Computer Technology And The Internet

70 Questions | Attempts: 219

SettingsSettingsSettings
Computer Technology Quizzes & Trivia

Questions and Answers
  • 1. 
    Which of the following describe cybercrime?
    • A. 

      It helps perpetrators expend less effort than committing traditional crime

    • B. 

      It is committed on a far broader scale than traditional crime

    • C. 

      It has reduced the speed with which criminal activities are conducted

    • D. 

      Both a and b

    • E. 

      All of the above

  • 2. 
    Which of the following crimes would not have been possible without the use of computer technology and the Internet?
    • A. 

      Hacking

    • B. 

      Extortion

    • C. 

      Malware

    • D. 

      Both a and c

    • E. 

      All of the above

  • 3. 
    To be considered a cybercrime, computers must be
    • A. 

      An incidental aspect to the crime

    • B. 

      The target of the crime

    • C. 

      The tool used to commit the crime

    • D. 

      Both b and c

    • E. 

      All of the above

  • 4. 
    Hacking occurs when an individual
    • A. 

      Seeks to gain unauthorized access to a computer system in order to commit another crime such as destroying information contained in that system

    • B. 

      Maliciously sabotages a computer

    • C. 

      Seeks to disrupt a computer network

    • D. 

      Gains unauthorized access to a system

    • E. 

      All of the above

  • 5. 
    __________ occur when a perpetrator seeks to gain control over multiple computers and then uses these computers to launch an attack against a specific target or targets.
    • A. 

      Virus attacks

    • B. 

      Worm attacks

    • C. 

      Denial of Service attacks

    • D. 

      Distributed Denial of Service attacks

    • E. 

      None of the above

  • 6. 
    A __________ does not need user activity to make copies of itself and spread.
    • A. 

      Worm

    • B. 

      Virus

    • C. 

      Trojan horse

    • D. 

      Both a and b

    • E. 

      All of the above

  • 7. 
    Computer hijacking occurs when an individual takes control over a computer (or computers) with a ____________.
    • A. 

      Virus

    • B. 

      Worm

    • C. 

      Trojan horse

    • D. 

      Spyware

    • E. 

      Bot code

  • 8. 
    Which of the following is malware?
    • A. 

      Virus

    • B. 

      Spyware

    • C. 

      Denial of service attack

    • D. 

      Both a and b

    • E. 

      All of the above

  • 9. 
    The computer is used as a tool to commit which of the following crimes?
    • A. 

      Copyright infringement

    • B. 

      Embezzlement

    • C. 

      Cyberharassment

    • D. 

      Phishing

    • E. 

      All of the above

  • 10. 
    Hacking is cracking with criminal intent
    • A. 

      True

    • B. 

      False

  • 11. 
    Computer forensics investigations focus on violations of
    • A. 

      Civil

    • B. 

      Criminal

    • C. 

      Administrative

    • D. 

      Both a and b

    • E. 

      All of the above

  • 12. 
    Public investigations are conducted by
    • A. 

      Government agencies

    • B. 

      Law enforcement agencies

    • C. 

      Citizens

    • D. 

      Both a and b

    • E. 

      All of the above

  • 13. 
    The standard of proof in a civil trial is
    • A. 

      Preponderance of evidence

    • B. 

      Beyond a reasonable doubt

    • C. 

      Clear and convincing evidence

    • D. 

      Both a and c

    • E. 

      All of the above

  • 14. 
    Investigations of administrative law violations can occur through the use of
    • A. 

      Inspections

    • B. 

      Searches and seizures

    • C. 

      Subpoenas

    • D. 

      Both a and b

    • E. 

      All of the above

  • 15. 
    The four distinct steps in the computer forensics process are as follows:
    • A. 

      Acquisition, identification, extraction, and presentation

    • B. 

      Acknowledgement, identification, extraction, and presentation

    • C. 

      Acquisition, identification, evaluation, and presentation

    • D. 

      Identification, acquisition,evaluation, and presentation

    • E. 

      None of the above

  • 16. 
    Factors that may affect the feasibility of on-site and off-site computer searches include
    • A. 

      The configuration of the software and hardware

    • B. 

      The overall size and complexity of the computer system

    • C. 

      The technical demands of the search

    • D. 

      Both b and c

    • E. 

      All of the above

  • 17. 
    __________ is any kind of writing, video, or sound recording material whose authenticity needs to be established if introduced as evidence in a court of law.
    • A. 

      Testimonial

    • B. 

      Demonstrative

    • C. 

      Documentary

    • D. 

      Direct

    • E. 

      None of the above

  • 18. 
    The __________ states that forensic tools, techniques, procedures and evidence are admissible in court only if they have a "general acceptance" within the scientific community.
    • A. 

      Daubert standard

    • B. 

      Coppolino standard

    • C. 

      Frye standard

    • D. 

      None of the above

    • E. 

      All of the above

  • 19. 
    Eyewitness testimony is an example of
    • A. 

      Physical evidence

    • B. 

      Direct evidence

    • C. 

      Demonstrative evidence

    • D. 

      Hearsay evidence

    • E. 

      None of the above

  • 20. 
    Computer forensics test results are repeatable when the same results are obtained when using the same methods in the same testing environment.
    • A. 

      True

    • B. 

      False

  • 21. 
    __________ are spoken words in a conversation or the words written in a message.
    • A. 

      Non-content data

    • B. 

      Content data

    • C. 

      Traffic data

    • D. 

      Location data

    • E. 

      None of the above

  • 22. 
    __________ consists of data about a communication.
    • A. 

      Content data

    • B. 

      Location data

    • C. 

      Traffic data

    • D. 

      None of the above

    • E. 

      All of the above

  • 23. 
    Traffic data includes
    • A. 

      Telephone numbers

    • B. 

      Customer information

    • C. 

      Dialed numbers

    • D. 

      None of the above

    • E. 

      All of the above

  • 24. 
    The Patriot Act made it harder on law enforcement agencies to obtain the personal information of Internet users.
    • A. 

      True

    • B. 

      False

  • 25. 
    The Children's Online Privacy Protection Act of 1998 controls the dissemination of information to children.
    • A. 

      True

    • B. 

      False

×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.