,Cyber Crime and Cyber Terrorism, 4e (Taylor)
Chapter 1 Introduction and Overview of Cyber Crime and Cyber
Terrorism
1.1 Multiple Choice Questions
1) Which of the following is MOST true?
A) The character and nature of cybercrime and their frequency of occurrence has changed
significantly since 1995
B) Cybercrime is well researched
C) Law enforcement is prepared to handle the newest threats of digital crime
D) Cybervictimization is likely leveling off
Answer: A
Page Ref: 5
Objective: Describe the current issues, trends, and problems in cyber crime and cyber
terrorism.
Level: Intermediate
2) Criminal statistics/data on computer crime are:
A) Collected by the FBI
B) Very accurate and reliable
C) Inconsistent because there is an absence of any attempt to collect offense data
systematically
D) Submitted by all federal agencies and represent a fairly accurate picture of the problem
Answer: C
Page Ref: 5
Objective: Describe the current issues, trends, and problems in cyber crime and cyber
terrorism.
Level: Basic
3) Network intrusion:
A) Is characteristic of the computer criminal who commits these offenses
B) Is not sophisticated
C) Often targets the server and may cause harm to the network owners
D) Requires punishment imposed for the offenses
Answer: C
, Page Ref: 14
Objective: Describe the scheme for classifying computer crimes.
Level: Intermediate
4) Data alteration, denial of service, network intrusions, thefts of information, and computer
vandalism are examples of which type of computer crime?
A) Computer as a target
B) Computer as an instrument of a crime
C) Computer as incidental to crime
D) Crimes associated with the prevalence of computers
Answer: A
Page Ref: 14
Objective: Describe the scheme for classifying computer crimes.
Level: Basic
5) Which type of computer crime describes actions in which the computer is used only to
further a criminal end? In other words, the computer or data contained therein is not the
object of the crime.
A) Computer as a target
B) Computer as an instrument of a crime
C) Computer as incidental to crime
D) Crimes associated with the prevalence of computers
Answer: B
Page Ref: 14
Objective: Describe the scheme for classifying computer crimes.
Level: Basic
6) Intellectual property violations, component theft, counterfeiting, and identity theft are
examples of which type of computer crime?
A) Computer as a target
B) Computer as an instrument of a crime
C) Computer as incidental to crime
D) Crimes associated with the prevalence of computers
Answer: D
Page Ref: 16
Objective: Describe the scheme for classifying computer crimes.
Level: Basic
7) Child pornography is an example of which type of computer crime?
A) Computer as a target