Clipper chips, encryption, logic bombs, pinging, remailers, trapdoors, Trojan horses, viruses, and worms are all cited as examples of _______________ used to accomplish or conceal crime in cyberspace.

A. Computer sabotage
B. Documents
C. Threads
D. Strings
E. CPUs


Answer: A. Computer sabotage

Criminal Justice

You might also like to view...

The main objective in collecting and packaging physical evidence is to prevent any change in the evidence between the time it is removed from the crime scene and the time it is received by the crime laboratory

a. True b. False

Criminal Justice

Match the verbalization with the most accurate neutralization technique

A. Denial of responsibility B. Denial of victim C. Appeal to higher loyalty D. Denial of injury E. Condemning the condemners

Criminal Justice

This principle suggests that the more one comes into contact with offenders, the more likely he is to be victimized

a. Principle of status quo b. Principle of hierarchy c. Principle of homogamy d. Principle of lex talionis

Criminal Justice

Releasing offenders, even elderly ones, always involves some political risk

a. True b. False Indicate whether the statement is true or false

Criminal Justice