Clipper chips, encryption, logic bombs, pinging, remailers, trapdoors, Trojan horses, viruses, and worms are all cited as examples of _______________ used to accomplish or conceal crime in cyberspace.
A. Computer sabotage
B. Documents
C. Threads
D. Strings
E. CPUs
Answer: A. Computer sabotage
You might also like to view...
The main objective in collecting and packaging physical evidence is to prevent any change in the evidence between the time it is removed from the crime scene and the time it is received by the crime laboratory
a. True b. False
Match the verbalization with the most accurate neutralization technique
A. Denial of responsibility B. Denial of victim C. Appeal to higher loyalty D. Denial of injury E. Condemning the condemners
This principle suggests that the more one comes into contact with offenders, the more likely he is to be victimized
a. Principle of status quo b. Principle of hierarchy c. Principle of homogamy d. Principle of lex talionis
Releasing offenders, even elderly ones, always involves some political risk
a. True b. False Indicate whether the statement is true or false