_____ is a nontechnical type of cyberintrusion that relies heavily on human interaction
and often involves tricking people into breaking normal security procedures. - correct
answer Social engineering
Social engineering involves persuading administrators or telephone users to give details
of passwords or other things by pretending to be staff, suppliers, or trusted individuals—
even police officers.
__________ uses official-looking e-mail messages to elicit responses from victims,
directing them to phony websites. - correct answer Phishing
Phishing is a relatively new form of high technology fraud using e-mail. Phishing e-mails
typically instruct individual recipients to validate or update account information before
their accounts are canceled.
Which of the following statements about the National Law Enforcement and Corrections
Technology Center (NLECTC) is true? - correct answer The NLECTC focuses on
identifying and developing new products and technologies designed for criminal justice
applications.
The NLECTC concentrates on four areas of advancing technology: (1) communications
and electronics, (2) forensic science, (3) transportation and weapons, and (4) protective
equipment.
Which of the following statements best represents the increasing consensus about the
effects of social networking technologies on law enforcement operations? - correct
answer The use of social media by police is increasing rapidly.
Police departments can both benefit and suffer from recent developments in social
networking. The adoption of social media by law enforcement agencies is growing
exponentially.
Which of the following best describes expert systems? - correct answer Expert
systems analyze evidence and recognize patterns.
, Expert systems are computer hardware and software that attempt to duplicate the
decision-making processes used by skilled investigators in the analysis of evidence and
in the recognition of patterns that such evidence might represent.
Which of the following statements best describes criminalistics? - correct answer
Criminalistics refers to the use of technology and scientific techniques in the service of a
criminal investigation.
Criminalistics is a subfield of criminal justice. Criminalistics applies scientific techniques
to the detection and evaluation of criminal evidence in pursuit of a criminal investigation.
Tony received an e-mail asking for his bank details. He opened the e-mail, which stated
that his bank account would be frozen if he failed to provide the necessary information
within 24 hours. Realizing the e-mail was a hoax, he notified his bank. The operation of
his computer was not affected. Tony was a victim of which of the following cybercrimes?
- correct answer Phishing
Phishing is a relatively new form of high-technology fraud that uses official-looking e-
mail messages to produce responses from victims. It directs them to illegitimate
websites, often seeking information to defraud the computer user/victim. Phishing e-
mails typically instruct recipients to validate or update account information before their
accounts are canceled.
Which of the following would constitute an act of bioterrorism? - correct answer In
2001, letters containing anthrax were mailed to the offices of several U.S. Senators and
to a number of news media offices.
Bioterrorism involves the intentional or threatened use of viruses, bacteria, fungi, or
toxins from living organisms to produce death or disease. Anthrax is a deadly
bacterium. The bioterror attack resulted in five deaths.
Nexus is an online file-sharing service. On its website, it promotes its services as a way
for users to download copyrighted digital content. Blake, a hardcore gamer, downloaded
an unauthorized copy of a new video game using Nexus. Blake installs the game on his
computer and also sends it to his friend Larry. Which of the following statements
regarding this scenario is correct? - correct answer Blake has committed software
piracy because he downloaded an unauthorized copy of the game from Nexus and sent
a copy to Larry.