AJS572 Week Four Quiz

Apr 15th, 2015
Studypool Tutor
Price: $10 USD

Tutor description

1) The reason it is difficult to develop a clear image of computer crime and to predict future trends is that data are not collected to document the nature, trends, and extent of computer crime. A. True B. False 2) As computers become increasingly integrated into daily life and more people utilize the Internet, cybervictimization will decrease. A. True B. False 3) Which is NOT part of the four categories of a computer crime? A. The computer as a target B. The computer as an instrument of the crime C. Crimes associated with the prevalence of computers D. The hard drive of a computer 4) The first step of risk analysis is to A. assess the situation. B. identify the threats. C. provide recommendations. D. contact local law enforcement. 5) A firewall is a device or software program that serves as a checkpoint between the Internet and a network or a stand-alone computer. A. True B. False 6) The greatest problem in computer security is password protection. A. True

Word Count: 620
Showing Page: 1/6
AJS/572 Week Four Quiz25 questions 1)The reason it is difficult to develop a clear image of computer crime and to predict future trends is that data are not collected to document the nature, trends, and extent of computer crime.A.TrueB.False2)As computers become increasingly integrated into daily life and more people utilize the Internet, cybervictimization will decrease.A.TrueB.False3)Which is NOT part of the four categories of a computer crime?A.The computer as a targetB.The computer as an instrument of the crimeC.Crimes associated with the prevalence of computersD.The hard drive of a computer4)The first step of risk analysis is toA.assess the situation.B.identify the threats.C.provide recommendations.D.contact local law enforcement.5)A firewall is a device or software program that serves as a checkpoint between the Internet and a network or a stand-alone computer.A.TrueB.False6)The greatest problem in computer security is password protection.A.TrueB.False7)Cyberstalkers can target victims inA.chat rooms.B.message boards.C.e-mails.D.All of theseE.None of these8)Phishing is a technique where someone is coerced through a lottery ticket.A.TrueB.False9)Through phishing scams, criminals attempt to obtainA.bank account numbers.B.birth dates.C.addresses.D.social security numbers.E.All of these10)Phisher

Review from student

Studypool Student
" Very Satisfied. "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1823 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors