TEST BANK
ST
UV
Cyber Crime and
IA
Cyber Terrorism, 5th
.A
edition
PP
RO
Authors: Robert W. Taylor, Eric J. Fritsch, Michael R.
Saylor, William L. Tafoya
VE
◊ ALL CHAPTERS
◊ INSTANT PDF DOWNLOAD💯💯💯
D?
◊ ORIGINAL FROM PUBLISHER
??
MEDCONNOISSEUR
, Cyber Crime and Cyber Terrorism, 5e (Taylor / Fritsch / Liederbach / Saylor / Tafoya)
Chapter 1 Introduction and Overview of Cyber Crime and Cyber Terrorism
1.1 Multiple Choice Questions
1) Which of the following is MOST true?
ST
A) Digital crimes are not of great concern to the public.
B) The public perception is that law enforcement and government officials are well-equipped to
deal with cyber crime.
C) The public relies on computers for a host of societal functions including military operations,
UV
finance, communications, utilities, and mass transit.
D) Threats of cyber terrorism are grossly exaggerated.
Answer: C
Page Ref: 3
Objective: Describe the current issues, trends, and problems in cyber crime and cyber terrorism.
IA
Level: Intermediate
2) Which of the following is MOST true?
A) All forms of digital crimes are covered in the text.
.A
B) The text focuses mainly on Macintosh-based systems.
C) Practitioners in both the criminal justice field and the computer science field typically have
limited knowledge of each other's occupations.
PP
D) The authors of the text treat digital crime and digital terrorism as separate concepts.
Answer: C
Page Ref: 6
Objective: Understand the intended audience, purpose, and scope of this text.
Level: Basic
RO
3) Which of the following is NOT an example of Donn Parker's work as an early commentator
on problems associated with computer crime?
A) The ease with which criminals could misuse information.
B) The observation that researchers felt that computer crime was not worthy of specific explicit
VE
research.
C) The "cyber" prefix describes computer crimes.
D) The observation that losses increase substantially with intentional acts involving computers.
Answer: C
D?
Page Ref: 7
Objective: Understand the intended audience, purpose, and scope of this text.
Level: Difficult
??
1
Copyright © 2024 Pearson Education, Inc.
, 4) Which of the following is MOST true?
A) The character and nature of cyber crime and their frequency of occurrence has changed
significantly since 1995.
B) Cyber crime is well researched.
C) Law enforcement is prepared to handle the newest threats of digital crime.
D) Cyber victimization is likely leveling off.
ST
Answer: A
Page Ref: 7
Objective: Understand the intended audience, purpose, and scope of this text.
Level: Intermediate
UV
5) Criminal statistics/data on computer crime are:
A) Collected by the FBI
B) Very accurate and reliable
C) Inconsistent because there is an absence of any attempt to collect offense data systematically
IA
D) Submitted by all federal agencies and represent a fairly accurate picture of the problem
Answer: C
Page Ref: 7
Objective: Understand the intended audience, purpose, and scope of this text.
.A
Level: Basic
6) Which of the following is NOT a common theme to emerge from the research on the problems
PP
of computer crime?
A) Computer fraud within government agencies
B) The work of hackers
C) Incidences of network incursion
D) Behavioral approaches of cyber criminals
RO
Answer: D
Page Ref: 8-9
Objective: Discuss the developmental perspective on the problem and changes in cyber
victimization.
Level: Difficult
VE
7) Which of the following is MOST true?
A) Case studies offer generalizations on cyber criminals.
B) Most research of cyber crime focuses on behavioral approaches.
D?
C) Early researchers felt that computer crime would be a large problem.
D) A great deal of effort is dedicated to computer security.
Answer: D
Page Ref: 9
Objective: Discuss the developmental perspective on the problem and changes in cyber
??
victimization.
Level: Difficult
2
Copyright © 2024 Pearson Education, Inc.
, 8) Which country has the highest rate of cyber victimization?
A) United States
B) England
C) China
D) North Korea
Answer: A
ST
Page Ref: 10
Objective: Discuss the developmental perspective on the problem and changes in cyber
victimization.
Level: Basic
UV
9) Which of the following is MOST true?
A) The processes and dynamics involved in the production of cyber crime and cyber terrorism
are virtually the same.
B) Cyber terrorism does not pose as great a threat as digital crime.
IA
C) Cyber crime is another term for digital terrorism.
D) Cyber crime and digital terrorism are not on parallel tracks.
Answer: A
Page Ref: 11
.A
Objective: Discuss the developmental perspective on the problem and changes in cyber
victimization.
Level: Intermediate
PP
10) Which of the following is NOT a characteristic noted by Anderson and colleagues in 2012?
A) Traditional crimes that are now "cyber" because they are conducted online.
B) Traditional crimes that have changed with the advent of the Internet.
C) New crimes that have been originated since the advent of the Internet.
RO
D) Crimes that facilitate other crimes through the proper use of computers.
Answer: D
Page Ref: 13
Objective: Understand the estimates of the costs of cyber crime.
Level: Difficult
VE
11) Which of the following is NOT considered in the calculation of costs associated with each
type of computer crime?
A) Reputational damage
D?
B) Anti-virus software
C) Loss of revenue
D) All of these
Answer: D
Page Ref: 1
??
Objective: Understand the estimates of the costs of cyber crime.
Level: Intermediate
3
Copyright © 2024 Pearson Education, Inc.