable doubt," which is the standard of proof in a criminal trial. "Clear and convincing evidence" is a higher standard of proof than preponderance of evidence, but it is not the standard used in a civil trial. Therefore, the correct answer is preponderance of evidence.

Submit
34. The Patriot Act made it harder on law enforcement agencies to obtain the personal information of Internet users.

Explanation

The Patriot Act actually made it easier for law enforcement agencies to obtain the personal information of Internet users. This act expanded the powers of the government to conduct surveillance, collect data, and access personal information in order to prevent terrorism. It allowed for increased monitoring of electronic communications and the collection of data from internet service providers without the need for a warrant. Therefore, the correct answer is False.

Submit
35. __________.  With this type of identity theft, an offender poses as the victim to commit a crime or claims to be the victim when apprehended for a crime.

Explanation

Criminal identity theft occurs when an offender pretends to be the victim in order to commit a crime or claims to be the victim when caught for a crime. This type of identity theft involves using someone else's identity to avoid being held accountable for one's own actions or to gain access to certain privileges or resources. It can have serious consequences for the victim, as they may be wrongly accused or have their reputation tarnished due to the criminal activities committed under their name.

Submit
36. A ____________ scheme requires new investors to become involved marketing a product and recruiting other investors. The fees provided by new entrants are used to pay those that previously entered this scheme.

Explanation

A pyramid scheme is a type of investment scheme where new investors are recruited to market a product and bring in more investors. The fees paid by these new entrants are then used to pay those who joined earlier in the scheme. This creates a hierarchical structure resembling a pyramid, where the people at the top benefit the most, while those at the bottom struggle to find new investors and may end up losing their money.

Submit
37. Eyewitness testimony is an example of

Explanation

Eyewitness testimony is considered direct evidence because it is based on the firsthand observations and experiences of an individual who directly witnessed a particular event or incident. This type of evidence is often given high credibility in legal proceedings as it is assumed that the witness's firsthand account provides accurate and reliable information about what occurred. Unlike circumstantial evidence, which relies on inferences and indirect observations, direct evidence directly supports or proves a fact without the need for additional reasoning or interpretation. Therefore, eyewitness testimony is classified as direct evidence.

Submit
38. Trade secrets are designed to protect individuals' inventions.

Explanation

Trade secrets are not designed to protect individuals' inventions. Trade secrets protect confidential and valuable business information, such as formulas, processes, customer lists, and marketing strategies, that give a company a competitive advantage. Inventions, on the other hand, are typically protected by patents, which grant exclusive rights to the inventor for a limited period of time. Therefore, the statement that trade secrets are designed to protect individuals' inventions is false.

Submit
39. Hacking is cracking with criminal intent

Explanation

It's the other way around. Cracking is hacking with criminal intent

Submit
40. Factors that may affect the feasibility of on-site and off-site computer searches include

Explanation

The feasibility of on-site and off-site computer searches can be affected by various factors. These factors include the configuration of the software and hardware, which refers to the compatibility and capability of the computer system. The overall size and complexity of the computer system also play a role, as larger and more complex systems may require more time and resources for the search. Additionally, the technical demands of the search, such as the specific requirements and constraints, can impact the feasibility. Therefore, all of the above factors can affect the feasibility of on-site and off-site computer searches.

Submit
41. The __________ states that forensic tools, techniques, procedures and evidence are admissible in court only if they have a "general acceptance" within the scientific community.

Explanation

The Frye standard states that forensic tools, techniques, procedures, and evidence are admissible in court only if they have a "general acceptance" within the scientific community. This means that the evidence or technique must be widely accepted and recognized by experts in the field in order to be admissible in court. The Frye standard is often used as a guideline for determining the admissibility of scientific evidence in many jurisdictions.

Submit
42. Certain exceptions may justify the search of a computer without a warrant, including __________.

Explanation

All of the options listed in the answer can justify the search of a computer without a warrant under certain exceptions. Consent allows a person to voluntarily allow the search of their computer. A search incident to arrest allows law enforcement to search a person's computer if they have been lawfully arrested. Plain view allows law enforcement to search a computer if they see evidence of a crime in plain sight. Border searches allow customs and border patrol agents to search electronic devices at the border without a warrant. Therefore, all of these exceptions can justify a warrantless search of a computer.

Submit
43. The term used to describe a reproduction of someone else's recording marketed under a different label is ___________.

Explanation

A reproduction of someone else's recording marketed under a different label is commonly referred to as a bootleg. This term is used to describe unauthorized copies of recordings that are often sold illegally or without the permission of the original artist or copyright holder. Bootlegs are typically made without the knowledge or involvement of the original recording company, and they are known for their poor quality and lack of official packaging or labeling.

Submit
44. The Sarbanes-Oxley Act of 2002

Explanation

The correct answer is "all of the above". The Sarbanes-Oxley Act of 2002 encompasses all of the mentioned points. It defines the types of records that must be recorded and for how long, deals with falsification and destruction of data, holds executives directly responsible for problems, and also defines e-mails as corporate documents. This act was enacted to improve corporate governance and enhance financial transparency and accountability.

Submit
45. The _______________ scheme occurs when individuals falsely advertise favorable and misleading representations of stock to convince people to buy a specific stock.

Explanation

The correct answer is "pump and dump." This scheme involves individuals promoting a stock with false and misleading information to manipulate its price and convince others to buy it. Once the price is artificially inflated, those who initiated the scheme sell their shares at a profit, causing the stock to plummet and leaving other investors with significant losses.

Submit
46. ______________ are designed to protect commercial identities or brands.

Explanation

Trademarks are designed to protect commercial identities or brands. A trademark is a distinctive symbol, word, phrase, design, or combination thereof that identifies and distinguishes the source of goods or services from those of others. It helps consumers identify and differentiate products or services in the marketplace. By registering a trademark, a business can legally prevent others from using a similar mark that could confuse consumers and harm the brand's reputation. Therefore, trademarks play a crucial role in safeguarding commercial identities and brands.

Submit
47. __________  was implemented to reduce the chilling effect that searches and seizures had on publishers.

Explanation

The Privacy Protection Act of 1980 was implemented to reduce the chilling effect that searches and seizures had on publishers. This act provides protections for journalists and publishers from unreasonable searches and seizures of their materials, such as notes, photographs, and other documents. It establishes procedures that law enforcement must follow when seeking to obtain these materials, including obtaining a warrant and demonstrating a compelling interest in the information. By providing these protections, the act aims to encourage freedom of the press and prevent the suppression of information.

Submit
48. __________ occur when a perpetrator seeks to gain control over multiple computers and then uses these computers to launch an attack against a specific target or targets.

Explanation

Distributed Denial of Service (DDoS) attacks occur when a perpetrator gains control over multiple computers and then uses them to launch an attack against a specific target or targets. In a DDoS attack, the attacker overwhelms the target's network or website with a flood of traffic, making it inaccessible to legitimate users. Unlike a regular Denial of Service (DoS) attack, which is launched from a single source, a DDoS attack involves multiple sources, making it more difficult to mitigate and trace back to the attacker.

Submit
49. ______________ occurs when a seller takes on various digital identities by opening up several email accounts and bids on his or her own items multiple times to prompt genuine bidders to provide a much higher bid for an item than they would have done otherwise.

Explanation

Shill bidding occurs when a seller creates multiple email accounts and bids on their own items to deceive genuine bidders into placing higher bids. This manipulative tactic aims to artificially increase the price of an item, leading to higher profits for the seller.

Submit
50. The four distinct steps in the computer forensics process are as follows:

Explanation

The correct answer is acquisition, identification, evaluation, and presentation. In computer forensics, the first step is acquiring the evidence, which involves collecting and preserving data from various sources. The next step is identification, where the relevant evidence is identified and isolated. Evaluation is the third step, where the collected evidence is analyzed and examined to draw conclusions or make inferences. Finally, the evidence is presented in a clear and organized manner to support the findings. This process ensures that the evidence is handled properly and the conclusions are based on sound analysis.

Submit
51. Some crimes that fall under the personal crime category include:

Explanation

Note: While "both a and c" is the answer the professor is looking for, he will also accept "none of the above" as death is not a crime (murder is, but not death) and cyberbullying is not listed as falling under the personal crime category according to chapter 5.

Submit
52. __________ is based on targeted surveillance and affects only a limited number of individuals during specific periods of time.

Explanation

Data preservation is the correct answer because it involves the targeted surveillance of a limited number of individuals during specific periods of time. Data preservation refers to the process of retaining and protecting data for future use or reference, typically in legal or investigative contexts. It focuses on preserving specific data related to a particular case or investigation, rather than retaining all data indiscriminately. This targeted approach ensures that only relevant information is retained while minimizing the impact on the privacy of individuals not involved in the investigation.

Submit
53. __________ is a type of scam in which the offender creates a Web site that looks identical to an authentic Web site.  However, the mirror Web site carries a malicious payload

Explanation

Pharmers are a type of scam where the offender creates a fake website that appears to be a legitimate website. These mirror websites are designed to deceive users into providing personal information or downloading malicious software unknowingly. The term "pharming" is derived from "phishing" and "farming," indicating the cultivation of fake websites to harvest sensitive data from unsuspecting victims. Unlike phishing, which relies on tricking users into clicking on a malicious link, pharming redirects users to fraudulent websites without their knowledge or consent.

Submit
54. The No Electronic Theft Act 1997 makes it a criminal offense to use a camcorder or other similar recording device to record a movie playing in a movie theater.

Explanation

It was the Family Entertainment and Copyright Act of 2005

Submit
55. Computer forensics investigations focus on violations of

Explanation

Computer forensics investigations focus on violations of civil, criminal, and administrative laws. This means that they are conducted to gather evidence and analyze digital data for a wide range of purposes, including resolving civil disputes, investigating criminal activities, and ensuring compliance with administrative regulations. Therefore, the correct answer is "all of the above."

Submit
56. Investigations of administrative law violations can occur through the use of

Explanation

All of the above options (inspections, searches and seizures, subpoenas) can be used in investigations of administrative law violations. Inspections involve the examination and evaluation of a person or entity's compliance with regulations. Searches and seizures refer to the process of searching and confiscating evidence related to the violation. Subpoenas are legal orders that require individuals to provide information or testify in a legal proceeding. Therefore, all these methods can be utilized to investigate and address administrative law violations.

Submit
57. With the __________ exception, an investigator can seize evidence without a search warrant if the destruction of evidence is imminent.

Explanation

Exigent circumstances refers to situations where there is an urgent need for action or intervention. In the context of this question, it means that an investigator can seize evidence without a search warrant if there is an immediate threat of the evidence being destroyed. This exception allows law enforcement to act quickly and prevent the destruction of evidence that could be crucial to an investigation. The other options, such as the plain view doctrine, border search doctrine, and open fields, do not specifically address the issue of imminent destruction of evidence.

Submit
58. To be considered a cybercrime, computers must be

Explanation

To be considered a cybercrime, computers must be both the target of the crime and the tool used to commit the crime. This means that the crime is specifically directed towards the computer system or its data, and the computer is also used as a means to carry out the illegal activity. The other options, such as computers being an incidental aspect to the crime or all of the above, do not fully capture the essential criteria for classifying an offense as a cybercrime.

Submit
59. Trade secrets are protected under the Trademark Counterfeiting Act 1984.

Explanation

The given statement is incorrect. Trade secrets are not protected under the Trademark Counterfeiting Act 1984. Trade secrets are protected under a separate legal framework, such as the Uniform Trade Secrets Act or the Economic Espionage Act. The Trademark Counterfeiting Act 1984 primarily focuses on protecting trademarks from counterfeiting and infringement.

Submit
60. In a Nigerian scam

Explanation

The correct answer is "all of the above" because all three statements mentioned in the options are common tactics used in Nigerian scams. Victims are often approached with the promise of an inheritance from a long-lost relative, asked to deposit money into the scammer's personal account under the guise of government or banking officials, or informed that they have won a monetary award. These scams rely on the victim's greed or desperation to trick them into sending money or personal information to the fraudsters.

Submit
61. Shill bidding occurs when some bidders are lured off of legitimate auction websites by individuals claiming to offer the auctioned item at a lower cost.

Explanation

Shill bidding does not occur when bidders are lured off of legitimate auction websites by individuals claiming to offer the auctioned item at a lower cost. Shill bidding refers to when the seller or their associates place fake bids on their own items to drive up the price.

Submit
62. Computer hijacking occurs when an individual takes control over a computer (or computers) with a ____________.

Explanation

Computer hijacking occurs when an individual takes control over a computer (or computers) with the help of bot code. Bot code refers to malicious software that enables hackers to remotely control a compromised computer without the user's knowledge or consent. This allows them to carry out various illegal activities, such as stealing sensitive information, launching cyber-attacks, or using the hijacked computer as part of a larger network of infected machines (botnet) for further malicious purposes.

Submit
63. __________ consists of data about a communication.

Explanation

Traffic data refers to the information about a communication, such as the source and destination addresses, timestamps, and the amount of data transferred. It does not include the actual content of the communication or the location data. Therefore, the correct answer is traffic data.

Submit
64. The __________ is designed to protect children from exposure to indecent material.

Explanation

The Communications Decency Act of 1996 is designed to protect children from exposure to indecent material. This act was passed in order to regulate and control the content that is available on the internet, particularly when it comes to protecting minors from inappropriate or harmful material. It includes provisions that make it illegal to knowingly transmit or display indecent material in a manner that is accessible to minors. By implementing this act, the government aims to create a safer online environment for children and prevent them from being exposed to explicit or harmful content.

Submit
65. Which of the following describe cybercrime?

Explanation

Cybercrime is described as both a and b, meaning that it helps perpetrators expend less effort than committing traditional crime and it is committed on a far broader scale than traditional crime. This means that cybercriminals can carry out illegal activities more easily and reach a larger number of potential victims compared to traditional criminals.

Submit
66. Hacking occurs when an individual

Explanation

The correct answer is "gains unauthorized access to a system." Hacking refers to the act of gaining unauthorized access to a computer system. This can be done with the intention of committing various crimes, such as destroying information, sabotaging a computer, or disrupting a computer network. Therefore, all of the given options are correct as they describe different actions that can be taken after gaining unauthorized access to a system.

Submit
67. The Children's Online Privacy Protection Act of 1998 controls the dissemination of information to children.

Explanation

The Children's Online Privacy Protection Act of 1998 actually focuses on the collection and protection of personal information from children under the age of 13, rather than controlling the dissemination of information to children. The act requires websites to obtain parental consent before collecting any personal information from children, and also sets guidelines for the security and privacy of such information. Therefore, the statement that the act controls the dissemination of information to children is false.

Submit
68. Certain exceptions to the exclusionary rule include __________.

Explanation

Both the good faith exception and the inevitable discovery exception are certain exceptions to the exclusionary rule. The good faith exception allows evidence to be admissible if it was obtained by law enforcement officers who believed they were acting within the law, even if the search warrant was later found to be invalid. The inevitable discovery exception allows evidence to be admissible if it would have been inevitably discovered by lawful means. Therefore, the correct answer is both a and b.

Submit
69. Under the Fourth Amendment, search warrants must

Explanation

Under the Fourth Amendment, search warrants must be supported by probable cause and have the objects of the search described with sufficient particularity. This means that before conducting a search, law enforcement must have a reasonable belief that a crime has been committed and that the items or evidence being sought are connected to that crime. Additionally, the warrant must specify the location to be searched and the items to be seized in order to prevent general searches and protect individuals' privacy rights. Therefore, the correct answer is both a and b.

Submit
70. The Digital Millennium Copyright Act 1998 made it a criminal offense to distribute or reproduce copies of copyrighted works without authorization, regardless of whether or not the individual engaged in such activities for profit.

Explanation

It was the No Electronic Theft Act

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 25, 2014
    Quiz Created by
    MrsQ
Cancel
  • All
    All (70)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Computer forensics test results are repeatable when the same results...
The Fourth Amendment provides everyone in the United States (e.g.,...
Cyberharassment is a crime that occurs when an individual uses the...
Online auction frauds often mimic real-life auction frauds.
Embezzlement occurs when an employee misappropriates the funds...
An example of telecommunications fraud is phone phreaking.
Routine border searches do not require reasonable suspicion, probable...
A cyberbully usually poses as the victim as a form of retaliation for...
The Taxpayer Browsing Protection Act 1997 was passed to criminalize...
For an AMBER alert to be issued, the abducted child must be 17 years...
The most common hacking technique is ___________________.
The computer is used as a tool to commit which of the following...
_____________ schemes involve soliciting investors to contribute to...
Criminals can steal a person's identity by
__________ are spoken words in a conversation or the words written in...
A __________ does not need user activity to make copies of itself and...
The victims of work at home scams are usually
Who can consent to a search if they have the authority over the...
_______________ is used to track users' online activities and deliver...
Public investigations are conducted by
The Fourth Amendment applies to searches conducted by private...
An employee has a reasonable expectation of privacy in the contents of...
Cyberterrorists may seek unauthorized access to critical...
Which of the following is malware?
__________ are known for posing as legitimate companies and government...
__________ is any kind of writing, video, or sound recording material...
The __________ amended existing legislation to remove any unnecessary...
To be valid, the warrant must specifically state ______________.
__________ occurs when an offender uses a victim's identity to...
Traffic data includes
Which of the following crimes would not have been possible without the...
To protect yourself from becoming a victim of identity theft, you...
The standard of proof in a civil trial is
The Patriot Act made it harder on law enforcement agencies to obtain...
__________.  With this type of identity theft, an offender poses...
A ____________ scheme requires new investors to become involved...
Eyewitness testimony is an example of
Trade secrets are designed to protect individuals' inventions.
Hacking is cracking with criminal intent
Factors that may affect the feasibility of on-site and off-site...
The __________ states that forensic tools, techniques, procedures and...
Certain exceptions may justify the search of a computer without a...
The term used to describe a reproduction of someone else's recording...
The Sarbanes-Oxley Act of 2002
The _______________ scheme occurs when individuals falsely advertise...
______________ are designed to protect commercial identities or...
__________  was implemented to reduce the chilling effect that...
__________ occur when a perpetrator seeks to gain control over...
______________ occurs when a seller takes on various digital...
The four distinct steps in the computer forensics process are as...
Some crimes that fall under the personal crime category include:
__________ is based on targeted surveillance and affects only a...
__________ is a type of scam in which the offender creates a Web site...
The No Electronic Theft Act 1997 makes it a criminal offense to use a...
Computer forensics investigations focus on violations of
Investigations of administrative law violations can occur through the...
With the __________ exception, an investigator can seize evidence...
To be considered a cybercrime, computers must be
Trade secrets are protected under the Trademark Counterfeiting Act...
In a Nigerian scam
Shill bidding occurs when some bidders are lured off of legitimate...
Computer hijacking occurs when an individual takes control over a...
__________ consists of data about a communication.
The __________ is designed to protect children from exposure to...
Which of the following describe cybercrime?
Hacking occurs when an individual
The Children's Online Privacy Protection Act of 1998 controls the...
Certain exceptions to the exclusionary rule include __________.
Under the Fourth Amendment, search warrants must
The Digital Millennium Copyright Act 1998 made it a criminal offense...
Alert!

Advertisement