Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

JUS_204_FINAL

JUS_204

QuestionAnswer
a computer that has been taken over by another computer zombie
A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a logical bomb
A virus attack may replace or destroy data on the computer's hard drive and leave a "back door" open for later entry.
port scanning is removes data
cyber crime is a transnational problem
What are 3 categories of cyber criminals? cracker, vandals, and criminals
what did the USA Patriot Act grant authorities permission to do? "roving" authority to FBI to more efficiently serve orders on communications carriers
Computer disks should be stored away from magnetic fields
Intentionally destroying computer information, programs or hardware using a logic bomb is classified as sabotage
what specialists are frequently consulted in the team approach to investigating computer crime? All choices! a. the victim who owns the equipment c. auditors b. database processing technicians
What is the name for the process, often considered synonymous with phishing, that involves acquiring unauthorized access to a computer or network which appears to be from a trusted host, in an attempt to commit identity theft? spoofing
Electronic evidence and other computer crime evidence may take the form of All Choices! a. printers and scanners. c. telephones and fax machines. b. VCRs and GPS devices.
Common protocol for processing a crime scene involving electronic evidence includes which of the following? Obtaining a search warrant.
What type of material should NOT be used when packaging electronic evidence? plastic bags
A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a Trojan Horse
In a drug investigation, and officer can avoid charges of entrapment by making two or more buys.
Drugs can be classified as depressants, stimulants, narcotics, hallucinogens, cannabis or inhalants.
Rohypnol is a depressant
Barbiturates is a depressant
is the fastest growing criminal organization in the US EOC (European Organize Crime )
In 1914 the federal government passed this act which made the sale or use of certain drugs illegal Harrison Narcotics Act
Designer drugs are All Choices! 1.adding to existing drug 2.creating by omitting something 3.high-profit drug
Designer drugs, which are illicit drugs that are offshoots of the legal drugs from which they are created, may cause the muscles to stiffen and give the appearance Parkinson's disease. These illicit drugs are referred to as what type of drugs? analogs
How much impact does crack have than cocaine? 10 times more impact than cocaine
What did the RICO act of 1970 do? you can seize assets resolved from illegal activity AND allows circumstancial evidence
what are the groups that make up the Mafia? 1.Italian (la costra nostra) 2. Asian 3.Latino 4.African 5.Russian
what are indicators that criminal activity is cult or satanic? book of shadows, painted rocks, boobie traps
A flash mob is an example of all choices
Indicators youth may be in a gang 1.admits to "hanging out" with kids in gangs 2.uses unuaual hand signals to communicate 3.has been in trouble with police
what is the main drug OMG distribut in the US? Meth
Which of the following is an indicator or a ritualistic homicide? 1.missing body parts (heart, gentials...) 2.urine or animal feces smeared on body or found in body coaities 3.wax drippings, oils, incense or powders on body
which group may be associated with mutilated animals, grave robbery, and descration churches and human remains? Graffiti from this group depicts satanic symbols stoner gangs
what was the decision in the US Supreme Court's 2003 case, Virginia v. Black? it struck down a Virginia law banning cross buring, saying the statue violated the First Amandment
why are military people in gangs such a threat? they poss weapons, tactics and attack planning
The group "HAMAS" is a militant Palestinian Islamic movement in the West Bank and Gaza Strip
What can weapons of mass destruction contain? nuclear, biological and chemical agents
The Al-Aqsa Martyrs' Brigades are a group formed in the refugee camps in the West Bank of Israel
The USA Patriot Act significantly improved the nations couter terrorism efforts by all EXCEPT which one of the following answers? allows for political assassinations with presidential approval
Which of the following is NOT a type of chemical weapon? immune agent
A sleeper cell is a group of terrorits who blend into a community until called to action
what are crimes NOT associated with funding terrorism? Contract Killings
The "contagion effect" refers to the fact that coverage of terrorism inspires more terrorism
The term intifada means? uprising
The number one priority in any terrorist-preparedness plan should be communication between local, state and federal law enforcement agencies
The method most likely used by terrorists is explosives
A toxin is both biological and chemical weapon. It is more than 1,000 times poisonous than cyanide and in its purest form a grain of it no bigger than a grain of table salt can kill an adult ricin
what is skimming scavenge garbage
What should you do when processing a cybercrime scene? photograph and diagram
What is the main difference between Traditional and Computer Evidence? computer is fragile
Which group is NOT then name of a Malfia? Fortelli Gambino
One of the latest technological innovations to aid in the fight against gangs is TARGs
Created by: lax5
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards