233 Test 1B – Flashcards

Unlock all answers in this set

Unlock answers
question
The increased use of data mining can be attributed to the ________. decentralization of data absence of advanced algorithms increased availability of data increased storage costs
answer
increased availability of data
question
How does the Virtual Global Taskforce attempt to prevent sexual exploitation of children through its Operation Pin initiative? It authorizes electronic eavesdropping on any male aged 18 to 54 who visits the Innocent Images Web site. It implements computer surveillance on anyone who travels more than twice a year to prominent sex-tourism countries such as Thailand. It provides child porn Web sites with advanced computer-assisted technology that transforms real photos of child porn into virtual images. It hosts a phony child porn Web site and forwards to appropriate authorities the identity of anyone who attempts to download images.
answer
It hosts a phony child porn Web site and forwards to appropriate authorities the identity of anyone who attempts to download images.
question
The President's Working Group on Unlawful Conduct on the Internet was created to evaluate the ________. prohibition of disclosure of confidential information efficiency of data mining reliability of packet sniffing utility of education and empowerment tools
answer
utility of education and empowerment tools
question
The Terrorist Surveillance Program requires review and reauthorization of a surveillance every ________ days. 60 30 90 45
answer
45
question
Which of the following is true about the initiative "Innocent Images"? It investigated cases of interstate travelers for illicit purposes. Its purpose was to provide child pornographers with legal, innocent images as a substitute for pornographic ones. It investigated more than 5,000 cases in a three-year period. It investigated offenses under the Computer Fraud and Abuse Act.
answer
It investigated cases of interstate travelers for illicit purposes.
question
Which of the following represents the effort of the United Kingdom against cybercriminality? It allows the government to monitor and intercept Internet communications. It promotes private citizens' unrestricted access to encryption programs. It encourages anonymous Internet use and expands traditional notions of privacy. It restricts government agencies' access to encryption keys.
answer
It allows the government to monitor and intercept Internet communications.
question
The Identity Theft and Assumption Deterrence Act of 1998 authorizes imprisonment of up to ________ years for identity thefts. 20 10 5 25
answer
20
question
The three-tiered approach of the President's Working Group on Unlawful Conduct on the Internet includes all of the following EXCEPT ________. recognition of special needs for investigation of technological crime implementation of enhanced security measures on commercial airlines development of specialized curricula and support for leadership regulation of Internet criminal activity in the spirit of traditional criminal law
answer
implementation of enhanced security measures on commercial airlines
question
Which of the following is NOT a module of the Automated Targeting System? ATS-Passenger ATS-Nonimmigrant ATS-International ATS-Inbound
answer
ATS-Nonimmigrant
question
____ is the analysis parameter of data mining which involves finding and visually documenting groups of previously unknown facts. Classification Association Clustering Forecasting
answer
Clustering
question
If you notify a debt collector that a debt is unknown to you, which of the following measures is required by the Fair and Accurate Credit Transactions Act of 2003? You must be provided with information regarding your rights and dispute handling. The creditor can sell the debt to a third party. You must inform any third-party employers about the debt. The creditor can place the debt in collection.
answer
You must be provided with information regarding your rights and dispute handling.
question
The President's Working Group on Unlawful Conduct on the Internet encouraged local agencies to establish a presence on the Net in order to ________. reduce the number of misleading anonymous tips establish a link between the community and the Justice Department buy and maintain user records discarded by ISPs increase anonymity and thus draw criminals to the Net
answer
establish a link between the community and the Justice Department
question
The NSA's Terrorist Surveillance Program includes ________. in-terminal screening of air travelers license review of commercial airlines collection of telephone call information development of international treaties
answer
collection of telephone call information
question
Online copyright infringement has been categorized in ________ of the Cybercrime Convention by the Council of Europe. Title I Title II Title III Title IV
answer
Title IV
question
The airline passenger prescreening program Secure Flight modified CAPPS II by ________. putting greater emphasis on passenger privacy excluding a passenger redress process collecting more personal consumer information outsourcing passenger security checks to foreign companies
answer
putting greater emphasis on passenger privacy
question
Two top priorities for the international law enforcement agency Interpol are high technology and ________. data manipulation finance language translation data mining
answer
finance
question
Which of the following was recommended by the President's Working Group on Unlawful Conduct on the Internet? Allow ISPs to discard records after 24 hours. Restrict the training of average users, to prevent them from engaging in unlawful activity. Make exclusive use of traditional statutes rather than passing amendments or new legislation. Encourage local agencies to establish a presence on the Net.
answer
Encourage local agencies to establish a presence on the Net.
question
What technological development led the FBI in the early 2000s to include a keylogging program in the Cyber Knight project? Advances in data mining allowed terrorist groups to achieve total information awareness relating to Department of Homeland Security projects. Advances in encryption programs made it impossible for officials to descramble files containing criminal evidence. Advances in computer-assisted passenger prescreening systems required increased surveillance of the general public. Advances in cell phone keyboard technology increased the ratio of text-based to voice-based telecommunications.
answer
Advances in encryption programs made it impossible for officials to descramble files containing criminal evidence.
question
The Computer Fraud and Abuse Act provides for the punishment of individuals ________. only in offenses committed via computer technology only in offenses that caused damage to computer technology only in offenses involving computer data as the target in all offenses committed in conjunction with or via computer technology
answer
only in offenses involving computer data as the target
question
The Financial Action Task Force revised its recommendations in 2001 to specifically address issues of ________. terrorist financing data transmission copyright infringement child pornography
answer
terrorist financing
question
Which of the following statements is true about the International Association for Computer Investigation Specialists? It is a for-profit professional organization. Incorrect Response The certification process requires expensive and mandatory training. The certification test does not require any payment of fees. Individuals are certified as "computer forensic experts.
answer
Individuals are certified as "computer forensic experts.
question
All of the following are provisions of the Identity Theft Enforcement and Restitution Act EXCEPT ________. recovery of direct funds stolen from victims granting of federal jurisdiction in cases involving same state victimization narrowing the scope of activities to prosecute identity theft recovery of indirect costs of victimization
answer
narrowing the scope of activities to prosecute identity theft
question
What makes New York's identity theft statute unique among the fifty states? It prohibits the use of social security numbers as student identification numbers. It provides for the recovery of indirect costs of victimization including lost wages and credit rehabilitation. It allows individuals to challenge charges if personal identification information was used to illegally purchase alcohol or tobacco. It bars hospitals and health care organizations from selling patient data to foreign-based entities.
answer
It allows individuals to challenge charges if personal identification information was used to illegally purchase alcohol or tobacco.
question
Which of the following statements about Carnivore, a sniffing program, is true? It was widely and frequently used by FBI. The rationale for the FBI's use of the program did not need to be disclosed to any court. The interception had to continue after achieving the objective. Probable cause and details of the offense were to be specified before use.
answer
Probable cause and details of the offense were to be specified before use.
question
Which of the following is a provision of the federal Child Pornography Protection Act of 1996 that the Supreme Court ruled unconstitutional? The definition of child pornography includes wholly artificial images, entirely created through virtual, as opposed to actual, children. Mandatory life sentences shall be imposed on offenders involved in a sex offense against a minor if such offender has had a prior conviction of abuse against a minor. States may not enact blanket prohibitions against visualizations of children engaged in sexual situations. The federal government is empowered to establish a phony child porn Web site in order to entrap pedophiles.
answer
The definition of child pornography includes wholly artificial images, entirely created through virtual, as opposed to actual, children.
question
In which of the following cases did the Court specifically rely on statistics and opinions gathered from sources ranging from scholars to law enforcement practitioners in order to arrive at a conclusion, marking a clear departure from the normal procedure? New Yorker v. Ferber Miller v. California Ashcroft v. Free Speech Coalition Osborne v. Ohio
answer
New Yorker v. Ferber
question
The Unlawful Internet Gambling Enforcement Act of 2006 aimed at ________. reducing the flow of money regulating the number of online gambling sites preventing minors from participating in online gambling legitimizing online gambling
answer
reducing the flow of money
question
Which of the following determined that obscene material is not constitutionally protected by the First Amendment? Regina v. Hicklin Roth v. United States Osborne v. Ohio U.S. v. Williams
answer
Roth v. United States
question
Which of the following is NOT included in the PROTECT act as an addition to the provisions in the Child Pornography Protection Act? It allows electronic surveillance in cases involving child abuse or kidnapping. It forbids possession of images, movies, or anything that has sexually explicit images of children. It eliminates statutes of limitations for child abduction or child abuse. It provides for mandatory life sentences for minors who are deemed as habitual offenders.
answer
It forbids possession of images, movies, or anything that has sexually explicit images of children
question
Beginning with which case has the Supreme Court ruled that new media of communication must be scrutinized as they are developed and that varying media result in varying protections? Regina v. Hicklin Roth v. United States Osborne v. Ohio FCC v. Pacifica Foundation
answer
FCC v. Pacifica Foundation
question
Which Act was designed to address the problems with the Child Pornography Prevention Act? PROTECT Act Child Protection Act Child Sexual Abuse and Pornography Act Child Protection, Restoration and Penalties Enhancement Act
answer
PROTECT Act
question
Which of the following is a principal reason for the difficulty in handling obscenity? Obscenity is not punishable. Obscenity is not observable. Obscenity is not easily defined. Obscenity can be defended under the Fourteenth Amendment.
answer
Obscenity is not easily defined.
question
What makes Child Pornography Prevention Act (CPPA) different from Child Protection Act (CPA)? CPPA prohibited the production and distribution of computer-generated or other mechanically altered images of minors engaging in explicit conduct. CPPA upheld the Constitutional rights of the offenders who distributed computer-generated or other mechanically altered images of minors. CPPA legalized the production and distribution of computer-generated or other mechanically altered images of minors engaging in explicit conduct. CPPA assumed that the absence or presence of an actual victim is very relevant, as simulated child pornography did not violate a child's rights.
answer
CPPA prohibited the production and distribution of computer-generated or other mechanically altered images of minors engaging in explicit conduct.
question
Which of the following was enacted to prohibit virtual child pornography, arguing in part that the very existence of child pornography, real or not, increased child molestation and pedophilia? Child Protection and Obscenity Enforcement Act Child Sexual Abuse and Pornography Act Child Protection Act Child Pornography Prevention Act
answer
Child Pornography Prevention Act
question
The large majority of legal issues associated with technology-specific legislation involve ________. the First and Second Amendments the First, Fourth, and Fourteenth Amendments the First, Fourth, and Fifth Amendments the First, Second and Fourteenth Amendments
answer
the First, Fourth, and Fourteenth Amendments
question
Which of the following was the ground for the court to invalidate the Communications Decency Act? the harshness of retribution its inability to define "minor" its inability to protect the interests of children its overbreadth and vagueness
answer
its overbreadth and vagueness
question
How has the advent of electronic communications helped child pornographers defy the existing broad laws regarding indecency and victimization of children? Child pornographers argue that the Constitution guarantees their right to disseminate any information through the Internet. The origin of the pornographic material available on the Internet is untraceable. The Internet helps to spread pornography cheaply. Child pornographers argue that virtual children lack the requisite specified victim.
answer
Child pornographers argue that virtual children lack the requisite specified victim.
question
Which of the following reasons was NOT cited for ruling that George Carlin's broadcast monologue Filthy was not entitled to First Amendment protection? content of the communication depiction of children as victims of sexual exploitation pervasiveness of the selected medium accessibility to children
answer
depiction of children as victims of sexual exploitation
question
Which of the following did NOT uphold the constitutionality of the Child Pornography Prevention Act? the First Circuit the Ninth Circuit the Eleventh Circuit the Fourth Circuit
answer
the Ninth Circuit
question
Which of the following Constitutional Amendments poses the fewest challenges to computer crime investigators faced with interpreting and applying it? the First Amendment the Fifth Amendment the Fourteenth Amendment the Fourth Amendment
answer
the Fifth Amendment
question
Which Act was struck down as the Court observed that both teenage sexual activity and the sexual abuse of children had inspired countless literary works, including that of William Shakespeare and contemporary movies? Child Protection Restoration and Penalties Enhancement Act Child Sexual Abuse and Pornography Act Child Protection Act Child Pornography Prevention Act
answer
Child Pornography Prevention Act
question
Which of the following did the government traditionally rely upon to prosecute online sports wagering and bookmaking activities? Illegal Gambling Business Act Unlawful Internet Gambling Enforcement Act Gambling Enforcement Act Wire Act
answer
Wire Act
question
In which of the following cases did the Supreme Court observe that the CPPA prohibited speech despite its serious literary, artistic, political, or scientific value? United States v. Thomas New York v. Ferber Ashcroft v. Free Speech Coalition United States v. Boos
answer
Ashcroft v. Free Speech Coalition
question
Which of the following statements holds true regarding Osborne v. Ohio? The Court held that a person over the statutory age who perhaps looked younger could be utilized for literary or artistic value. The Court finally established a standard of scienter that had been lacking until then. The court argued that any legislation must be evaluated independently, as the First Amendment does require specificity in an elemental application. The Court relied on statistics and opinions gathered from sources ranging from scholars to law enforcement practitioners to child psychologists.
answer
The Court finally established a standard of scienter that had been lacking until then.
question
Which of the following statements is NOT true regarding the Supreme Court's findings when it revisited the obscenity issue in 1973? The Court recognized jurisdictional variability in standards of morality The Court held that minors and adults must be treated differently. The Court endorsed the notion of universal decency. The Court ruled that the state has a compelling interest in protecting the welfare of children.
answer
The Court endorsed the notion of universal decency.
question
Which of the following ruled that PROTECT prohibited a substantial amount of protected speech? the First Circuit the Fourth Circuit the Eleventh Circuit the Ninth Circuit
answer
the Eleventh Circuit
question
Which of the following is NOT a reason for the Supreme Court's ruling that the broad-based nature of radio communication mandated a greater level of scrutiny when broadcasting programs that contained probable indecent speech? The medium is available cheaply to people. Radio is more accessible to children. Broadcasting invaded the home of individual citizens. The scarcity of frequencies allowed government regulation.
answer
The medium is available cheaply to people.
question
Which of the following Acts replaced the Protection of Children against Sexual Exploitation Act of 1977, in an effort to tighten prohibitions of child pornography on the federal level? Child Protection and Obscenity Enforcement Act Child Sexual Abuse and Pornography Act Child Protection Act Child Protection Restoration and Penalties Enhancement Act
answer
Child Protection Act
question
Which of the following is the first act specifically aimed at protecting families and children from online sexually explicit materials? Child Protection Act Protection of Children against Sexual Exploitation Act Communications Decency Act Child Protection Restoration and Penalties Enhancement Act
answer
Communications Decency Act
question
Prior to the 1950s, which obscenity statute governed traditional notions of decency and obscenity? Regina v. Hicklin Roth v. United States Osborne v. Ohio U.S. v. Williams
answer
Regina v. Hicklin
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New