__________ is when a perpetrator harasses a victim using the Internet, e-mail, or some other electronic communication.
a. Cyberstalking
b. Hacking
c. Identity theft
d. Cyberbullying
Q. 2Rich steals Carol's Social Security number and uses it to access her financial resources. Rich is guilty of:
a. Identity fraud
b. Identity theft
c. Willful larceny
d. Identity misrepresentation
Q. 3The most significant federal statute specifically addressing cybercrime is the:
a. The Economic Espionage Act
b. The Cyber Crime Act
c. The Counterfeiting Consumer Act
d. Counterfeit Access Device and Computer Fraud and Abuse Act
Q. 4If a defendant loses at trial:
a. He may not appeal the case to a higher court
b. He may appeal the case to a higher court
c. He may appeal the case to a lower court
d. He may sue the judge
Q. 5Most __________ are not new crimes; they are existing crimes in which computers and the Internet are the instruments of wrongdoing.
a. Financial crimes
b. White-collar crimes
c. Organized crimes
d. Cyber crimes
Q. 6Which of the following is not an example of a cyber crime?
a. Sending threatening e-mails to a person met in an online chat room
b. Using the Social Security number of another to access that person's bank
account
c. Hacking into a corporation's bank account and diverting some funds to a
personal account
d. Using an Internet locator to search for the e-mail address of a former
significant other
Q. 7Falsely reporting income that has been obtained through criminal activity, such as illegal drug transactions, as income obtained through a legitimate business enterprise is called:
a. Insider trading
b. Money laundering
c. Obtaining goods by false pretenses
d. Receiving stolen goods