Cybercrime and the Future of Crime MCQs

Cybercrime and the Future of Crime MCQs

Answer these 30 Cybercrime and the Future of Crime MCQs and see how sharp is your knowledge of Cybercrime and the Future of Crime.
Scroll down and let's start!

1: Cyberterrorism includes all of the following except ______.

A.   Critical infrastructure attacks

B.   Fund-raising

C.   Fraud

D.   Overt communications

2: Approximately 80 percent of cybercrime is committed by “insiders” or employees.

A.   True

B.   False

3: ______ is the idea that technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.

A.   Cultural lag

B.   Manifest

C.   Hacker’s ethics

D.   Latent function

4: Doing psychological harm to or inciting physical harm against others, thereby breaching laws relating to the protection of the person, is an example of ______.

A.   Cybertrespass

B.   Cyberdeceptions

C.   Cyberpornography

D.   Cyberviolence

5: The Youth Internet Safety Survey found that ______ percent of the young people they surveyed reported having been the victims of reputed harassment (threats, rumors, or other offensive behavior) during the past year.

A.   One

B.   Six

C.   Ten

D.   15

6: Delphi techniques are procedures that ask a panel of experts to predict the future.

A.   True

B.   False

7: Which of the following were identified as crime predictions?

A.   Electronic tagging

B.   Robotics and cloning

C.   Increase in scams

D.   All of these

8: Manifest functions are unanticipated, unintended, hidden functions of social change.

A.   True

B.   False

9: ______ are subprograms (hidden in a program) that contain a virus, bomb, or other harmful feature.

A.   Trojan horses

B.   Email bombs

C.   Denial of service attacks

D.   Dictionary attacks

10: Which of the following were identified as ways to keep children safe on the internet?

A.   Children should not be allowed to use computers in schools.

B.   Parents should play a more proactive role in monitoring their children’s use of the internet.

C.   Teachers should limit the number of websites that children visit while they are in school.

D.   Parents should not allow children under the age of 12 years to use a computer.

11: The development of newer synthetic drugs like ecstasy poses future challenges for crime control.

A.   True

B.   False

12: The TV show in which online predators were lured on Internet chat rooms to show up at the homes of minors whose parents were supposedly not home was called ______.

A.   Wonderland Club

B.   To Catch a Predator

C.   Operation Bot Roast

D.   Click Fraud

13: Which of the following were identified as British Home Office Predictions?

A.   Virtual-reality addiction may increase

B.   Decreases in the use of cash

C.   Introduction of the 24-city could create more opportunities for crime

D.   All of these

14: The concept that there should be no restrictions on a hacker’s right to surf the net is referred to as ______.

A.   Manifest functions

B.   Cultural lag

C.   Hacker’s ethics

D.   Project pinpoint

15: Web spoofing is creating a false (shadow) version of a website controlled by the attacker.

A.   True

B.   False

16: An internet-based crime is referred to as a(n) ____ crime.

A.   Never

B.   Updates

C.   Cyber

D.   User

17: Dos and ddos attacks use _______ to prevent authorized users from accessing the system resources.

A.   SYN

B.   Firewall

C.   Links

18: _____ is known as the stereotypical hacker who is a criminal.

A.   Gender

B.   Cultural

C.   “Black hat” hacker

D.   All of these

19: Is crackers ill-intended hackers who attempt to crack (break into) computer systems, often in order to do damage?

A.   True

B.   False

20: _____ is the idea that change takes place unevenly— technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.

A.   More

B.   Cultural lag

C.   Mala prohibita

D.   All of these

21: _____ is defined as crime that uses the computer as a tool in crime commission.

A.   All of these

B.   Psychological

C.   Cybercrime

D.   Sociological

22: _____ is known as procedures that ask a panel of experts to predict the future.

A.   All of these

B.   Gottfredson and Hirschi

C.   Merton

D.   Delphi techniques

23: Is hackers unwanted electronic guests regardless of motive?

A.   True

B.   False

24: _____ is that there should be no restrictions on their right to surf the Internet and test systems.

A.   Pyramid

B.   Argot

C.   All of these

D.   Hacker’s ethic

25: _____ is defined as items that are in high demand to be stolen.

A.   Multiplies

B.   None of these

C.   Increases

D.   Hot products

26: _____ is known as entails a cracker stealing password, account, or credit card information.

A.   Phishing

B.   Misdemeanor

C.   Mala in se

D.   All of these

27: Is salami techniques a computer crime in which small slices (amounts of money) are taken from many accounts and transferred to that of the thief?

A.   True

B.   False

28: _____ is creates a false (shadow) version of a website that is controlled by the attacker.

A.   External validity

B.   More engagement with the field

C.   All of these

D.   Spoofing

29: _____ is defined as a secret, malicious computer program hidden within other programs.

A.   Trojan horse

B.   All of these

C.   Denmark

D.   United States

30: _____ is known as hackers who work to protect systems rather than harm them.

A.   All of these

B.   The criminal justice system is soft on white-collar crime.

C.   “white hat” hackers

D.   Online piracy results in lost revenue.

31: Is worms similar to viruses that reproduce themselves and subvert computer systems but can spread with no assistance?

A.   False

B.   True