Criminal Justice A Brief Introduction 12th International Edition by Frank Schmalleger – Test Bank

 

To Purchase this Complete Test Bank with Answers Click the link Below

 

https://tbzuiqe.com/product/criminal-justice-a-brief-introduction-12th-international-edition-by-frank-schmalleger-test-bank/

 

If face any problem or Further information contact us At tbzuiqe@gmail.com

 

 

 

Sample Test

Chapter 3—Understanding Crime and Victimization

 

MULTIPLE CHOICE

 

1.   Proponents of choice theory argue that criminals commit crimes based on:

a.

Free will

b.

Intelligence

c.

Peer pressure

d.

A drive to succeed

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 92

OBJ:   1                    TOP:   choice theory

 

2.   According to the principles of choice theory, in order for punishment to most effectively deter crime, it must meet what three conditions?

a.

Swift, satisfactory and certain

b.

Severe, certain and punitive

c.

Severe, certain and swift

d.

Intense, lasting and cumulative

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 93

OBJ:   2                    TOP:   choice theory

 

3.   The idea that a potential criminal would fear punishment because they know of someone else who was punished is referred to as:

a.

General deterrence

b.

Specific deterrence

c.

Routine activities theory

d.

Situational crime prevention

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 93

OBJ:   2                    TOP:   general deterrence

 

4.   A situation in which a potential criminal remembers the harsh punishment she has previously suffered and decides not to commit a crime exemplifies which of the following?

a.

General deterrence

b.

Specific deterrence

c.

Routine activities theory

d.

Situational crime prevention

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 95

OBJ:   2                    TOP:   specific deterrence

 

5.   Which philosophy of punishment advocates severely punishing offenders in an attempt to convince them to permanently cease committing criminal acts?

a.

Specific deterrence

b.

Rehabilitation

c.

Incapacitation

d.

General deterrence

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 95

OBJ:   2                    TOP:   specific deterrence

 

6.   Oscar Newman’s idea of defensible space is a part of which branch of rational choice theory?

a.

General deterrence

b.

Specific deterrence

c.

Routine activities theory

d.

Situational crime prevention

 

 

ANS:  D                    PTS:   1                    DIF:    3                    REF:   p. 96

OBJ:   2                    TOP:   situational crime prevention

 

7.   Target hardening techniques are examples of which type of situational crime prevention tactic?

a.

Increasing the effort needed to commit the crime

b.

Increasing the risks of committing the crime

c.

Reducing the rewards for committing the crime

d.

Inducing guilt or shame over the crime

 

 

ANS:  A                    PTS:   1                    DIF:    3                    REF:   p. 96

OBJ:   2                    TOP:   situational crime prevention

 

8.   The origins of scientific criminology are usually traced to the research of:

a.

Karl Marx

b.

Edwin Sutherland

c.

Cesare Lombroso

d.

Sigmund Freud

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 98

OBJ:   3                    TOP:   biological theories

 

9.   Which of the following theories considers crime a product of transitional neighborhoods that manifest value conflict?

a.

Social disorganization

b.

Social learning

c.

Strain

d.

Choice

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 109

OBJ:   6                    TOP:   the disorganized neighborhood

 

10.                Which of the following crime theories focuses on a person’s bonds to society as a factor in preventing crime?

a.

Social learning

b.

Social disorganization

c.

Choice

d.

Social control

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 114

OBJ:   7                    TOP:   choice theory

 

11.                Which theory suggests that those in power control the context and direction of the law and the legal system?

a.

Choice

b.

Social control

c.

Strain

d.

Critical

 

 

ANS:  D                    PTS:   1                    DIF:    1                    REF:   p. 116

OBJ:   8                    TOP:   critical criminology

 

12.                Who is credited with the creation of psychodynamic theory?

a.

Freud

b.

Jung

c.

Lewis

d.

Trevanian

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 101

OBJ:   4                    TOP:   psychodynamic theory

 

13.                Theorists who favor the _____ perspective argue that law violators suffer from impulse control due to ego or superego damage.

a.

Psychodynamic

b.

Genetic

c.

Behavioral

d.

Cognitive

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 101

OBJ:   4                    TOP:   psychodynamic theory

 

14.                According to social learning theory, people become violent because they:

a.

Model their behavior after others and have that behavior reinforced

b.

Are born with a predisposition towards violence due to their genetics

c.

Suffer damage to their egos and superegos at an early age

d.

Have a mental disorder or illness

 

 

ANS:  A                    PTS:   1                    DIF:    3                    REF:   p. 103

OBJ:   4                    TOP:   behavioral theory

 

15.                The concepts of moral development and information processing are associated with which branch of psychological theory?

a.

Cognitive

b.

Psychopath

c.

Behavioral

d.

Social learning

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 103

OBJ:   4                    TOP:   cognitive theory

 

16.                Crime is believed to be a product of transitional neighborhoods that manifest value conflict, according to which of the following types of theorists?

a.

Psychoanalytic theorists

b.

Social control theorists

c.

Social disorganization theorists

d.

Social learning theorists

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 108-109

OBJ:   6                    TOP:   social disorganization theory

 

17.                What has criminological research found regarding the psychopathic personality?

a.

An estimated 15 to 25 percent of all prison inmates can be classified as psychopaths.

b.

The majority of all prisoners can be classified as psychopaths.

c.

Most offenders are classified as sociopathic, rather than as psychopathic.

d.

The psychopathic personality is a myth with no support found for its existence in the research.

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 103

OBJ:   5                    TOP:   personality and crime

 

18.                The differences in the crime rate that exist across regions, states, or neighborhoods is a principal concern of what type of theory?

a.

Biological

b.

Psychological

c.

Sociological

d.

Developmental

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 107

OBJ:   6                    TOP:   sociological theories

 

19.                The origins of sociological criminology are usually traced to the pioneering work of:

a.

Edwin Sutherland

b.

Robert Merton

c.

Emile Durkheim

d.

Travis Hirschi

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 107

OBJ:   6                    TOP:   sociological theories

 

20.                The theory that people who adopt the goals of society but lack the means to attain them will seek alternatives, such as crime, is suggested by which of the following views?

a.

Strain theory

b.

Social learning theory

c.

Differential association theory

d.

Self-control theory

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 111

OBJ:   6                    TOP:   strain theory

 

21.                Which concept was proposed by Walter Miller in an attempt to explain the varied goals and values in poor neighborhoods?

a.

Focal concerns

b.

Culture of poverty

c.

Disinhibition

d.

Differential association

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 110

OBJ:   6                    TOP:   the disorganized neighborhood

 

22.                Which of the following was not one of the models of adaptation that Robert Merton produced as part of his explanation of how anomie can lead to crime?

a.

Innovation

b.

Rebellion

c.

Retreatism

d.

Toughness

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 111

OBJ:   6                    TOP:   strain theory

 

23.                Which of the following was not one of the elements of the social bond that Travis Hirschi elaborated on in his development of social control theory?

a.

Belief

b.

Attachment

c.

Commitment

d.

Socialization

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 114

OBJ:   7                    TOP:   control theory

 

24.                The concept of secondary deviance is most closely associated with which type of sociological theory?

a.

Labeling

b.

Conflict

c.

Strain

d.

Social disorganization

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 115

OBJ:   7                    TOP:   social reaction theory

 

25.                The concept of crime is a result of the rich and powerful’s imposition of their own moral standards and economic interests on the rest of society, according to the view of:

a.

Social control theorists

b.

Critical criminologists

c.

Latent trait theorists

d.

Social learning theorists

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 116

OBJ:   8                    TOP:   critical criminology

 

26.                Radical feminist scholars view the female criminal as a victim of:

a.

Economic disparity

b.

Social injustice

c.

Male dominance and gender inequality

d.

Anomie

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 117

OBJ:   8                    TOP:   critical criminology

 

27.                Which type of criminologist would call for universal social justice as a way to reduce crime?

a.

Peacemaking

b.

Psychodynamic

c.

Behavioral

d.

Left realist

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 117

OBJ:   8                    TOP:   critical criminology

 

28.                Which of the following is not a type of developmental theory?

a.

Age-graded

b.

Life course

c.

Latent trait

d.

Social strain

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 118

OBJ:   9                    TOP:   developmental theories

 

29.                According to the views of latent trait theory, fluctuations in offending rates are caused by:

a.

Varying criminal opportunities

b.

Varying diet and mineral supplements patterns

c.

Changes in the elements of the social bond

d.

Changes in the propensity to commit crime

 

 

ANS:  A                    PTS:   1                    DIF:    3                    REF:   p. 118

OBJ:   9                    TOP:   latent trait theory

 

30.                In their general theory of crime, Gottfredson and Hirschi argue that differences between individuals in the tendency to commit criminal acts stem from:

a.

The level of relative deprivation in their immediate environment

b.

Their level of self-control

c.

The perceived value of social injustice in the community

d.

Their tolerance for social strain

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 118

OBJ:   9                    TOP:   latent trait theory

 

31.                According to Sampson and Laub, what are the two most critical turning points in a criminal career?

a.

Marriage and employment

b.

Employment and imprisonment

c.

Children and imprisonment

d.

Victimization and social bonds

 

 

ANS:  A                    PTS:   1                    DIF:    3                    REF:   p. 120

OBJ:   9                    TOP:   age-graded theory

 

32.                The “encouragement” of criminal activity is often referred to as:

a.

Latent trait activation

b.

Victim precipitation

c.

Lifestyle theory

d.

Cognitive abuse of the victim

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 121

OBJ:   10                  TOP:   theories of victimization

 

33.                According to lifestyle theories, who is least likely to be a victim of crime?

a.

Someone who lives in a high-crime area

b.

Someone who spends time in public places

c.

Someone who goes out late at night

d.

Someone who is married and stays home at night

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 122

OBJ:   10                  TOP:   theories of victimization

 

34.                What does lifestyle theory posit about victimization?

a.

The victim invariably precipitates their own victimization

b.

Victimization is a function of social strain and precipitation

c.

Crime is not a random event and the probability of a crime occurring is dependent on the activities of the victim

d.

Victims are just as likely to become offenders as offenders are to become victims

 

 

ANS:  C                    PTS:   1                    DIF:    3                    REF:   p. 122

OBJ:   10                  TOP:   theories of victimization

 

35.                Which of the following is not one of the three factors linked to predatory crime rates in routine activities theory?

a.

Supply of motivated offenders

b.

Supply of suitable targets

c.

Absence of effective guardians for protection

d.

Extent of relative social deprivation

 

 

ANS:  D                    PTS:   1                    DIF:    3                    REF:   p. 123

OBJ:   10                  TOP:   routine activities theory

 

TRUE/FALSE

 

1.   The field of criminology is not concerned with the control of criminal behavior, only its causes.

 

ANS:  F                    PTS:   1                    DIF:    2                    REF:   p. 90

OBJ:   1                    TOP:   the causes of crime

 

2.   General deterrence seeks to stop criminals from repeating their behavior in the future.

 

ANS:  F                    PTS:   1                    DIF:    1                    REF:   p. 93-95

OBJ:   2                    TOP:   specific deterrence

 

3.   Approximately 20 percent of serious crimes reported to police result in an arrest.

 

ANS:  T                    PTS:   1                    DIF:    3                    REF:   p. 93

OBJ:   2                    TOP:   general deterrence

 

4.   Reducing the rewards for committing crime is one hallmark of the situational crime prevention approach.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 96

OBJ:   2                    TOP:   situational crime prevention

 

5.   Increasing the effort needed to commit a crime is one example of situational crime prevention.

 

ANS:  T                    PTS:   1                    DIF:    1                    REF:   p. 97

OBJ:   2                    TOP:   situational crime prevention

 

6.   Social learning theory is a type of psychological theory.

 

ANS:  F                    PTS:   1                    DIF:    2                    REF:   p. 102-103

OBJ:   4                    TOP:   behavioral theory

 

7.   Biocriminologists attempt to link physical traits with tendencies toward violence.

 

ANS:  T                    PTS:   1                    DIF:    1                    REF:   p. 98-99

OBJ:   3                    TOP:   biochemical factors

 

8.   Negative affective states is a concept associated with Robert Agnew’s general strain theory.

 

ANS:  T                    PTS:   1                    DIF:    3                    REF:   p. 111

OBJ:   6                    TOP:   strain theory

 

9.   According to Hirschi’s social control theory, belief is a key element of the social bond.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 114

OBJ:   7                    TOP:   social control theory

 

10.                The lack of capable guardians is a cornerstone of routine activities theory.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 123

OBJ:   10                  TOP:   routine activities theory

 

COMPLETION

 

1.   ____________________ is a crime control approach that seeks to instill fear of criminal penalties in the public.

 

ANS:  General deterrence

 

PTS:   1                    DIF:    1                    REF:   p. 93              OBJ:   2

TOP:   general deterrence

 

2.   ____________________ is a cognitive theory that focuses on a series of stages in childhood that define moral judgments in adulthood.

 

ANS:  Moral development theory

 

PTS:   1                    DIF:    2                    REF:   p. 103            OBJ:   4

TOP:   cognitive theory

 

3.   The concept of ____________________ refers to the absence or weakness of rules and social norms (normlessness) in any person or group.

 

ANS:  anomie

 

PTS:   1                    DIF:    1                    REF:   p. 107            OBJ:   6

TOP:   sociological theories

 

4.   The concept of ____________________ refers to the frustration and inner conflict experienced by people who believe that they cannot achieve their desires and goals through legitimate means.

 

ANS:  strain

 

PTS:   1                    DIF:    1                    REF:   p. 111            OBJ:   6

TOP:   sociological theories

 

5.   According to pioneering sociologist Robert Merton, members of the lower classes whose desire for success is frustrated by their circumstances may respond by adopting the methods of ____________________, retreatism, or rebellion.

 

ANS:  innovation

 

PTS:   1                    DIF:    3                    REF:   p. 111            OBJ:   6

TOP:   sociological theories

 

6.   According to social control theory, playing high school sports is an example of the ____________________ element of the social bond.

 

ANS:  involvement

 

PTS:   1                    DIF:    3                    REF:   p. 114            OBJ:   7

TOP:   social control theory

 

7.   According to labeling theorists, the use of social or physical restraints such as handcuffs, incarceration, or a criminal record are examples of ____________________ ceremonies, believed to leave a lasting impression on the accused.

 

ANS:  degradation

 

PTS:   1                    DIF:    2                    REF:   p. 115            OBJ:   7

TOP:   social reaction theory

 

8.   ____________________ theory focuses on the role of diet, hormones, environmental contaminants, and lead intake in criminal involvement.

 

ANS:  Biochemical

 

PTS:   1                    DIF:    1                    REF:   p. 98              OBJ:   3

TOP:   biochemical theory

 

9.   ____________________ theory views criminality as a dynamic process, influenced by a variety of individual characteristics, traits, and social experiences.

 

ANS:  Life course

 

PTS:   1                    DIF:    1                    REF:   p. 119            OBJ:   9

TOP:   life course theory

 

10.                According to Laub and Samson, “turning points” allow people to build ____________________, the positive relations with individuals and institutions that contribute to success.

 

ANS:  social capital

 

PTS:   1                    DIF:    1                    REF:   p. 119            OBJ:   9

TOP:   life course theory

 

ESSAY

 

1.   Discuss choice theory, including the types of deterrence and role of situational crime prevention.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 91-97         OBJ:   1 | 2

TOP:   choice theory | deterrence

 

2.   Apply the six tactics of situational crime prevention to a contemporary crime problem.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 96-97         OBJ:   2

TOP:   situational crime prevention

 

3.   Choose two biological theories and discuss the advantages and disadvantages of each.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 98-101       OBJ:   3

TOP:   biological theories

 

4.   Discuss the various psychological theories and the advantages and disadvantages of each.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 101-103     OBJ:   4

TOP:   psychological theories

 

5.   Use a sociological theory to explain the disproportionate incarceration of lower-class minorities.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 107-116     OBJ:   6 | 7

TOP:   sociological theories

 

6.   Use a sociological theory to explain gang-related violence.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 107-116     OBJ:   6 | 7

TOP:   sociological theories

 

7.   Using specific examples, describe social control theory and the role of social bonds in preventing crime.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 114-115     OBJ:   7

TOP:   social control theory

 

8.   Use labeling theory to explain why laws that notify the public regarding the whereabouts of sex offenders might actually increase recidivism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 115-116     OBJ:   7

TOP:   social reaction theory

 

9.   Explain the contributions of critical criminology through the use of examples.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 116-118     OBJ:   8

TOP:   critical criminology

 

10.                Explain predatory crime by applying routine activities theory.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 123-124     OBJ:   10

TOP:   routine activities theory

 

Chapter 5—Criminal Justice in the New Millennium: Terrorism, Homeland Security, and Cybercrime

 

MULTIPLE CHOICE

 

1.   The term terror was first associated with unrest in _____ in 1917.

a.

Iraq

b.

Germany

c.

Russia

d.

Ireland

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 168

OBJ:   2                    TOP:   terrorism

 

2.   A(n) _____ uses criminal and violent acts to influence an audience beyond the immediate target.

a.

Terrorist

b.

Guerilla

c.

Insurgent

d.

Revolutionary

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 169

OBJ:   1                    TOP:   defining terrorism

 

3.   A(n) _____ is the term for an irregular military band located in rural areas that attack military, police, and government targets.

a.

Terrorist

b.

Guerilla

c.

Insurgent

d.

Revolutionary

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 170

OBJ:   1                    TOP:   defining terrorism

 

4.   Which one of the following is not one of the theoretical explanations for terrorism discussed in the text?

a.

Social learning

b.

Socialization

c.

Alienation

d.

Psychological

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 169-170

OBJ:   3                    TOP:   who is the terrorist?

 

5.   _____ terrorists use violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views.

a.

Revolutionary

b.

Political

c.

Nationalist

d.

Retributive

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

6.   _____ terrorists promote the interests of a minority ethnic or religious group that believes it has been persecuted under majority rule and wishes to carve out its own independent homeland.

a.

Revolutionary

b.

Political

c.

Nationalist

d.

Retributive

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

7.   _____ terrorists fight for a cause with people anywhere whose ideology and/or religion they find objectionable.

a.

Revolutionary

b.

Political

c.

Nationalist

d.

Retributive

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

8.   A(n) _____ confronts the existing government for control of all or a portion of its territory, or forces political concessions in sharing political power.

a.

Terrorist

b.

Guerilla

c.

Insurgent

d.

Revolutionary

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 170

OBJ:   1                    TOP:   defining terrorism

 

9.   White supremacists are an example of _____ terrorists.

a.

Revolutionary

b.

Political

c.

Nationalist

d.

Retributive

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

10.                In what year did Congress pass legislation authorizing the creation of the Department of Homeland Security?

a.

1998

b.

2000

c.

2002

d.

2004

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 173

OBJ:   5                    TOP:   Homeland Security

 

11.                Less than _____ percent of cargo containers entering the United States every day are screened.

a.

5

b.

10

c.

15

d.

20

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 174

OBJ:   5                    TOP:   terrorism and law enforcement

 

12.                There are approximately 130 nuclear research reactors in _____ countries, with two dozen of these having enough highly enriched uranium for one or more nuclear bombs.

a.

twenty

b.

thirty

c.

forty

d.

fifty

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 174

OBJ:   5                    TOP:   terrorism and law enforcement

 

13.                The Department of Homeland Security is responsible for securing our nation’s borders and transportation systems, which include _____ ports of entry.

a.

150

b.

250

c.

350

d.

450

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 174

OBJ:   5                    TOP:   Homeland Security

 

14.                US-VISIT procedures were started in airports in what year?

a.

2000

b.

2002

c.

2004

d.

2006

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 177

OBJ:   5                    TOP:   Homeland Security

 

15.                _____ created the Anti-Terrorism Information Center to divide the states into operational zones, and link federal, state, and local information services in one system to combat terrorism.

a.

Alabama

b.

California

c.

Illinois

d.

Texas

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 175

OBJ:   6                    TOP:   state law enforcement

 

16.                Which of the following is an aim of the USA Patriot Act?

a.

To give sweeping new powers to domestic law enforcement and international intelligence agencies in an effort to fight terrorism

b.

To expand the definition of terrorist activities

c.

To alter sanctions for violent terrorism

d.

All of these are aims of the USA Patriot Act

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 178

OBJ:   7                    TOP:   confronting terrorism with the law

 

17.                The USA Patriot Act was reauthorized, keeping most of its provisions, in what year?

a.

2002

b.

2004

c.

2006

d.

2008

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 178

OBJ:   7                    TOP:   confronting terrorism with the law

 

18.                Civil libertarians argue that _____ Amendment rights may be violated by the USA Patriot Act.

a.

First

b.

Fourth

c.

Fifth

d.

Eighth

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 179

OBJ:   7                    TOP:   civil rights and the war against terrorism

 

19.                Which of the following is false about cybercrime?

a.

It is difficult to detect through traditional law enforcement channels.

b.

It is rapidly evolving.

c.

Its control demands that agents of the justice system develop technical skills.

d.

It is relatively easily controlled by law enforcement.

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 183

OBJ:   8                    TOP:   cybercrime

 

20.                _____ is the use of computer networks for undermining the social, economic, and political system of an enemy through the destruction of infrastructure.

a.

Cybertheft

b.

Cybervandalism

c.

Cyberterrorism

d.

Cybermovement

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 184

OBJ:   8                    TOP:   cybercrime

 

21.                Spending on IT and telecommunications will grow by more than six percent each year, soon reaching about:

a.

$1 million

b.

$2 million

c.

$2 billion

d.

$2 trillion

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 184

OBJ:   8                    TOP:   cybercrime

 

22.                Which of the following is not a type of cybercrime?

a.

Cybervandalism

b.

Cybertheft

c.

Cyberterrorism

d.

Cyberfraud

 

 

ANS:  D                    PTS:   1                    DIF:    3                    REF:   p. 184

OBJ:   8                    TOP:   cybercrime

 

23.                Which of the following is not an example of computer fraud?

a.

Theft of information

b.

Salami fraud

c.

Cybermovement

d.

Corporate espionage

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 184

OBJ:   8                    TOP:   cybercrime

 

24.                Which of the following is not a type of internet securities fraud?

a.

Identity theft

b.

Market manipulation

c.

Fraudulent offerings of securities

d.

Illegal touting

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 187

OBJ:   8                    TOP:   cybercrime

 

25.                _____ is the illegal acquisition of personal information such as bank passwords and credit card numbers by masquerading as a trustworthy person/business in what appears to be an official electronic communication.

a.

Etailing fraud

b.

Phishing

c.

Cybertheft

d.

Touting

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 188

OBJ:   8                    TOP:   cybercrime

 

26.                _____ is one type of malicious software program that disrupts or destroys existing programs and networks.

a.

Computer worms

b.

Computer virus

c.

Trojan horse

d.

Cyberbullying

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 188

OBJ:   8                    TOP:   cybercrime

 

27.                Which of the following types of cybercrime was not discussed in the text?

a.

Cyberterrorism

b.

Phishing

c.

Etailing

d.

Chiseling

 

 

ANS:  D                    PTS:   1                    DIF:    1                    REF:   p. 188

OBJ:   8                    TOP:   cybervandalism

 

28.                Which type of cybervandalism appears as a benign application which actually contains codes that can damage the system operations?

a.

Mydoom

b.

Trojan horse

c.

Malware

d.

Chiseling

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 188

OBJ:   8                    TOP:   cybervandalism

 

29.                In what type of cybercrime are small amounts of money subtracted from customers’ accounts and added to the account of the thief?

a.

Phishing

b.

Chiseling

c.

Salami fraud

d.

Trojan horse

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 185

OBJ:   8                    TOP:   cybercrime

 

30.                _____ involves hacking secure computer networks at the enemy’s most sensitive military bases, defense contractors and aerospace companies in order to steal important data or to access their defenses.

a.

Cyberterrorism

b.

Cyberespionage

c.

Cyberbullying

d.

Cyberstalking

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 190

OBJ:   9                    TOP:   cybercrime

 

31.                Since 1995 the New York Electronic Crimes Task Force has charged over 1000 individuals with electronic crime losses exceeding _____.

a.

$1 million

b.

$10 million

c.

$1 billion

d.

$10 billion

 

 

ANS:  C                    PTS:   1                    DIF:    3                    REF:   p. 191

OBJ:   10                  TOP:   cybercrime

 

32.                _____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.

a.

Warez

b.

Denial of service attack

c.

Market manipulation

d.

Cybertheft

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 187

OBJ:   8                    TOP:   cybercrime

 

33.                _____ is the term used to describe the illegal use of the internet to buy or sell merchandise online.

a.

Cybertheft

b.

Etailing fraud

c.

Market manipulation

d.

Denial of service attack

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 188

OBJ:   8                    TOP:   cybercrime

 

34.                The United States Criminal Code provides penalties for a first time illegal copyright offender of _____ years incarceration and a fine of $250,000.

a.

three

b.

five

c.

seven

d.

ten

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 191

OBJ:   10                  TOP:   cybercrime

 

35.                It is difficult to detect and control Internet pornography. Congress has struggled to create legislation that will restrict usage without violating _____ Amendment rights.

a.

First

b.

Fourth

c.

Sixth

d.

Eighth

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 191

OBJ:   10                  TOP:   cybercrime

 

TRUE/FALSE

 

1.   The term terrorism first appeared during the Vietnam War.

 

ANS:  F                    PTS:   1                    DIF:    1                    REF:   p. 168

OBJ:   1                    TOP:   terrorism

 

2.   The view that terrorists suffer psychological abnormality is well accepted by those advocating the psychological view.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 189

OBJ:   3                    TOP:   who is the terrorist?

 

3.   Lack of economic opportunity and recessionary economies are positively correlated with terrorism.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 189-190

OBJ:   3                    TOP:   who is the terrorist?

 

4.   Death squads and the use of government troops to destroy political opposition parties are often associated with state-sponsored terrorism.

 

ANS:  T                    PTS:   1                    DIF:    3                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

5.   The Department of Homeland Security is responsible for securing our nation’s borders and transportation systems.

 

ANS:  T                    PTS:   1                    DIF:    1                    REF:   p. 173

OBJ:   5                    TOP:   Homeland Security

 

6.   The salami slice is a computer program secretly attached to a company’s computer system.

 

ANS:  F                    PTS:   1                    DIF:    2                    REF:   p. 185

OBJ:   8                    TOP:   cybercrime

 

7.   Cyberterrorism may result in a battered economy in which the government is forced to spend more on the military and cut back on social programs and education.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 189

OBJ:   9                    TOP:   cyberterrorism

 

8.   Since September 11, 2001, biometrics have been implemented in many facets of the security systems of the United States.

 

ANS:  T                    PTS:   1                    DIF:    1                    REF:   p. 190

OBJ:   10                  TOP:   cyberterrorism

 

9.   According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000. A second time offender will receive five years incarceration.

 

ANS:  F                    PTS:   1                    DIF:    1                    REF:   p. 190

OBJ:   10                  TOP:   cybercrime

 

10.                There is some concern that the Child Online Protection Act controls free speech.

 

ANS:  T                    PTS:   1                    DIF:    3                    REF:   p. 191

OBJ:   10                  TOP:   cybercrime

 

COMPLETION

 

1.   ____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and processed by computer networks.

 

ANS:  Cybercrime

 

PTS:   1                    DIF:    1                    REF:   p. 183            OBJ:   1

TOP:   cybercrime

 

2.   ____________________ is an attack against an enemy nation’s technological infrastructure.

 

ANS:  Cyberterrorism

 

PTS:   1                    DIF:    1                    REF:   p. 189            OBJ:   9

TOP:   cyberterrorism

 

3.   The ____________________ view of terrorism argues that if terrorists suffer psychological deficiencies it is because they have been poorly and improperly socialized.

 

ANS:  socialization

 

PTS:   1                    DIF:    1                    REF:   p. 169-170     OBJ:   3

TOP:   who is the terrorist?

 

4.   The Department of ____________________ performs analyses of foreign nuclear weapons.

 

ANS:  Energy

 

PTS:   1                    DIF:    2                    REF:   p. 173            OBJ:   5

TOP:   Homeland Security

 

5.   The ____________________ is the government official charged with coordinating data from the nation’s primary intelligence gathering agencies.

 

ANS:  Director of National Intelligence

 

PTS:   1                    DIF:    3                    REF:   p. 173            OBJ:   5

TOP:   Homeland Security

 

6.   On October 26, 2001, Congress passed the ____________________.

 

ANS:  U.S. Patriot Act

 

PTS:   1                    DIF:    1                    REF:   p. 178            OBJ:   7

TOP:   confronting terrorism with the law

 

7.   The USAPA expands all four traditional tools of surveillance: wiretaps, search warrants, pen/trap order, and ____________________.

 

ANS:  subpoenas

 

PTS:   1                    DIF:    3                    REF:   p. 178            OBJ:   7

TOP:   confronting terrorism with the law

 

8.   The ____________________ is a computer program that appears benign but which actually contains something harmful.

 

ANS:  Trojan horse

 

PTS:   1                    DIF:    2                    REF:   p. 188            OBJ:   8

TOP:   cybercrime

 

9.   ____________________ occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.

 

ANS:  Illegal touting

 

PTS:   1                    DIF:    2                    REF:   p. 187            OBJ:   8

TOP:   cybercrime

 

10.                ____________________ is slang for the processes used to acquire personal information used for identity theft and other fraudulent activities.

 

ANS:  Phishing

 

PTS:   1                    DIF:    2                    REF:   p. 188            OBJ:   8

TOP:   cybercrime

 

ESSAY

 

1.   Discuss the history of terrorism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    1                    REF:   p. 168-169     OBJ:   2

TOP:   terrorism

 

2.   Compare and contrast two of the prevailing view on the motivation of terrorists.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 169-171     OBJ:   3

TOP:   who is the terrorist?

 

3.   Discuss the role of the Department of Homeland Security in the fight against terrorism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 173-175     OBJ:   5

TOP:   Homeland Security

 

4.   Elaborate the types of contemporary terrorism using examples.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 171-173     OBJ:   4

TOP:   the contemporary terrorist

 

5.   Explain what state and county and local law enforcement are doing to deal with the threat of terrorism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 175-178     OBJ:   6

TOP:   terrorism and law enforcement

 

6.   Discuss the purposes of the USA Patriot Act and then detail the concern about this Act by civil libertarians.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 178-179     OBJ:   7

TOP:   The USA Patriot Act

 

7.   Discuss three types of computer crimes using examples.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 183-188     OBJ:   8

TOP:   cybercrime

 

8.   Discuss the evolving role of law enforcement in fighting terrorism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 173-178     OBJ:   5 | 6

TOP:   terrorism and law enforcement

 

9.   Some policy experts suggest that the way to fight terrorism is to use political solutions. Discuss several political solutions to fight against terrorism using Al’Qaeda as an example.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 179-182     OBJ:   5 | 6

TOP:   terrorism and the law

 

10.                Discuss some of the problems with enforcing cyber laws and recent initiatives to attempt to combat cybercrime.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 190-192     OBJ:   10

TOP:   cybercrime

 

Comments

Popular posts from this blog

Business and Administrative Communication A Locker 12th Edition – Test Bank

Crafting and Executing Strategy The Quest for Competitive Advantage Concepts Arthur Thompson 22nd Edition- Test Bank

Experience Human Development 13Th Edition By Diane Papalia – Test Bank