Filters
Question type

Study Flashcards

Biometrics is an advanced technique designed to help determine the cause of injury or death.

Correct Answer

verifed

verified

The Council of Europe cybercrime treaty focuses on standardizing cybercrime laws around the world.

Correct Answer

verifed

verified

True

Alphonse Bertillion pioneered the use of fingerprints to identify offenders.

Correct Answer

verifed

verified

What is biocrime? Discuss the various ways biocrimes may be committed,and include a discussion of bioterrorism.Provide examples of biocrimes and explain why biocrime is a major concern today.

Correct Answer

verifed

verified

Answers will vary but should define bioc...

View Answer

A crime that employs advanced or emerging technology in its commission is known as a cybercrime.

Correct Answer

verifed

verified

DNA analysis can prove either guilt or innocence.

Correct Answer

verifed

verified

Planting a virus is an example of which category of cybercrime?


A) Electronic vandalism
B) Information piracy
C) Telemarketing fraud
D) Theft of services

Correct Answer

verifed

verified

Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification?


A) Digital fingerprint analysis
B) Retinal scanning
C) DNA analysis
D) Hand geometry

Correct Answer

verifed

verified

In which part of the world does software piracy appear to be most common?


A) The United States
B) Latin America
C) Western Europe
D) Asia

Correct Answer

verifed

verified

Explain how and why social media is being used by law enforcement.Also discuss the problems that may result from the adoption of social media by law enforcement agencies.

Correct Answer

verifed

verified

Social media can have many benefits for ...

View Answer

Illegally copying software programs is known as ________.

Correct Answer

verifed

verified

HITMAN and NCVAC are examples of ________ designed to duplicate the decision-making processes of skilled investigators.

Correct Answer

verifed

verified

The most likely way for a criminal to break into a computer system is through ________.

Correct Answer

verifed

verified

The Department of Homeland security is particularly concerned about the possibility that weapons of mass destruction may enter the U.S.through our nation's airports.

Correct Answer

verifed

verified

________ involves recognizing people by physical characteristics and personal traits.


A) DNA profiling
B) Forensic anthropology
C) Ballistics
D) Biometrics

Correct Answer

verifed

verified

D

Match the cybercrime to its definition. A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service B)The use of official-looking email messages to elicit response from victims by directing them to phony websites C)The illegal transfer of data from one storage medium to another D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system E)Malicious computer programs such as worms or Trojan horses -Software piracy

Correct Answer

verifed

verified

HITMAN is the latest technology used by the FBI to track and capture mafia-related criminals.

Correct Answer

verifed

verified

Which of the following is an example of an early form of biometric technology used to identify individuals?


A) Voice authentication systems
B) Fingerprinting
C) Body odor sniffers
D) Retinal scanning

Correct Answer

verifed

verified

Phishing is usually done through texts and calls from cell phones.

Correct Answer

verifed

verified

False

CODIS is a DNA database that allows law enforcement agencies to compare DNA profiles to identify suspects or link serial crimes.

Correct Answer

verifed

verified

Showing 1 - 20 of 83

Related Exams

Show Answer