Computer forensics test results are repeatable when the same results...
The Fourth Amendment provides everyone in the United States (e.g.,...
Cyberharassment is a crime that occurs when an individual uses the...
Online auction frauds often mimic real-life auction frauds.
Embezzlement occurs when an employee misappropriates the funds...
An example of telecommunications fraud is phone phreaking.
Routine border searches do not require reasonable suspicion, probable...
A cyberbully usually poses as the victim as a form of retaliation for...
The Taxpayer Browsing Protection Act 1997 was passed to criminalize...
For an AMBER alert to be issued, the abducted child must be 17 years...
The most common hacking technique is ___________________.
The computer is used as a tool to commit which of the following...
_____________ schemes involve soliciting investors to contribute to...
Criminals can steal a person's identity by
__________ are spoken words in a conversation or the words written in...
A __________ does not need user activity to make copies of itself and...
The victims of work at home scams are usually
Who can consent to a search if they have the authority over the...
_______________ is used to track users' online activities and deliver...
Public investigations are conducted by
The Fourth Amendment applies to searches conducted by private...
An employee has a reasonable expectation of privacy in the contents of...
Cyberterrorists may seek unauthorized access to critical...
Which of the following is malware?
__________ are known for posing as legitimate companies and government...
__________ is any kind of writing, video, or sound recording material...
The __________ amended existing legislation to remove any unnecessary...
To be valid, the warrant must specifically state ______________.
__________ occurs when an offender uses a victim's identity to...
Traffic data includes
Which of the following crimes would not have been possible without the...
To protect yourself from becoming a victim of identity theft, you...
The standard of proof in a civil trial is
The Patriot Act made it harder on law enforcement agencies to obtain...
__________. With this type of identity theft, an offender poses...
A ____________ scheme requires new investors to become involved...
Eyewitness testimony is an example of
Trade secrets are designed to protect individuals' inventions.
Hacking is cracking with criminal intent
Factors that may affect the feasibility of on-site and off-site...
The __________ states that forensic tools, techniques, procedures and...
Certain exceptions may justify the search of a computer without a...
The term used to describe a reproduction of someone else's recording...
The Sarbanes-Oxley Act of 2002
The _______________ scheme occurs when individuals falsely advertise...
______________ are designed to protect commercial identities or...
__________ was implemented to reduce the chilling effect that...
__________ occur when a perpetrator seeks to gain control over...
______________ occurs when a seller takes on various digital...
The four distinct steps in the computer forensics process are as...
Some crimes that fall under the personal crime category include:
__________ is based on targeted surveillance and affects only a...
__________ is a type of scam in which the offender creates a Web site...
The No Electronic Theft Act 1997 makes it a criminal offense to use a...
Computer forensics investigations focus on violations of
Investigations of administrative law violations can occur through the...
With the __________ exception, an investigator can seize evidence...
To be considered a cybercrime, computers must be
Trade secrets are protected under the Trademark Counterfeiting Act...
In a Nigerian scam
Shill bidding occurs when some bidders are lured off of legitimate...
Computer hijacking occurs when an individual takes control over a...
__________ consists of data about a communication.
The __________ is designed to protect children from exposure to...
Which of the following describe cybercrime?
Hacking occurs when an individual
The Children's Online Privacy Protection Act of 1998 controls the...
Certain exceptions to the exclusionary rule include __________.
Under the Fourth Amendment, search warrants must
The Digital Millennium Copyright Act 1998 made it a criminal offense...