Criminal Justice Study Set 1

Criminal Justice

Quiz 18 :

High-Technology Crimesnment

Quiz 18 :

High-Technology Crimesnment

Question Type
search
arrow
________ applies scientific techniques to the detection and evaluation of criminal evidence.
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
Which of the following is an example of an early form of biometric technology used to identify individuals?
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
________ is a form of high-technology fraud that uses official-looking e-mail messages to steal valuable information by directing victims to phony websites.
Free
Multiple Choice
Answer:

Answer:

A

Tags
Choose question tag
close menu
arrow
________ is a system used to match a suspect's fingerprints against stored records.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Illegally copying a software program is known as software
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
________ includes criminal offenses committed through the use of altered genetic material.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
In which part of the world does software piracy appear to be most common?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following biocrimes would be considered bioterrorism?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
The study of insect behavior to determine the time of death of a corpse is called
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
________ is a category of cybercrime that includes stealing trade secrets or copyrighted information.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
________ involves recognizing people by physical characteristics and personal traits.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following is not a condition under which the procedures established by the Innocence Protection Act require a court to order DNA testing?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Alphonse Bertillon was responsible for creating the first
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A law enforcement agency that wants to compare a DNA profile they obtained from a crime scene with other DNA profiles around the country would use which of the following national database?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Planting a virus is an example of which category of cybercrime?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
What was the purpose of the SMILECon conference for police officers?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
________ is a nontechnical type of cyber intrusion that involves tricking people into breaking security procedures,such as persuading them to give out password details.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which criminalistics technique is used to reconstruct the likeness of a decomposed or dismembered body?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
________ includes computer worms and Trojan horses.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 83