click below
click below
Normal Size Small Size show me how
JUS_204_FINAL
JUS_204
| Question | Answer |
|---|---|
| a computer that has been taken over by another computer | zombie |
| A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a | logical bomb |
| A virus attack may replace or destroy data on the computer's hard drive and | leave a "back door" open for later entry. |
| port scanning is | removes data |
| cyber crime is a | transnational problem |
| What are 3 categories of cyber criminals? | cracker, vandals, and criminals |
| what did the USA Patriot Act grant authorities permission to do? | "roving" authority to FBI to more efficiently serve orders on communications carriers |
| Computer disks should be stored away from | magnetic fields |
| Intentionally destroying computer information, programs or hardware using a logic bomb is classified as | sabotage |
| what specialists are frequently consulted in the team approach to investigating computer crime? | All choices! a. the victim who owns the equipment c. auditors b. database processing technicians |
| What is the name for the process, often considered synonymous with phishing, that involves acquiring unauthorized access to a computer or network which appears to be from a trusted host, in an attempt to commit identity theft? | spoofing |
| Electronic evidence and other computer crime evidence may take the form of | All Choices! a. printers and scanners. c. telephones and fax machines. b. VCRs and GPS devices. |
| Common protocol for processing a crime scene involving electronic evidence includes which of the following? | Obtaining a search warrant. |
| What type of material should NOT be used when packaging electronic evidence? | plastic bags |
| A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a | Trojan Horse |
| In a drug investigation, and officer can avoid charges of entrapment by | making two or more buys. |
| Drugs can be classified as | depressants, stimulants, narcotics, hallucinogens, cannabis or inhalants. |
| Rohypnol is a | depressant |
| Barbiturates is a | depressant |
| is the fastest growing criminal organization in the US | EOC (European Organize Crime ) |
| In 1914 the federal government passed this act which made the sale or use of certain drugs illegal | Harrison Narcotics Act |
| Designer drugs are | All Choices! 1.adding to existing drug 2.creating by omitting something 3.high-profit drug |
| Designer drugs, which are illicit drugs that are offshoots of the legal drugs from which they are created, may cause the muscles to stiffen and give the appearance Parkinson's disease. These illicit drugs are referred to as what type of drugs? | analogs |
| How much impact does crack have than cocaine? | 10 times more impact than cocaine |
| What did the RICO act of 1970 do? | you can seize assets resolved from illegal activity AND allows circumstancial evidence |
| what are the groups that make up the Mafia? | 1.Italian (la costra nostra) 2. Asian 3.Latino 4.African 5.Russian |
| what are indicators that criminal activity is cult or satanic? | book of shadows, painted rocks, boobie traps |
| A flash mob is an example of | all choices |
| Indicators youth may be in a gang | 1.admits to "hanging out" with kids in gangs 2.uses unuaual hand signals to communicate 3.has been in trouble with police |
| what is the main drug OMG distribut in the US? | Meth |
| Which of the following is an indicator or a ritualistic homicide? | 1.missing body parts (heart, gentials...) 2.urine or animal feces smeared on body or found in body coaities 3.wax drippings, oils, incense or powders on body |
| which group may be associated with mutilated animals, grave robbery, and descration churches and human remains? Graffiti from this group depicts satanic symbols | stoner gangs |
| what was the decision in the US Supreme Court's 2003 case, Virginia v. Black? | it struck down a Virginia law banning cross buring, saying the statue violated the First Amandment |
| why are military people in gangs such a threat? | they poss weapons, tactics and attack planning |
| The group "HAMAS" is | a militant Palestinian Islamic movement in the West Bank and Gaza Strip |
| What can weapons of mass destruction contain? | nuclear, biological and chemical agents |
| The Al-Aqsa Martyrs' Brigades are | a group formed in the refugee camps in the West Bank of Israel |
| The USA Patriot Act significantly improved the nations couter terrorism efforts by all EXCEPT which one of the following answers? | allows for political assassinations with presidential approval |
| Which of the following is NOT a type of chemical weapon? | immune agent |
| A sleeper cell is | a group of terrorits who blend into a community until called to action |
| what are crimes NOT associated with funding terrorism? | Contract Killings |
| The "contagion effect" refers to | the fact that coverage of terrorism inspires more terrorism |
| The term intifada means? | uprising |
| The number one priority in any terrorist-preparedness plan should be | communication between local, state and federal law enforcement agencies |
| The method most likely used by terrorists is | explosives |
| A toxin is both biological and chemical weapon. It is more than 1,000 times poisonous than cyanide and in its purest form a grain of it no bigger than a grain of table salt can kill an adult | ricin |
| what is skimming | scavenge garbage |
| What should you do when processing a cybercrime scene? | photograph and diagram |
| What is the main difference between Traditional and Computer Evidence? | computer is fragile |
| Which group is NOT then name of a Malfia? | Fortelli Gambino |
| One of the latest technological innovations to aid in the fight against gangs is | TARGs |