Chapter 1 Introduction and Overview of Cyber Crime and Cyber Terrorism
1.1 Multiple Choice Questions
1) Which of the following is MOST true?
A) Digital crimes are not of great concern to the public.
B) The public perception is that law enforcement and government officials are well-equipped to
deal with cyber crime.
C) The public relies on computers for a host of societal functions including military operations,
finance, communications, utilities, and mass transit.
D) Threats of cyber terrorism are grossly exaggerated.
Answer: C
Page Ref: 3
Objective: Describe the current issues, trends, and problems in cyber crime and cyber terrorism.
Level: Intermediate
2) Which of the following is MOST true?
A) All forms of digital crimes are covered in the text.
B) The text focuses mainly on Macintosh-based systems.
C) Practitioners in both the criminal justice field and the computer science field typically have
limited knowledge of each other's occupations.
D) The authors of the text treat digital crime and digital terrorism as separate concepts.
Answer: C
Page Ref: 6
Objective: Understand the intended audience, purpose, and scope of this text.
Level: Basic
3) Which of the following is NOT an example of Donn Parker's work as an early commentator
on problems associated with computer crime?
A) The ease with which criminals could misuse information.
B) The observation that researchers felt that computer crime was not worthy of specific explicit
research.
C) The "cyber" prefix describes computer crimes.
D) The observation that losses increase substantially with intentional acts involving computers.
Answer: C
Page Ref: 7
Objective: Understand the intended audience, purpose, and scope of this text.
Level: Difficult
1
Copyright #vj© #vj2024 #vjPearson #vjEducation,
#vjInc.
SCHOLARVAULT
,4) Which #vjof #vjthe #vjfollowing #vjis #vjMOST #vjtrue?
A) The #vjcharacter #vjand #vjnature #vjof #vjcyber #vjcrime #vjand #vjtheir #vjfrequency #vjof #vjoccurrence
#vjhas #vjchanged #vjsignificantly #vjsince #vj1995.
B) Cyber #vjcrime #vjis #vjwell #vjresearched.
C) Law #vjenforcement #vjis #vjprepared #vjto #vjhandle #vjthe #vjnewest #vjthreats #vjof #vjdigital #vjcrime.
D) Cyber #vjvictimization #vjis #vjlikely #vjleveling
#vjoff. #vjAnswer: # v j A
Page #vjRef: #vj7
Objective: # v j Understand #vjthe #vjintended #vjaudience, #vjpurpose, #vjand #vjscope #vjof
#vjthis #vjtext. #vjLevel: # v j Intermediate
5) Criminal #vjstatistics/data #vjon #vjcomputer #vjcrime #vjare:
A) Collected #vjby #vjthe #vjFBI
B) Very #vjaccurate #vjand #vjreliable
C) Inconsistent #vjbecause #vjthere #vjis #vjan #vjabsence #vjof #vjany #vjattempt #vjto #vjcollect #vjoffense #vjdata
#vjsystematically
D) Submitted #vjby #vjall #vjfederal #vjagencies #vjand #vjrepresent #vja #vjfairly #vjaccurate #vjpicture #vjof
#vjthe #vjproblem #vjAnswer: # v j C
Page #vjRef: #vj7
Objective: # v j Understand #vjthe #vjintended #vjaudience, #vjpurpose, #vjand #vjscope #vjof
#vjthis #vjtext. #vjLevel: # v j Basic
6) Which #vjof #vjthe #vjfollowing #vjis #vjNOT #vja #vjcommon #vjtheme #vjto #vjemerge #vjfrom #vjthe #vjresearch #vjon
#vjthe #vjproblems #vjof #vjcomputer #vjcrime?
A) Computer #vjfraud #vjwithin #vjgovernment #vjagencies
B) The #vjwork #vjof #vjhackers
C) Incidences #vjof #vjnetwork #vjincursion
D) Behavioral #vjapproaches #vjof #vjcyber
#vjcriminals #vjAnswer: # v j D
Page #vjRef: #vj8-9
Objective: # v j Discuss #vjthe #vjdevelopmental #vjperspective #vjon #vjthe #vjproblem #vjand #vjchanges
#vjin #vjcyber #vjvictimization.
Level: # v j # v j Difficult
7) Which #vjof #vjthe #vjfollowing #vjis #vjMOST #vjtrue?
A) Case #vjstudies #vjoffer #vjgeneralizations #vjon #vjcyber #vjcriminals.
B) Most #vjresearch #vjof #vjcyber #vjcrime #vjfocuses #vjon #vjbehavioral #vjapproaches.
C) Early #vjresearchers #vjfelt #vjthat #vjcomputer #vjcrime #vjwould #vjbe #vja #vjlarge #vjproblem.
D) A #vjgreat #vjdeal #vjof #vjeffort #vjis #vjdedicated #vjto #vjcomputer
#vjsecurity. #vjAnswer: # v j D
Page #vjRef: #vj9
Objective: # v j Discuss #vjthe #vjdevelopmental #vjperspective #vjon #vjthe #vjproblem #vjand #vjchanges
#vjin #vjcyber #vjvictimization.
Level: # v j # v j Difficult
2
Copyright #vj© #vj2024 #vjPearson #vjEducation,
#vjInc.
SCHOLARVAULT
,8) Which #vjcountry #vjhas #vjthe #vjhighest #vjrate #vjof #vjcyber #vjvictimization?
A) United #vjStates
B) England
C) China
D) North
#vjKorea
#vjAnswer:
# v j A
Page #vjRef: #vj10
Objective: # v j Discuss #vjthe #vjdevelopmental #vjperspective #vjon #vjthe #vjproblem #vjand #vjchanges
#vjin #vjcyber #vjvictimization.
Level: # v j # v j Basic
9) Which #vjof #vjthe #vjfollowing #vjis #vjMOST #vjtrue?
A) The #vjprocesses #vjand #vjdynamics #vjinvolved #vjin #vjthe #vjproduction #vjof #vjcyber #vjcrime #vjand
#vjcyber #vjterrorism #vjare #vjvirtually #vjthe #vjsame.
B) Cyber #vjterrorism #vjdoes #vjnot #vjpose #vjas #vjgreat #vja #vjthreat #vjas #vjdigital #vjcrime.
C) Cyber #vjcrime #vjis #vjanother #vjterm #vjfor #vjdigital #vjterrorism.
D) Cyber #vjcrime #vjand #vjdigital #vjterrorism #vjare #vjnot #vjon #vjparallel
#vjtracks. #vjAnswer: # v j A
Page #vjRef: #vj11
Objective: # v j Discuss #vjthe #vjdevelopmental #vjperspective #vjon #vjthe #vjproblem #vjand #vjchanges
#vjin #vjcyber #vjvictimization.
Level: # v j # v j Intermediate
10) Which #vjof #vjthe #vjfollowing #vjis #vjNOT #vja #vjcharacteristic #vjnoted #vjby #vjAnderson #vjand #vjcolleagues
#vjin #vj2012?
A) Traditional #vjcrimes #vjthat #vjare #vjnow #vj"cyber" #vjbecause #vjthey #vjare #vjconducted #vjonline.
B) Traditional #vjcrimes #vjthat #vjhave #vjchanged #vjwith #vjthe #vjadvent #vjof #vjthe #vjInternet.
C) New #vjcrimes #vjthat #vjhave #vjbeen #vjoriginated #vjsince #vjthe #vjadvent #vjof #vjthe #vjInternet.
D) Crimes #vjthat #vjfacilitate #vjother #vjcrimes #vjthrough #vjthe #vjproper #vjuse #vjof
#vjcomputers. #vjAnswer: # v j D
Page #vjRef: #vj13
Objective: # v j Understand #vjthe #vjestimates #vjof #vjthe #vjcosts #vjof
#vjcyber #vjcrime. #vjLevel: # v j Difficult
11) Which #vjof #vjthe #vjfollowing #vjis #vjNOT #vjconsidered #vjin #vjthe #vjcalculation #vjof #vjcosts #vjassociated
#vjwith #vjeach #vjtype #vjof #vjcomputer #vjcrime?
A) Reputational #vjdamage
B) Anti-virus #vjsoftware
C) Loss #vjof #vjrevenue
D) All #vjof
#vjthese
#vjAnswer:
# v j D
Page #vjRef: #vj1
Objective: # v j Understand #vjthe #vjestimates #vjof #vjthe #vjcosts #vjof
3
Copyright #vj© #vj2024 #vjPearson #vjEducation,
#vjInc.
SCHOLARVAULT
, cyber #vjcrime. #vjLevel:
#vj # v j Intermediate
4
Copyright #vj© #vj2024 #vjPearson #vjEducation,
#vjInc.
SCHOLARVAULT