6-0 check your knowledge

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

285

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by SargentFreedomHawk19

Report
6-0 Check Your Knowledge Your work has been saved and submitted Written Nov 27, 2023 10:18 AM - Nov 27, 2023 10:22 AM Attempt Score 5 / 5 - A Overall Grade (Highest Attempt) 5 / 5 - A Question 1 0.5 / 0.5 points Which of the following is defined as web content that is not searchable and only accessible through software that masks the user’s IP address? Select one. Question options: Dark web Deep web Surface web Darknet market Hide question 1 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Question 2 0.5 / 0.5 points True or false: Extraction is the method of protecting digital information as it is stored on a device or transmitted across the internet or other computer network. True False Hide question 2 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Question options: Question 3 0.5 / 0.5 points Which of the following are reasons cybercrime is appealing to criminals? Select all that apply. Question options:
It is easy to detect The dark web is only accessible to criminals Police agencies often mishandle digital evidence, making it inadmissible in court It is lucrative It is hard to detect Hide question 3 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Question 4 0.5 / 0.5 points Which of the following is a type of online exploitation in which offenders coerce or blackmail victims into sharing explicit images of themselves? Select one. Question options: Ransomware Social engineering Sextortion Identity theft Hide question 4 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Question 5 0.5 / 0.5 points True or false: Police must always seek warrants for access to information on social media, even if a person does not utilize their privacy controls and their posts are public. True False Hide question 5 feedback For more information on this topic, refer to the Technological Tools uUsed by Criminal Justice Professionals and Offenders resources. Question options: Question 6 0.5 / 0.5 points True or false: Innovative uses of technology to support investigations include bluetooth in cars, tracking Wi-Fi connections, and K9 detection of digital media. Question options:
True False Hide question 6 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Question 7 0.5 / 0.5 points Which of the following is an example of using new technology to commit old crimes? Select one. Question options: Stealing a purse to obtain credit cards Electronically blocking access to a computer until a ransom is paid Robbing a bank in person by force Selling drugs on the street Hide question 7 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Question 8 0.5 / 0.5 points Which of the following types of technology are commonly used by both law enforcement and offenders? Select all that apply. Question options: Drones DNA Cryptocurrency Cell phone apps Gunshot detection systems Social media Hide question 8 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Question 9 0.5 / 0.5 points True or false: Criminals are using ads in app-based platforms to find victims. True False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Hide question 9 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Question options: Question 10 0.5 / 0.5 points What challenges exist when hiring outside vendors to unlock a phone for investigators? Select all that apply. Question options: Lack of vendors Cost Results Lack of skills Admissibility Hide question 10 feedback For more information on this topic, refer to the Technological Tools Used by Criminal Justice Professionals and Offenders resources. Done