Criminal Justice A Brief Introduction 12th International Edition by Frank Schmalleger – Test Bank
To Purchase this Complete Test Bank with Answers Click the link Below
If face any problem or
Further information contact us At tbzuiqe@gmail.com
Sample Test
Chapter 3—Understanding Crime and Victimization
MULTIPLE CHOICE
1. Proponents
of choice theory argue that criminals commit crimes based on:
|
a. |
Free will |
|
b. |
Intelligence |
|
c. |
Peer pressure |
|
d. |
A drive to succeed |
ANS:
A
PTS:
1
DIF:
1
REF: p. 92
OBJ:
1
TOP: choice theory
2. According
to the principles of choice theory, in order for punishment to most effectively
deter crime, it must meet what three conditions?
|
a. |
Swift, satisfactory and certain |
|
b. |
Severe, certain and punitive |
|
c. |
Severe, certain and swift |
|
d. |
Intense, lasting and cumulative |
ANS:
C
PTS:
1
DIF:
2
REF: p. 93
OBJ:
2
TOP: choice theory
3. The
idea that a potential criminal would fear punishment because they know of
someone else who was punished is referred to as:
|
a. |
General deterrence |
|
b. |
Specific deterrence |
|
c. |
Routine activities theory |
|
d. |
Situational crime prevention |
ANS:
A
PTS:
1
DIF: 1
REF: p. 93
OBJ:
2
TOP: general deterrence
4. A
situation in which a potential criminal remembers the harsh punishment she has
previously suffered and decides not to commit a crime exemplifies which of the
following?
|
a. |
General deterrence |
|
b. |
Specific deterrence |
|
c. |
Routine activities theory |
|
d. |
Situational crime prevention |
ANS:
B
PTS:
1
DIF:
1
REF: p. 95
OBJ: 2
TOP: specific deterrence
5. Which
philosophy of punishment advocates severely punishing offenders in an attempt
to convince them to permanently cease committing criminal acts?
|
a. |
Specific deterrence |
|
b. |
Rehabilitation |
|
c. |
Incapacitation |
|
d. |
General deterrence |
ANS:
A
PTS:
1
DIF:
2
REF: p. 95
OBJ:
2
TOP: specific deterrence
6. Oscar
Newman’s idea of defensible space is a part of which branch of rational choice
theory?
|
a. |
General deterrence |
|
b. |
Specific deterrence |
|
c. |
Routine activities theory |
|
d. |
Situational crime prevention |
ANS:
D
PTS:
1
DIF:
3
REF: p. 96
OBJ: 2
TOP: situational crime prevention
7. Target
hardening techniques are examples of which type of situational crime prevention
tactic?
|
a. |
Increasing the effort needed to commit
the crime |
|
b. |
Increasing the risks of committing the crime |
|
c. |
Reducing the rewards for committing the
crime |
|
d. |
Inducing guilt or shame over the crime |
ANS:
A
PTS:
1
DIF:
3
REF: p. 96
OBJ:
2
TOP: situational crime prevention
8. The
origins of scientific criminology are usually traced to the research of:
|
a. |
Karl Marx |
|
b. |
Edwin Sutherland |
|
c. |
Cesare Lombroso |
|
d. |
Sigmund Freud |
ANS:
C
PTS: 1
DIF:
1
REF: p. 98
OBJ:
3
TOP: biological theories
9. Which
of the following theories considers crime a product of transitional
neighborhoods that manifest value conflict?
|
a. |
Social disorganization |
|
b. |
Social learning |
|
c. |
Strain |
|
d. |
Choice |
ANS:
A
PTS:
1
DIF:
2
REF: p. 109
OBJ:
6
TOP: the disorganized neighborhood
10.
Which of the following crime theories focuses on a person’s
bonds to society as a factor in preventing crime?
|
a. |
Social learning |
|
b. |
Social disorganization |
|
c. |
Choice |
|
d. |
Social control |
ANS:
D
PTS:
1
DIF: 2
REF: p. 114
OBJ:
7
TOP: choice theory
11.
Which theory suggests that those in power control the context
and direction of the law and the legal system?
|
a. |
Choice |
|
b. |
Social control |
|
c. |
Strain |
|
d. |
Critical |
ANS:
D
PTS:
1
DIF:
1
REF: p. 116
OBJ:
8
TOP: critical criminology
12.
Who is credited with the creation of psychodynamic theory?
|
a. |
Freud |
|
b. |
Jung |
|
c. |
Lewis |
|
d. |
Trevanian |
ANS:
A
PTS:
1
DIF:
1
REF: p. 101
OBJ:
4
TOP: psychodynamic theory
13.
Theorists who favor the _____ perspective argue that law
violators suffer from impulse control due to ego or superego damage.
|
a. |
Psychodynamic |
|
b. |
Genetic |
|
c. |
Behavioral |
|
d. |
Cognitive |
ANS:
A
PTS:
1
DIF:
2
REF: p. 101
OBJ:
4
TOP: psychodynamic theory
14.
According to social learning theory, people become violent
because they:
|
a. |
Model their behavior after others and
have that behavior reinforced |
|
b. |
Are born with a predisposition towards
violence due to their genetics |
|
c. |
Suffer damage to their egos and
superegos at an early age |
|
d. |
Have a mental disorder or illness |
ANS:
A
PTS:
1
DIF:
3
REF: p. 103
OBJ:
4
TOP: behavioral theory
15.
The concepts of moral development and information processing are
associated with which branch of psychological theory?
|
a. |
Cognitive |
|
b. |
Psychopath |
|
c. |
Behavioral |
|
d. |
Social learning |
ANS:
A
PTS: 1
DIF:
2
REF: p. 103
OBJ:
4
TOP: cognitive theory
16.
Crime is believed to be a product of transitional neighborhoods
that manifest value conflict, according to which of the following types of
theorists?
|
a. |
Psychoanalytic theorists |
|
b. |
Social control theorists |
|
c. |
Social disorganization theorists |
|
d. |
Social learning theorists |
ANS:
C
PTS:
1
DIF:
2
REF: p. 108-109
OBJ: 6
TOP: social disorganization theory
17.
What has criminological research found regarding the
psychopathic personality?
|
a. |
An estimated 15 to 25 percent of all
prison inmates can be classified as psychopaths. |
|
b. |
The majority of all prisoners can be
classified as psychopaths. |
|
c. |
Most offenders are classified as
sociopathic, rather than as psychopathic. |
|
d. |
The psychopathic personality is a myth
with no support found for its existence in the research. |
ANS: A
PTS:
1
DIF:
2
REF: p. 103
OBJ:
5
TOP: personality and crime
18.
The differences in the crime rate that exist across regions,
states, or neighborhoods is a principal concern of what type of theory?
|
a. |
Biological |
|
b. |
Psychological |
|
c. |
Sociological |
|
d. |
Developmental |
ANS:
C
PTS:
1
DIF:
1
REF: p. 107
OBJ:
6
TOP: sociological theories
19.
The origins of sociological criminology are usually traced to
the pioneering work of:
|
a. |
Edwin Sutherland |
|
b. |
Robert Merton |
|
c. |
Emile Durkheim |
|
d. |
Travis Hirschi |
ANS:
C
PTS: 1
DIF:
1
REF: p. 107
OBJ:
6
TOP: sociological theories
20.
The theory that people who adopt the goals of society but lack
the means to attain them will seek alternatives, such as crime, is suggested by
which of the following views?
|
a. |
Strain theory |
|
b. |
Social learning theory |
|
c. |
Differential association theory |
|
d. |
Self-control theory |
ANS:
A
PTS:
1
DIF:
2
REF: p. 111
OBJ:
6
TOP: strain theory
21.
Which concept was proposed by Walter Miller in an attempt to
explain the varied goals and values in poor neighborhoods?
|
a. |
Focal concerns |
|
b. |
Culture of poverty |
|
c. |
Disinhibition |
|
d. |
Differential association |
ANS:
A
PTS:
1
DIF:
2
REF: p. 110
OBJ:
6
TOP: the disorganized neighborhood
22.
Which of the following was not one of the models of adaptation
that Robert Merton produced as part of his explanation of how anomie can lead
to crime?
|
a. |
Innovation |
|
b. |
Rebellion |
|
c. |
Retreatism |
|
d. |
Toughness |
ANS:
D
PTS:
1
DIF: 2
REF: p. 111
OBJ:
6
TOP: strain theory
23.
Which of the following was not one of the elements of the
social bond that Travis Hirschi elaborated on in his development of social
control theory?
|
a. |
Belief |
|
b. |
Attachment |
|
c. |
Commitment |
|
d. |
Socialization |
ANS:
D
PTS:
1
DIF:
2
REF: p. 114
OBJ:
7
TOP: control theory
24.
The concept of secondary deviance is most closely associated
with which type of sociological theory?
|
a. |
Labeling |
|
b. |
Conflict |
|
c. |
Strain |
|
d. |
Social disorganization |
ANS:
A
PTS:
1
DIF:
2
REF: p. 115
OBJ: 7
TOP: social reaction theory
25.
The concept of crime is a result of the rich and powerful’s
imposition of their own moral standards and economic interests on the rest of
society, according to the view of:
|
a. |
Social control theorists |
|
b. |
Critical criminologists |
|
c. |
Latent trait theorists |
|
d. |
Social learning theorists |
ANS:
B
PTS:
1
DIF:
1
REF: p. 116
OBJ:
8
TOP: critical criminology
26.
Radical feminist scholars view the female criminal as a victim
of:
|
a. |
Economic disparity |
|
b. |
Social injustice |
|
c. |
Male dominance and gender inequality |
|
d. |
Anomie |
ANS:
C
PTS:
1
DIF: 2
REF: p. 117
OBJ:
8
TOP: critical criminology
27.
Which type of criminologist would call for universal social
justice as a way to reduce crime?
|
a. |
Peacemaking |
|
b. |
Psychodynamic |
|
c. |
Behavioral |
|
d. |
Left realist |
ANS:
A
PTS:
1
DIF:
1
REF: p. 117
OBJ:
8
TOP: critical criminology
28.
Which of the following is not a type of developmental
theory?
|
a. |
Age-graded |
|
b. |
Life course |
|
c. |
Latent trait |
|
d. |
Social strain |
ANS:
D
PTS:
1
DIF:
2
REF: p. 118
OBJ:
9
TOP: developmental theories
29.
According to the views of latent trait theory, fluctuations in
offending rates are caused by:
|
a. |
Varying criminal opportunities |
|
b. |
Varying diet and mineral supplements
patterns |
|
c. |
Changes in the elements of the social
bond |
|
d. |
Changes in the propensity to commit
crime |
ANS: A
PTS:
1
DIF:
3
REF: p. 118
OBJ:
9
TOP: latent trait theory
30.
In their general theory of crime, Gottfredson and Hirschi argue
that differences between individuals in the tendency to commit criminal acts
stem from:
|
a. |
The level of relative deprivation in
their immediate environment |
|
b. |
Their level of self-control |
|
c. |
The perceived value of social injustice
in the community |
|
d. |
Their tolerance for social strain |
ANS:
B
PTS:
1
DIF:
2
REF: p. 118
OBJ:
9
TOP: latent trait theory
31.
According to Sampson and Laub, what are the two most critical
turning points in a criminal career?
|
a. |
Marriage and employment |
|
b. |
Employment and imprisonment |
|
c. |
Children and imprisonment |
|
d. |
Victimization and social bonds |
ANS:
A
PTS:
1
DIF:
3
REF: p. 120
OBJ: 9
TOP: age-graded theory
32.
The “encouragement” of criminal activity is often referred to
as:
|
a. |
Latent trait activation |
|
b. |
Victim precipitation |
|
c. |
Lifestyle theory |
|
d. |
Cognitive abuse of the victim |
ANS: B
PTS:
1
DIF:
1
REF: p. 121
OBJ:
10
TOP: theories of victimization
33.
According to lifestyle theories, who is least likely to
be a victim of crime?
|
a. |
Someone who lives in a high-crime area |
|
b. |
Someone who spends time in public
places |
|
c. |
Someone who goes out late at night |
|
d. |
Someone who is married and stays home
at night |
ANS:
D
PTS:
1
DIF: 2
REF: p. 122
OBJ:
10
TOP: theories of victimization
34.
What does lifestyle theory posit about victimization?
|
a. |
The victim invariably precipitates
their own victimization |
|
b. |
Victimization is a function of social
strain and precipitation |
|
c. |
Crime is not a random event and the
probability of a crime occurring is dependent on the activities of the victim |
|
d. |
Victims are just as likely to become
offenders as offenders are to become victims |
ANS: C
PTS:
1
DIF: 3
REF: p. 122
OBJ:
10
TOP: theories of victimization
35.
Which of the following is not one of the three factors
linked to predatory crime rates in routine activities theory?
|
a. |
Supply of motivated offenders |
|
b. |
Supply of suitable targets |
|
c. |
Absence of effective guardians for
protection |
|
d. |
Extent of relative social deprivation |
ANS:
D
PTS:
1
DIF: 3
REF: p. 123
OBJ:
10
TOP: routine activities theory
TRUE/FALSE
1. The
field of criminology is not concerned with the control of criminal behavior,
only its causes.
ANS:
F
PTS:
1
DIF:
2
REF: p. 90
OBJ:
1
TOP: the causes of crime
2. General
deterrence seeks to stop criminals from repeating their behavior in the future.
ANS:
F
PTS: 1
DIF:
1
REF: p. 93-95
OBJ:
2
TOP: specific deterrence
3. Approximately
20 percent of serious crimes reported to police result in an arrest.
ANS:
T
PTS:
1
DIF:
3
REF: p. 93
OBJ:
2
TOP: general deterrence
4. Reducing
the rewards for committing crime is one hallmark of the situational crime
prevention approach.
ANS:
T
PTS: 1
DIF:
2
REF: p. 96
OBJ:
2
TOP: situational crime prevention
5. Increasing
the effort needed to commit a crime is one example of situational crime
prevention.
ANS: T
PTS:
1
DIF:
1
REF: p. 97
OBJ:
2
TOP: situational crime prevention
6. Social
learning theory is a type of psychological theory.
ANS:
F
PTS: 1
DIF:
2
REF: p. 102-103
OBJ:
4
TOP: behavioral theory
7. Biocriminologists
attempt to link physical traits with tendencies toward violence.
ANS:
T
PTS:
1
DIF:
1
REF: p. 98-99
OBJ:
3
TOP: biochemical factors
8. Negative
affective states is a concept associated with Robert Agnew’s general strain
theory.
ANS:
T
PTS: 1
DIF:
3
REF: p. 111
OBJ:
6
TOP: strain theory
9. According
to Hirschi’s social control theory, belief is a key element of the social bond.
ANS:
T
PTS:
1
DIF:
2
REF: p. 114
OBJ:
7
TOP: social control theory
10.
The lack of capable guardians is a cornerstone of routine
activities theory.
ANS:
T
PTS:
1
DIF: 2
REF: p. 123
OBJ:
10
TOP: routine activities theory
COMPLETION
1. ____________________
is a crime control approach that seeks to instill fear of criminal penalties in
the public.
ANS: General deterrence
PTS:
1
DIF:
1
REF: p.
93
OBJ: 2
TOP: general deterrence
2. ____________________
is a cognitive theory that focuses on a series of stages in childhood that
define moral judgments in adulthood.
ANS: Moral development theory
PTS:
1
DIF:
2
REF: p.
103
OBJ: 4
TOP: cognitive theory
3. The
concept of ____________________ refers to the absence or weakness of rules and
social norms (normlessness) in any person or group.
ANS: anomie
PTS:
1
DIF:
1
REF: p.
107
OBJ: 6
TOP: sociological theories
4. The
concept of ____________________ refers to the frustration and inner conflict experienced
by people who believe that they cannot achieve their desires and goals through
legitimate means.
ANS: strain
PTS:
1
DIF:
1
REF: p.
111
OBJ: 6
TOP: sociological theories
5. According
to pioneering sociologist Robert Merton, members of the lower classes whose
desire for success is frustrated by their circumstances may respond by adopting
the methods of ____________________, retreatism, or rebellion.
ANS: innovation
PTS: 1
DIF:
3
REF: p. 111
OBJ: 6
TOP: sociological theories
6. According
to social control theory, playing high school sports is an example of the
____________________ element of the social bond.
ANS: involvement
PTS:
1
DIF:
3
REF: p.
114
OBJ: 7
TOP: social control theory
7. According
to labeling theorists, the use of social or physical restraints such as
handcuffs, incarceration, or a criminal record are examples of
____________________ ceremonies, believed to leave a lasting impression on the
accused.
ANS: degradation
PTS:
1
DIF:
2
REF: p.
115
OBJ: 7
TOP: social reaction theory
8. ____________________
theory focuses on the role of diet, hormones, environmental contaminants, and
lead intake in criminal involvement.
ANS: Biochemical
PTS:
1
DIF:
1
REF: p. 98
OBJ: 3
TOP: biochemical theory
9. ____________________
theory views criminality as a dynamic process, influenced by a variety of
individual characteristics, traits, and social experiences.
ANS: Life course
PTS:
1
DIF:
1
REF: p.
119
OBJ: 9
TOP: life course theory
10.
According to Laub and Samson, “turning points” allow people to
build ____________________, the positive relations with individuals and
institutions that contribute to success.
ANS: social capital
PTS:
1
DIF:
1
REF: p.
119
OBJ: 9
TOP: life course theory
ESSAY
1. Discuss
choice theory, including the types of deterrence and role of situational crime prevention.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 91-97
OBJ: 1 | 2
TOP: choice theory | deterrence
2. Apply
the six tactics of situational crime prevention to a contemporary crime problem.
ANS:
Answer not provided.
PTS:
1
DIF:
3
REF: p. 96-97
OBJ: 2
TOP: situational crime prevention
3. Choose
two biological theories and discuss the advantages and disadvantages of each.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 98-101 OBJ:
3
TOP: biological theories
4. Discuss
the various psychological theories and the advantages and disadvantages of
each.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 101-103 OBJ: 4
TOP: psychological theories
5. Use a
sociological theory to explain the disproportionate incarceration of
lower-class minorities.
ANS:
Answer not provided.
PTS:
1
DIF:
3
REF: p. 107-116 OBJ: 6 | 7
TOP: sociological theories
6. Use a
sociological theory to explain gang-related violence.
ANS:
Answer not provided.
PTS: 1
DIF:
2
REF: p. 107-116 OBJ: 6 | 7
TOP: sociological theories
7. Using
specific examples, describe social control theory and the role of social bonds
in preventing crime.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 114-115 OBJ: 7
TOP: social control theory
8. Use
labeling theory to explain why laws that notify the public regarding the
whereabouts of sex offenders might actually increase recidivism.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 115-116 OBJ: 7
TOP: social reaction theory
9. Explain
the contributions of critical criminology through the use of examples.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 116-118 OBJ: 8
TOP: critical criminology
10.
Explain predatory crime by applying routine activities theory.
ANS:
Answer not provided.
PTS: 1
DIF:
2
REF: p. 123-124 OBJ: 10
TOP: routine activities theory
Chapter 5—Criminal Justice in the New Millennium: Terrorism,
Homeland Security, and Cybercrime
MULTIPLE CHOICE
1. The
term terror was first associated with unrest in _____ in 1917.
|
a. |
Iraq |
|
b. |
Germany |
|
c. |
Russia |
|
d. |
Ireland |
ANS:
C
PTS:
1
DIF:
1
REF: p. 168
OBJ:
2
TOP: terrorism
2. A(n)
_____ uses criminal and violent acts to influence an audience beyond the
immediate target.
|
a. |
Terrorist |
|
b. |
Guerilla |
|
c. |
Insurgent |
|
d. |
Revolutionary |
ANS:
A
PTS:
1
DIF:
1
REF: p. 169
OBJ: 1
TOP: defining terrorism
3. A(n)
_____ is the term for an irregular military band located in rural areas that
attack military, police, and government targets.
|
a. |
Terrorist |
|
b. |
Guerilla |
|
c. |
Insurgent |
|
d. |
Revolutionary |
ANS: B
PTS:
1
DIF:
1
REF: p. 170
OBJ:
1
TOP: defining terrorism
4. Which
one of the following is not one
of the theoretical explanations for terrorism discussed in the text?
|
a. |
Social learning |
|
b. |
Socialization |
|
c. |
Alienation |
|
d. |
Psychological |
ANS:
A
PTS:
1
DIF:
1
REF: p. 169-170
OBJ:
3
TOP: who is the terrorist?
5. _____
terrorists use violence to frighten those in power and their supporters in
order to replace the existing government with a regime that holds acceptable
political or religious views.
|
a. |
Revolutionary |
|
b. |
Political |
|
c. |
Nationalist |
|
d. |
Retributive |
ANS:
A
PTS:
1
DIF:
2
REF: p. 171
OBJ:
4
TOP: the contemporary terrorist
6. _____
terrorists promote the interests of a minority ethnic or religious group that
believes it has been persecuted under majority rule and wishes to carve out its
own independent homeland.
|
a. |
Revolutionary |
|
b. |
Political |
|
c. |
Nationalist |
|
d. |
Retributive |
ANS:
C
PTS:
1
DIF: 2
REF: p. 171
OBJ:
4
TOP: the contemporary terrorist
7. _____
terrorists fight for a cause with people anywhere whose ideology and/or
religion they find objectionable.
|
a. |
Revolutionary |
|
b. |
Political |
|
c. |
Nationalist |
|
d. |
Retributive |
ANS:
D
PTS:
1
DIF:
2
REF: p. 171
OBJ:
4
TOP: the contemporary terrorist
8. A(n)
_____ confronts the existing government for control of all or a portion of its
territory, or forces political concessions in sharing political power.
|
a. |
Terrorist |
|
b. |
Guerilla |
|
c. |
Insurgent |
|
d. |
Revolutionary |
ANS:
C
PTS:
1
DIF: 1
REF: p. 170
OBJ:
1
TOP: defining terrorism
9. White
supremacists are an example of _____ terrorists.
|
a. |
Revolutionary |
|
b. |
Political |
|
c. |
Nationalist |
|
d. |
Retributive |
ANS: B
PTS:
1
DIF:
2
REF: p. 171
OBJ:
4
TOP: the contemporary terrorist
10.
In what year did Congress pass legislation authorizing the
creation of the Department of Homeland Security?
|
a. |
1998 |
|
b. |
2000 |
|
c. |
2002 |
|
d. |
2004 |
ANS:
C
PTS:
1
DIF:
1
REF: p. 173
OBJ:
5
TOP: Homeland Security
11.
Less than _____ percent of cargo containers entering the United
States every day are screened.
|
a. |
5 |
|
b. |
10 |
|
c. |
15 |
|
d. |
20 |
ANS:
A
PTS:
1
DIF:
2
REF: p. 174
OBJ:
5
TOP: terrorism and law enforcement
12.
There are approximately 130 nuclear research reactors in _____
countries, with two dozen of these having enough highly enriched uranium for
one or more nuclear bombs.
|
a. |
twenty |
|
b. |
thirty |
|
c. |
forty |
|
d. |
fifty |
ANS: D
PTS:
1
DIF:
2
REF: p. 174
OBJ:
5
TOP: terrorism and law enforcement
13.
The Department of Homeland Security is responsible for securing
our nation’s borders and transportation systems, which include _____ ports of
entry.
|
a. |
150 |
|
b. |
250 |
|
c. |
350 |
|
d. |
450 |
ANS:
C
PTS:
1
DIF:
2
REF: p. 174
OBJ:
5
TOP: Homeland Security
14.
US-VISIT procedures were started in airports in what year?
|
a. |
2000 |
|
b. |
2002 |
|
c. |
2004 |
|
d. |
2006 |
ANS:
C
PTS:
1
DIF:
1
REF: p. 177
OBJ:
5
TOP: Homeland Security
15.
_____ created the Anti-Terrorism Information Center to divide
the states into operational zones, and link federal, state, and local
information services in one system to combat terrorism.
|
a. |
Alabama |
|
b. |
California |
|
c. |
Illinois |
|
d. |
Texas |
ANS:
B
PTS:
1
DIF:
1
REF: p. 175
OBJ:
6
TOP: state law enforcement
16.
Which of the following is an aim of the USA Patriot Act?
|
a. |
To give sweeping new powers to domestic
law enforcement and international intelligence agencies in an effort to fight
terrorism |
|
b. |
To expand the definition of terrorist
activities |
|
c. |
To alter sanctions for violent
terrorism |
|
d. |
All of these are aims of the USA
Patriot Act |
ANS: D
PTS:
1
DIF:
2
REF: p. 178
OBJ:
7
TOP: confronting terrorism with the law
17.
The USA Patriot Act was reauthorized, keeping most of its
provisions, in what year?
|
a. |
2002 |
|
b. |
2004 |
|
c. |
2006 |
|
d. |
2008 |
ANS:
C
PTS:
1
DIF:
1
REF: p. 178
OBJ:
7
TOP: confronting terrorism with the law
18.
Civil libertarians argue that _____ Amendment rights may be
violated by the USA Patriot Act.
|
a. |
First |
|
b. |
Fourth |
|
c. |
Fifth |
|
d. |
Eighth |
ANS:
A
PTS:
1
DIF:
2
REF: p. 179
OBJ:
7
TOP: civil rights and the war against terrorism
19.
Which of the following is false about cybercrime?
|
a. |
It is difficult to detect through
traditional law enforcement channels. |
|
b. |
It is rapidly evolving. |
|
c. |
Its control demands that agents of the
justice system develop technical skills. |
|
d. |
It is relatively easily controlled by
law enforcement. |
ANS:
D
PTS:
1
DIF:
2
REF: p. 183
OBJ:
8
TOP: cybercrime
20.
_____ is the use of computer networks for undermining the
social, economic, and political system of an enemy through the destruction of
infrastructure.
|
a. |
Cybertheft |
|
b. |
Cybervandalism |
|
c. |
Cyberterrorism |
|
d. |
Cybermovement |
ANS:
C
PTS: 1
DIF:
1
REF: p. 184
OBJ:
8
TOP: cybercrime
21.
Spending on IT and telecommunications will grow by more than six
percent each year, soon reaching about:
|
a. |
$1 million |
|
b. |
$2 million |
|
c. |
$2 billion |
|
d. |
$2 trillion |
ANS:
D
PTS:
1
DIF:
2
REF: p. 184
OBJ:
8
TOP: cybercrime
22.
Which of the following is not a type of cybercrime?
|
a. |
Cybervandalism |
|
b. |
Cybertheft |
|
c. |
Cyberterrorism |
|
d. |
Cyberfraud |
ANS:
D
PTS:
1
DIF:
3
REF: p. 184
OBJ:
8
TOP: cybercrime
23.
Which of the following is not an example of computer fraud?
|
a. |
Theft of information |
|
b. |
Salami fraud |
|
c. |
Cybermovement |
|
d. |
Corporate espionage |
ANS:
C
PTS:
1
DIF:
1
REF: p. 184
OBJ: 8
TOP: cybercrime
24.
Which of the following is not a type of internet securities
fraud?
|
a. |
Identity theft |
|
b. |
Market manipulation |
|
c. |
Fraudulent offerings of securities |
|
d. |
Illegal touting |
ANS: A
PTS:
1
DIF:
2
REF: p. 187
OBJ:
8
TOP: cybercrime
25.
_____ is the illegal acquisition of personal information such as
bank passwords and credit card numbers by masquerading as a trustworthy
person/business in what appears to be an official electronic communication.
|
a. |
Etailing fraud |
|
b. |
Phishing |
|
c. |
Cybertheft |
|
d. |
Touting |
ANS:
B
PTS:
1
DIF: 1
REF: p. 188
OBJ:
8
TOP: cybercrime
26.
_____ is one type of malicious software program that disrupts or
destroys existing programs and networks.
|
a. |
Computer worms |
|
b. |
Computer virus |
|
c. |
Trojan horse |
|
d. |
Cyberbullying |
ANS:
B
PTS:
1
DIF:
2
REF: p. 188
OBJ:
8
TOP: cybercrime
27.
Which of the following types of cybercrime was not discussed
in the text?
|
a. |
Cyberterrorism |
|
b. |
Phishing |
|
c. |
Etailing |
|
d. |
Chiseling |
ANS:
D
PTS:
1
DIF:
1
REF: p. 188
OBJ:
8
TOP: cybervandalism
28.
Which type of cybervandalism appears as a benign application
which actually contains codes that can damage the system operations?
|
a. |
Mydoom |
|
b. |
Trojan horse |
|
c. |
Malware |
|
d. |
Chiseling |
ANS:
B
PTS:
1
DIF:
2
REF: p. 188
OBJ: 8
TOP: cybervandalism
29.
In what type of cybercrime are small amounts of money subtracted
from customers’ accounts and added to the account of the thief?
|
a. |
Phishing |
|
b. |
Chiseling |
|
c. |
Salami fraud |
|
d. |
Trojan horse |
ANS: C
PTS:
1
DIF:
2
REF: p. 185
OBJ:
8
TOP: cybercrime
30.
_____ involves hacking secure computer networks at the enemy’s
most sensitive military bases, defense contractors and aerospace companies in
order to steal important data or to access their defenses.
|
a. |
Cyberterrorism |
|
b. |
Cyberespionage |
|
c. |
Cyberbullying |
|
d. |
Cyberstalking |
ANS:
B
PTS:
1
DIF: 1
REF: p. 190
OBJ:
9
TOP: cybercrime
31.
Since 1995 the New York Electronic Crimes Task Force has charged
over 1000 individuals with electronic crime losses exceeding _____.
|
a. |
$1 million |
|
b. |
$10 million |
|
c. |
$1 billion |
|
d. |
$10 billion |
ANS:
C
PTS:
1
DIF:
3
REF: p. 191
OBJ:
10
TOP: cybercrime
32.
_____ is the term used to describe efforts of organized groups
to download and sell copyrighted software in violation of its license.
|
a. |
Warez |
|
b. |
Denial of service attack |
|
c. |
Market manipulation |
|
d. |
Cybertheft |
ANS:
A
PTS:
1
DIF:
1
REF: p. 187
OBJ: 8
TOP: cybercrime
33.
_____ is the term used to describe the illegal use of the
internet to buy or sell merchandise online.
|
a. |
Cybertheft |
|
b. |
Etailing fraud |
|
c. |
Market manipulation |
|
d. |
Denial of service attack |
ANS: B
PTS:
1
DIF:
1
REF: p. 188
OBJ:
8
TOP: cybercrime
34.
The United States Criminal Code provides penalties for a first
time illegal copyright offender of _____ years incarceration and a fine of
$250,000.
|
a. |
three |
|
b. |
five |
|
c. |
seven |
|
d. |
ten |
ANS:
B
PTS:
1
DIF:
2
REF: p. 191
OBJ:
10
TOP: cybercrime
35.
It is difficult to detect and control Internet pornography.
Congress has struggled to create legislation that will restrict usage without
violating _____ Amendment rights.
|
a. |
First |
|
b. |
Fourth |
|
c. |
Sixth |
|
d. |
Eighth |
ANS:
A
PTS: 1
DIF:
2
REF: p. 191
OBJ:
10
TOP: cybercrime
TRUE/FALSE
1. The
term terrorism first appeared during the Vietnam War.
ANS:
F
PTS:
1
DIF: 1
REF: p. 168
OBJ:
1
TOP: terrorism
2. The
view that terrorists suffer psychological abnormality is well accepted by those
advocating the psychological view.
ANS:
T
PTS: 1
DIF:
2
REF: p. 189
OBJ:
3
TOP: who is the terrorist?
3. Lack
of economic opportunity and recessionary economies are positively correlated
with terrorism.
ANS:
T
PTS:
1
DIF:
2
REF: p. 189-190
OBJ:
3
TOP: who is the terrorist?
4. Death
squads and the use of government troops to destroy political opposition parties
are often associated with state-sponsored terrorism.
ANS:
T
PTS:
1
DIF:
3
REF: p. 171
OBJ:
4
TOP: the contemporary terrorist
5. The
Department of Homeland Security is responsible for securing our nation’s
borders and transportation systems.
ANS:
T
PTS:
1
DIF:
1
REF: p. 173
OBJ:
5
TOP: Homeland Security
6. The
salami slice is a computer program secretly attached to a company’s computer
system.
ANS:
F
PTS:
1
DIF:
2
REF: p. 185
OBJ:
8
TOP: cybercrime
7. Cyberterrorism
may result in a battered economy in which the government is forced to spend
more on the military and cut back on social programs and education.
ANS:
T
PTS:
1
DIF:
2
REF: p. 189
OBJ:
9
TOP: cyberterrorism
8. Since
September 11, 2001, biometrics have been implemented in many facets of the
security systems of the United States.
ANS:
T
PTS:
1
DIF:
1
REF: p. 190
OBJ:
10
TOP: cyberterrorism
9. According
to the United States Criminal Code, a first-time illegal copyright offender
will be fined $250,000. A second time offender will receive five years
incarceration.
ANS:
F
PTS:
1
DIF: 1
REF: p. 190
OBJ:
10
TOP: cybercrime
10.
There is some concern that the Child Online Protection Act
controls free speech.
ANS:
T
PTS:
1
DIF:
3
REF: p. 191
OBJ:
10
TOP: cybercrime
COMPLETION
1. ____________________
is illegal behavior that targets the security of computer systems and/or the
data accessed and processed by computer networks.
ANS: Cybercrime
PTS: 1
DIF:
1
REF: p.
183
OBJ: 1
TOP: cybercrime
2. ____________________
is an attack against an enemy nation’s technological infrastructure.
ANS: Cyberterrorism
PTS:
1
DIF: 1
REF: p.
189
OBJ: 9
TOP: cyberterrorism
3. The
____________________ view of terrorism argues that if terrorists suffer
psychological deficiencies it is because they have been poorly and improperly
socialized.
ANS: socialization
PTS:
1
DIF:
1
REF: p. 169-170 OBJ: 3
TOP: who is the terrorist?
4. The
Department of ____________________ performs analyses of foreign nuclear
weapons.
ANS: Energy
PTS: 1
DIF:
2
REF: p.
173
OBJ: 5
TOP: Homeland Security
5. The
____________________ is the government official charged with coordinating data
from the nation’s primary intelligence gathering agencies.
ANS: Director of National Intelligence
PTS:
1
DIF:
3
REF: p.
173
OBJ: 5
TOP: Homeland Security
6. On
October 26, 2001, Congress passed the ____________________.
ANS: U.S. Patriot Act
PTS:
1
DIF:
1
REF: p.
178
OBJ: 7
TOP: confronting terrorism with the law
7. The
USAPA expands all four traditional tools of surveillance: wiretaps, search
warrants, pen/trap order, and ____________________.
ANS: subpoenas
PTS:
1
DIF:
3
REF: p.
178
OBJ: 7
TOP: confronting terrorism with the law
8. The
____________________ is a computer program that appears benign but which
actually contains something harmful.
ANS: Trojan horse
PTS:
1
DIF:
2
REF: p.
188
OBJ: 8
TOP: cybercrime
9. ____________________
occurs when individuals make securities recommendations and fail to disclose
that they are being paid to disseminate their favorable opinions.
ANS: Illegal touting
PTS:
1
DIF:
2
REF: p.
187
OBJ: 8
TOP: cybercrime
10.
____________________ is slang for the processes used to acquire
personal information used for identity theft and other fraudulent activities.
ANS: Phishing
PTS:
1
DIF:
2
REF: p.
188
OBJ: 8
TOP: cybercrime
ESSAY
1. Discuss
the history of terrorism.
ANS:
Answer not provided.
PTS:
1
DIF:
1
REF: p. 168-169 OBJ: 2
TOP: terrorism
2. Compare
and contrast two of the prevailing view on the motivation of terrorists.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 169-171 OBJ: 3
TOP: who is the terrorist?
3. Discuss
the role of the Department of Homeland Security in the fight against terrorism.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 173-175 OBJ: 5
TOP: Homeland Security
4. Elaborate
the types of contemporary terrorism using examples.
ANS:
Answer not provided.
PTS:
1
DIF: 3
REF: p. 171-173 OBJ: 4
TOP: the contemporary terrorist
5. Explain
what state and county and local law enforcement are doing to deal with the
threat of terrorism.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 175-178 OBJ: 6
TOP: terrorism and law enforcement
6. Discuss
the purposes of the USA Patriot Act and then detail the concern about this Act
by civil libertarians.
ANS:
Answer not provided.
PTS: 1
DIF:
3
REF: p. 178-179 OBJ: 7
TOP: The USA Patriot Act
7. Discuss
three types of computer crimes using examples.
ANS:
Answer not provided.
PTS:
1
DIF:
2
REF: p. 183-188 OBJ: 8
TOP: cybercrime
8. Discuss
the evolving role of law enforcement in fighting terrorism.
ANS:
Answer not provided.
PTS:
1
DIF:
3
REF: p. 173-178 OBJ: 5 | 6
TOP: terrorism and law enforcement
9. Some
policy experts suggest that the way to fight terrorism is to use political
solutions. Discuss several political solutions to fight against terrorism using
Al’Qaeda as an example.
ANS:
Answer not provided.
PTS: 1
DIF:
3
REF: p. 179-182 OBJ: 5 | 6
TOP: terrorism and the law
10.
Discuss some of the problems with enforcing cyber laws and
recent initiatives to attempt to combat cybercrime.
ANS:
Answer not provided.
PTS:
1
DIF:
3
REF: p. 190-192 OBJ: 10
TOP: cybercrime
Comments
Post a Comment