Investigators observe that physical evidence in computer crimes is the same as in traditional crimes

In order to continue enjoying our site, we ask that you confirm your identity as a human. Thank you very much for your cooperation.

What is this crime?A. HackingB. ScanningC. Data diddlingD. Trojan horseAnswer: D

According to the Dictionary of Criminal Justice Data Terminology, which of the following are considered elements of the definition of white-collar crime? I. Crime committed by means of deception II. Nonviolent crime, committed for financial gain III. Crime committed by professionals or semi-professionals A. II, III B. I, II C. I, II, III D. I, III

What is the basic fee for recycling money of a suspicious origin? A. an average of 4 percent B. between 10 to 15 percent C. an average of 25 percent D. between 15 and 20 percent

. What does a Currency Transaction Report (CTR) require banks to record? A. cash transactions of $5,000 or more B. cash transactions of $10,000 or more C. cash transactions of $1,000 or more D. suspicious conditions in transactions of $50,000 or more

Danielle is a “smurf” for a drug cartel. Which best illustrates her actions? A. She carries large denominations of drug money hidden on her person and flies from the United States to South America. B. She takes cash to a bank and makes several transactions, trading small bills for larger ones. C. She makes large transactions via fax or personal computer, thus avoiding personal interactions with banking personnel. D. She goes to several different banks and purchases cashiers checks in denominations of less than the required CTR reporting amount.

Which one of the following government agencies does NOT investigate money laundering schemes? A. FBI B. USPS C. IRS D. DEA

Which confidence game involves conning victims into making small investments that they believe could potentially earn them huge revenues? A. bank examiner scheme B. wallet switch scam C. pigeon drop D. pyramid scheme

. In which one of the following confidence games is the victim contacted by a con who pretends to need help in conducting an investigation? A. the bank examiner scheme B. the get rich quick scheme C. the magazine subscription scam D. the pigeon drop

Diddling involves which unlawful computer practice? A. pushing a computer’s capabilities to its limits, regardless of consequences B. entering incorrect data to falsify records C. inserting an electronic letter bomb attack D. acquiring characteristics to assume an unauthorized password

Which of the following computer crimes involves the secret placement or alteration of computer instructions so that one computer tells another how to perform illegal functions? A. masquerading B. Trojan horses C. computer viruses D. superzapping

Officer Dale is conducting a computer crime investigation. Which action might cause him to lose his computer evidence? A. Store paper printouts of computerized data away from direct sunlight. B. “Park” hard drives before moving them. C. Document the configuration of a computer and what add-on equipment is involved. D. Place magnetic tape and disks near stereo speakers and printers.

. The Dictionary of Criminal Justice Data Terminology offers the following definition: “Non-violent crime for financial gain committed by means of deception by persons whose occupational status is entrepreneurial, professional or semi-professional, and utilizing their special occupational skills and opportunities.”What crime is this defining? A. Fraud. B. Credit card crimes.C. Check fraud. D. White-collar crime.

Con man 1 finds a wallet, purse, attaché case, or even a paper bag apparently filled with money. An unsuspecting victim standing nearby witnesses the discovery. At that time, con man 2 appears and claims that he is entitled to a share of the loot just as much as the other. It should occur to the victim at this point that he or she should share in the proceeds.What crime is being committed? A. The pyramid scheme.B. The bank examiner scheme.C. The travel scam.D. The pigeon drop.

Julie goes to the store to buy a new backpack for school and intends to use a credit card to pay for it. What is the only common security measure used on all credit cards? A. A picture ID.B. The signature panel.C. Asking for a zip code. D. All of the above are required by retailers.

What is the purpose of money laundering? A. It conceals the source of the illegal money. B. It gives that money a legitimate history and paper trail.C. It conceals the amount of money made by illegal means. D. All of the above are true of money laundering.

Jose is involved in drug sales and these illegal drug transactions are usually cash transactions, commonly resulting in large amounts of currency in excess of $20,000. Jose uses this money to pay off various lower dealers and suppliers. Jose needs to legitimize his cash proceeds in a fashion that permits him to spend it wherever and whenever he desires without attracting suspicion. What prevents Jose from depositing $20,000 in cash in a bank? A. The federal CTR requirement. B. His distrust of banks. C. His suppliers mandate that only credit unions be used. D. Nothing prevents him from using a bank.

. What is a CTR? A. A Criminal Trade Record. B. A Common Trade Resource.C. A Criminal Treasury Record. D. A Currency Transaction Report.

A trafficker provides several individuals with cash from drug sales. Each person goes to different banks and purchases cashier’s checks in denominations of less than $10,000, thus bypassing the reporting requirement. These people then turn the checks over to a second person, who facilitates their subsequent deposit into domestic banks. Who are the people who obtained the cashier’s checks with the cash from the trafficker? A. MulesB. TelliesC. DoggiesD. Smurfs

Investigations of money laundering are routinely performed by such agencies as the Federal Bureau of Investigation (FBI), DEA, and the Internal Revenue Service (IRS). However, a recently established investigative unit housed under the Department of the Treasury also conducts such investigations.What is the name of this agency under the Department of the Treasury? A. The Financial Crimes Enforcement Network (FinCEN). B. TMLI – the Taskforce of Money-Laundering Investigations. C. AQuB – Acquisition Question Bureau D. All of the above are recent investigative branches within the Department of the Treasury.

What is a cybercrime?A. Any crime committed with the aid of a computer. B. A crime that takes place over the Internet. C. A theft of a “smartphone” with Internet capability. D. A “selfie” containing nudity.

Computer crime investigations are dynamic in nature. Therefore, their detection and investigation differ in several respects from that of other more traditional crimes.Choose the statement below that identifies a difference between the two types of crimes: A. Physical evidence in computer crimes is different from that in traditional crimes.B. The volume of evidence encountered in computer crimes is less than traditional criminal casesC. Offenders can commit crimes but the amount of effort is burdensome and is very difficult. D. Offenders cannot destroy evidence with ease.

This crime involves the most common activity of computer system intruders. It is also one of the most difficult to prove after the case goes to trial. It is the process of one person assuming the identity of an authorized computer user by acquiring items, knowledge, or characteristics.What is this crime? A. HackingB. Scanning C. Data diddlingD. Masquerading

A timekeeping clerk fills out data forms for hours worked by 300 employees for a railroad. He found that there was very little oversight over the system so he filled out forms for overtime hours worked, using the names of employees who frequently worked overtime, but entered his own employee number on the forms which were then entered onto the computer. The clerk was issued the extra pay for the overtime. What is this crime? A. HackingB. Scanning C. Data diddlingD. Masquerading

This computer crime involves the secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions. It is unique in that it usually also allows the victim computer to perform most or all of the functions for its originally intended purposes. The intent of this crime is often used for inserting instructions for logic bombs, salami attacks, and viruses.What is this crime? A. HackingB. Scanning C. Data diddlingD. Trojan horse

Research shows that organizations are more vulnerable to people with certain characteristics.Which statement below reflects a typical cyber-criminal? A. John is young, college educated, and is somewhat “overqualified” for his current position. B. Julie is middle-aged and is moderately paid. C. Bob is 50 years old, very outgoing and friendly, and is a self-taught computer data entry technician. D. Nancy has just been hired as a computer programmer and is learning the skills necessary to be able to keep her job.

Bill is being investigated for a computer crime. Evidence has been gathered and others have already been interviewed. Now the lead investigator wants to interview the suspect. Which statement below is true regarding the willingness of the suspect to voluntarily agree to be interviewed? A. Most suspects will not agree to be interviewed.B. Many suspects voluntarily talk with investigators because they may believe that their actions might be unethical or immoral but not criminal in nature.C. Cyber-suspects often become violent if cornered by the investigator. D. Suspects generally agree to an interview if the investigator is female as most suspects are male and are socially awkward.

It is highly unlikely that government seizure of drug cartel assets will result in putting the cartel out of business.

True or False

Drug cartels provide short-term financial benefits to Latin American debtor nations, but such benefits lead to inflation.

True or False

Corporate crime is a form of white-collar crime whereby trusted executives working within a company mishandle funds or otherwise betray the trust of customers or other consumers.

True or False

“Smurfing” and “double invoicing” are examples of white-collar crime.

True or False

Software is generally considered the physical computer itself and any peripherals associated with it, such as printers, telephone modems, and external disk drives.

True or False

Investigators observe that physical evidence in computer crimes is the same as in traditional crimes.

True of False

Computer crime offenders can commit computer crimes and destroy evidence with ease.

True or False

Computer crime requires a greater amount of technical expertise by investigators and prosecutors, and its investigation is likely to require a considerable investment of time.

True or False

Computer crime investigations are not investigative in nature—requiring 10 percent traditional police work and 90 percent technical skill.

True or False

Money orders have been used in crimes including narcotics trafficking, firearms trafficking, and depositing illicit proceeds from alien smuggling and corporate fraud.

True or False

Postingan terbaru

LIHAT SEMUA