UV
– 5th Edition
TEST BANK
IA
_A
PP
Robert Taylor
RO
VE
Comprehensive Test Bank for Instructors and
Students
D?
© Robert Taylor
??
All rights reserved. Reproduction or distribution without permission is prohibited.
??
©Medexcellence ✅��
, Cyber Crime and Cyber Terrorism, 5e (Taylor / Fritsch / Liederbach / Saylor / Tafoya)
Chapter 1 Introduction and Overview of Cyber Crime and Cyber Terrorism
1.1 Multiple Choice Questions
UV
1) Which of the following is MOST true?
A) Digital crimes are not of great concern to the public.
B) The public perception is that law enforcement and government officials are well-equipped to
deal with cyber crime.
C) The public relies on computers for a host of societal functions including military operations,
IA
finance, communications, utilities, and mass transit.
D) Threats of cyber terrorism are grossly exaggerated.
Answer: C
Page Ref: 3
_A
Objective: Describe the current issues, trends, and problems in cyber crime and cyber terrorism.
Level: Intermediate
2) Which of the following is MOST true?
A) All forms of digital crimes are covered in the text.
PP
B) The text focuses mainly on Macintosh-based systems.
C) Practitioners in both the criminal justice field and the computer science field typically have
limited knowledge of each other's occupations.
D) The authors of the text treat digital crime and digital terrorism as separate concepts.
Answer: C
RO
Page Ref: 6
Objective: Understand the intended audience, purpose, and scope of this text.
Level: Basic
3) Which of the following is NOT an example of Donn Parker's work as an early commentator
on problems associated with computer crime?
VE
A) The ease with which criminals could misuse information.
B) The observation that researchers felt that computer crime was not worthy of specific explicit
research.
C) The "cyber" prefix describes computer crimes.
D) The observation that losses increase substantially with intentional acts involving computers.
D?
Answer: C
Page Ref: 7
Objective: Understand the intended audience, purpose, and scope of this text.
Level: Difficult
??
??
1
Copyright © 2024 Pearson Education, Inc.
, 4) Which of the following is MOST true?
A) The character and nature of cyber crime and their frequency of occurrence has changed
significantly since 1995.
B) Cyber crime is well researched.
C) Law enforcement is prepared to handle the newest threats of digital crime.
UV
D) Cyber victimization is likely leveling off.
Answer: A
Page Ref: 7
Objective: Understand the intended audience, purpose, and scope of this text.
Level: Intermediate
IA
5) Criminal statistics/data on computer crime are:
A) Collected by the FBI
B) Very accurate and reliable
_A
C) Inconsistent because there is an absence of any attempt to collect offense data systematically
D) Submitted by all federal agencies and represent a fairly accurate picture of the problem
Answer: C
Page Ref: 7
Objective: Understand the intended audience, purpose, and scope of this text.
PP
Level: Basic
6) Which of the following is NOT a common theme to emerge from the research on the problems
of computer crime?
A) Computer fraud within government agencies
RO
B) The work of hackers
C) Incidences of network incursion
D) Behavioral approaches of cyber criminals
Answer: D
Page Ref: 8-9
Objective: Discuss the developmental perspective on the problem and changes in cyber
VE
victimization.
Level: Difficult
7) Which of the following is MOST true?
A) Case studies offer generalizations on cyber criminals.
D?
B) Most research of cyber crime focuses on behavioral approaches.
C) Early researchers felt that computer crime would be a large problem.
D) A great deal of effort is dedicated to computer security.
Answer: D
Page Ref: 9
??
Objective: Discuss the developmental perspective on the problem and changes in cyber
victimization.
Level: Difficult
??
2
Copyright © 2024 Pearson Education, Inc.
, 8) Which country has the highest rate of cyber victimization?
A) United States
B) England
C) China
D) North Korea
UV
Answer: A
Page Ref: 10
Objective: Discuss the developmental perspective on the problem and changes in cyber
victimization.
Level: Basic
IA
9) Which of the following is MOST true?
A) The processes and dynamics involved in the production of cyber crime and cyber terrorism
are virtually the same.
_A
B) Cyber terrorism does not pose as great a threat as digital crime.
C) Cyber crime is another term for digital terrorism.
D) Cyber crime and digital terrorism are not on parallel tracks.
Answer: A
Page Ref: 11
PP
Objective: Discuss the developmental perspective on the problem and changes in cyber
victimization.
Level: Intermediate
10) Which of the following is NOT a characteristic noted by Anderson and colleagues in 2012?
RO
A) Traditional crimes that are now "cyber" because they are conducted online.
B) Traditional crimes that have changed with the advent of the Internet.
C) New crimes that have been originated since the advent of the Internet.
D) Crimes that facilitate other crimes through the proper use of computers.
Answer: D
Page Ref: 13
VE
Objective: Understand the estimates of the costs of cyber crime.
Level: Difficult
11) Which of the following is NOT considered in the calculation of costs associated with each
type of computer crime?
D?
A) Reputational damage
B) Anti-virus software
C) Loss of revenue
D) All of these
Answer: D
??
Page Ref: 1
Objective: Understand the estimates of the costs of cyber crime.
Level: Intermediate
??
3
Copyright © 2024 Pearson Education, Inc.