1. What term did writer William Gibson coin in his 1984 book,
A. Cybercrime C. Cyberspace
B. Physicality D. Computer crime
2. The illegal use of a person?s identification information with
unlawful intent is
A. identity fraud. C. identity theft.
B. credit fraud. D. benefit fraud.
3. The author contends that law enforcement has been reluctant to prosecute computer
crimes because of
A. lack of societal support. C. managerial incompetence.
B. apathy. D. lack of prosecutorial support.
4. An activity that involves manipulating and compromising telecommunications systems
is known as
A. cracking. C. tracking.
B. wreaking. D. phreaking.
5. Some law-enforcement officers believe child pornographers who carry out illegal activities
over the Internet have certain characteristics. Which of the following is a problem with
focusing on those characteristics?
A. Most child pornographers are foreign citizens.
B. Reliance on these characteristics alone leads to overlooking others who engage in
C. The characteristics describe most users of the Internet.
D. The characteristics fail to account for the cleverness of these individuals.
6. Which of the following is a program designed to activate upon a series of events?
A. Logic bomb C. Wetware
B. Source code D. Kangaroo code
7. The use or the implicit threat of use of technological means to cause harm to the
physical being, reputation, or property of an individual, organization, or company as a
means to obtain the consensual exchange of property from that individual, organization,
or company is known as
A. corporate warfare. C. spamming.
B. cyber-extortion. D. data piracy.
8. Which of the following is code that offers a legitimate use but can provide access to an
A. Trap door C. Trojan horse
B. Source code D. Virus
9. Which of the following is an e-mail system?
A. UNIX OS C. Eudora
B. Mosaic Interface D. Gopher
10. Which of the following is a person who violates a secure system for some illicit purpose?
A. Cracker C. Sneaker
B. White hat hacker D. Red hat hacker
11. Which of the following involves the deliberate manipulation of an existing program to
redirect or reroute data representing money or economics exchanges?
A. Counterfeiting C. The salami technique
B. IP spoofing D. Data diddling
12. Which of the following are the people who set up organized groups to traffic in stolen
A. Software pirates C. Black-market dealers
B. Ecoterrorists D. Cyberstalkers
13. Someone who uses electronic means to infringe upon trademarked property is engaging
in which of the following?
A. Cyber-squatting C. The salami technique
B. IP spoofing D. Data diddling
14. Disconnecting people from legitimate servers and reconnecting them to an illegitimate
server is called
A. phreaking. C. Web-cramming.
B. IP spoofing. D. ISP-jacking.
15. People can disguise their identities on the Web by using
A. a data-diddle. C. a phreak.
B. an anonymizer. D. a Web-cram.
16. Which of the following people envisioned many concepts of modern computing?
A. John W. Mauchly C. John Presper Eckert
B. Charles Babbage D. John Atanasoff
17. Cyberspace, with its global reach, poses problems such as
A. vicinage. C. inchoate crimes.
B. perspicacity. D. propinquity.
18. Where might someone go to download software illegally in violation of
A. Microsoft C. WareZ
B. Grey-market dealers D. Shareware
19. One example of the destruction of data involves
A. cyberharassment. C. cyberstalking.
B. ecoterrorism. D. software piracy.
20. According to your textbook author, what is ironic about the Internet as a new forum
for criminal activity?
A. Old security measures no longer work.
B. Few people have committed crimes.
C. Old security measures are more effective.
D. People are just discovering how to commit crimes.
part 2 :
Questions 1?20: Select the one best answer to each question.
1. What is the best way to produce a byte-for-byte copy of a
A. XCOPY C. Imaging
B. FILECOPY D. Steganographing
2. Where is the master boot record always located?
A. Cylinder 0, head 0, sector 0
B. Cylinder 0, head 0, sector 1
C. Cylinder 1, head 0, sector 0
D. Cylinder 0, head 1, sector 0
3. What prevents access to specific data through the use of
A. Password-cracking software
B. Disk-utility software
C. Encryption software
D. Steganographic software
4. What law requires telephone companies and Internet service providers to provide technical
assistance to accomplish the goals of a legitimate law-enforcement investigation?
A. The Electronic Communications Privacy Act
B. The Omnibus Crime Control Act of 1998
C. The Uniform Electronic Security Act
D. The Omnibus Crime Control Act of 1988
5. What is the base for the hexadecimal system?
A. 8 C. 14
B. 10 D. 16
6. While validly searching a computer for drug-related spreadsheets, a law enforcement
officer comes across child pornography. To search for more child pornography, the
officer will need a _______ warrant.
A. no-knock C. bag-and-tag
B. primary D. secondary
7. Law enforcement can gather additional information through the use of
A. radical restructuring. C. informants.
B. data processing. D. data restructuring.
8. The military has a five-step plan of attack for conducting an investigation called
A. TIACA. C. TRECL.
B. SMEAC. D. STREK.
9. To search quickly for files that might have been intentionally manipulated, deleted,
or erased, an investigator should use which of the following?
A. Hex editors C. Viewers
B. Text editors D. Verification software
10. A piece of computer equipment that?s a backup device for large portions of
a hard drive is a
A. modem. C. plethora drive.
B. data storage module. D. magnetic tape storage unit.
11. In which of the following cases did the U.S. Supreme Court rule that warrants have to
be specific as to what will be searched?
A. Maryland v. Garrison C. Naugle v. Whitney
B. Coolidge v. New Hampshire D. U.S. v. Lacy
12. Government officials have to establish which of the following to secure a search warrant?
A. The totality of the circumstances C. Probable cause
B. Consent D. Exigent circumstances
13. What is involved with SOP?
A. Short-order procedures
B. Single-opportunity processing
C. Standard opportunity precaution
D. Standard operating procedures
14. What type of computer system usually has its own air-conditioning and power systems?
A. Hacker computers C. Minicomputers
B. Password wallets D. Mainframes
15. A ?boot? password is also known as a
A. counter-password. C. hidden password.
B. DOS password. D. CMOS password.
16. Identify the legislation that extended protections regarding wiretaps to cordless and
A. The Federal Wiretap Act
B. The Communications Assistance for Law Enforcement Act
C. The Foreign Intelligence Surveillance Act
D. The Comprehensive Crime Control Act
17. An investigator could bypass the BIOS by inserting which of the following?
A. Verification software C. Decompression software
B. A key disk D. Decryption software
18. When encountering a steganographic message, an investigator can expect to find
a message, and what else?
A. Container C. Image
B. Password D. Fragment
19. Which of the following are intangible units?
A. Cylinders C. Tracks
B. Heads D. Sectors
20. The golden rule for any successful criminal investigation should be
A. process. C. document.
B. review. D. verify.
part 3: Criminal Law
For purposes of this project, you?re a criminal defense
attorney, and you?ve been asked to consult on two highprofile
murder cases. The first case is Florida v. Tate and
the second is Florida v. King. These cases were covered
on CourtTV and in the news. For this assignment, you
should read the background and sentencing information
on each case
Read about the Tate case in the articles listed at the following Web
Read about the King Brothers case in the articles listed at the
following Web site:
Notice that these two cases each involve a homicide committed by juveniles. But the outcomes are vastly different. Lionel Tate was sentenced to life in prison, while the King brothers
are serving less than ten years! Both cases occurred in the same state (Florida). (Note: The Tate case was recently reopened and Mr. Tate is getting out of jail soon.)
After reviewing each case, write an essay discussing the following points:
? In addition to murder, do the facts support charging the defendants in each case with any other crimes discussed in your text as well as in Lessons 1?4 in this study guide? Explain.
? Based on the facts, what defenses were available to each of the defendants and why? When discussing the King case, you need focus only on the conduct of the youngest brother, Alex.
? Based on your knowledge of punishment as discussed in this course, do the punishments violate the ?cruel and unusual? prohibition in the U.S. Constitution? Explain.
The length of your essay should be between 350 and 500 words. The essay should be typed and double-spaced in Times New Roman font if you use a computer, or doublespaced on 8 1/2 ? 11 white paper if you use a conventional typewriter. Be sure to use correct grammar, sentence structure, and spelling.
Place an order of a custom essay for this assignment with us now. You are guaranteed; a custom premium paper being delivered within its deadline, personalized customer support and communication with your writer through out the order preparation period.