Current and Future Criminal Justice Issues MCQs

Current and Future Criminal Justice Issues MCQs

The following Current and Future Criminal Justice Issues MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of Current and Future Criminal Justice Issues. We encourage you to answer these 30+ multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: Virtually all states have the following gun laws, EXCEPT ______.

A.   An individual who has been civilly committed cannot carry a firearm.

B.   Handguns cannot be sold to juveniles under 17.

C.   Firearms cannot be carried in certain places, such as schools or universities.

D.   An individual who has been dishonorably discharged from the military cannot carry a firearm.

2: Sex trafficking is a crime in which a commercial sex act is induced by force, fraud, or coercion, or in which the person induced to perform such act has not attained ______ years of age.

A.   16

B.   17

C.   18

D.   21

A.   Terrorism

B.   Human trafficking

C.   Sex trafficking

D.   Computer crimes

A.   Victimless crimes

B.   Felony crimes

C.   Petty crimes

D.   Organized crimes

5: ______ terrorism refers to situations where terrorists are motivated by their extreme political beliefs.

A.   Religious

B.   Right- and left-wing extremism

C.   Cyber

D.   Single-issue

6: With the passage of the ______, government officials were given additional tools to respond to terrorism, some say at the expense of individual rights.

A.   Homeland Security Act

B.   Pulling Levers Act

C.   U.S. Patriot Act

D.   Comprehensive Drug Abuse and Control Act

7: The goal of terrorists is to create emotional terror in a broad group of individuals.

A.   True

B.   False

8: In______, the Department of Homeland Security was created through an integration of 22 different federal agencies.

A.   2002

B.   2004

C.   2008

D.   2011

9: The U.S. Trafficking Victims Protection Act of 2000 identified types of “severe” human trafficking. These types of human trafficking use ______.

A.   Force

B.   Fraud

C.   Coercion

D.   All of these

10: According to the text, the most serious form of computer crime is cyberterrorism.

A.   True

B.   False

11: According to the text, ______ has the highest incarceration rate in the world.

A.   The Philippines

B.   Japan

C.   The United States

D.   Germany

12: ______ occur(s) when offenders gain access illegally to computer databases to which they do not have legitimate access.

A.   Theft

B.   Cyberterrorism

C.   Internet crimes

D.   Unauthorized access

E.   Software crimes

13: Penalty enhancement policies stipulate that offenders who use a gun in their offenses can receiver longer and stiffer jail and prison sentences.

A.   True

B.   False

14: Domestic terrorism is the unlawful use, or threatened use, of force or violence by a group or individuals based and operating entirely within the United States or ______.

A.   Puerto Rico

B.   Guam

C.   American Samoa

D.   The U.S. Virgin Islands

15: ______ find customers for drug dealers.

A.   Steerers

B.   Lookouts

C.   Touts

D.   Holders

16: _____ is policies that require gun distributors to conduct back-ground checks on gun purchasers before finalizing the sale.

A.   Superficial factors

B.   All of these

C.   Background Check Policies

D.   Diet

17: _____ is defined as comprehensive federal legislation governing drug laws.

A.   None of these

B.   They attend orientation and training in addition to continuing education.

C.   They are not typically given any formal training.

D.   Comprehensive Drug Abuse and Control Act

A.   None of these

B.   Multiagency gang task forces

C.   Targeted patrols

D.   Cybercrime

19: Is cyberterrorism the most serious form of computer crime; includes instances when offenders use computers to commit terrorist acts?

A.   False

B.   True

20: _____ is a type of computer crime in which the offender uses a computer to steal something from an individual, the government, or a business.

A.   Vandalism

B.   Cyber Theft

C.   All of these

D.   Robbery

21: _____ is defined as terrorist acts occur-ring in the United States with no connections to foreign entities.

A.   Boot camp

B.   None of these

C.   Domestic Terrorism

D.   Military Prisons

22: _____ is known as researchers who hack.

A.   Empirical Hackers

B.   All of these

C.   Both b and c

D.   Intermediate

23: Is evidence-Based Policies policies supported by empirical research?

A.   True

B.   False

24: _____ is hackers who hack for political reasons.

A.   None of these

B.   Verdict

C.   Sheriff’s Department/Office

D.   Hacktivists

A.   Formal Probation

B.   None of these

C.   Human Trafficking

D.   Deferred Status

26: _____ is known as a survey created in 1989 to assess victimization rates in different parts of the world.

A.   None of these

B.   International Crime Victimization Survey

C.   Political pressure

D.   Recidivism

27: Is international Terrorism terrorist acts committed with a specific connection to foreign entities?

A.   False

B.   True

28: _____ is a range of offenses in which the Internet is used to perpetrate offenses.

A.   Internet Crime

B.   Delinquent

C.   Neglected

D.   None of these

29: _____ is defined as a range of offenses in which the Internet is used to perpetrate offenses.

A.   Situational

B.   Work/home

C.   Internet Crime

D.   All of these

30: _____ is known as policies stipulating that offenders who use a gun in committing an offense can receive longer and stiffer jail and prison sentences because they used a gun.

A.   Science

B.   Penalty Enhancement Policies

C.   None

D.   All of these

31: Is possession Policies policies that generally regulate the possession of weapons?

A.   True

B.   False

32: _____ is with regard to gun crimes, targeted efforts by law enforcement and prosecutors to identify and send a message to specific individuals and groups at risk of gun violence so that they know these offenses will not be tolerated.

A.   It discriminates toward Whites.

B.   Pulling-Levers Policies

C.   All of these

D.   Day Reporting Center

33: _____ is defined as type of malware that holds a computer program hostage in exchange for anonymous payment.

A.   All of these

B.   Ransomware

C.   Direct Democracy

D.   Misdemeanor

34: _____ is known as inexperienced hackers.

A.   All of these

B.   Script Kiddies

C.   Booked

D.   Arrested

35: Is software Crimes crimes in which computer software is a primary part of the offense?

A.   False

B.   True

36: _____ is activities that individuals engage in to create terror and panic in specific groups of individuals.

A.   All of these

B.   Feeling powerless about decisions that directly affect their jobs

C.   Having a judge display an openly hostile attitude toward police

D.   Terrorism

37: _____ is defined as computer crime in which offenders gain access illegally to computer databases to which they do not have legitimate access.

A.   U.S. Patriot Act

B.   Homeland Security Act

C.   Unauthorized Access

D.   All of these

38: _____ is known as professional hackers selling vulnerabilities.

A.   Vulnerability Hackers

B.   All of these

C.   Culture

D.   Politics

39: Is white Hat Hackers those who hack in order to help businesses?

A.   False

B.   True