Filters
Question type

Study Flashcards

________ involves creating useful products at a molecular level,such as microscopic cameras or recording devices.

Correct Answer

verifed

verified

The Department of Homeland Security is particularly concerned that weapons of mass destruction and other contraband useful to terrorists might enter the U.S.in which way?


A) Airport cargo
B) Illegal border crossings
C) Clandestine trucking operations
D) Seaport shipping containers

Correct Answer

verifed

verified

________ is a form of cybercrime that relies on social engineering by using official-looking email messages to elicit responses from victims.

Correct Answer

verifed

verified

________ is a category of cybercrime that includes stealing trade secrets or copyrighted information.


A) Theft of services
B) Telemarketing fraud
C) Electronic vandalism
D) Information piracy

Correct Answer

verifed

verified

Match the biometric technique to its definition. A)The analysis of firearms and explosives B)Fingerprinting C)Studying insects to determine issues such as the time of death D)Reconstructing the likeness of a decomposed or dismembered body -Forensic anthropology

Correct Answer

verifed

verified

________ includes a variety of malicious computer programs,such as viruses,worms,and Trojan horses.

Correct Answer

verifed

verified

Illegally copying a software program is known as software


A) piracy.
B) attachment.
C) duplication.
D) phishing.

Correct Answer

verifed

verified

Alphonse Bertillon was responsible for creating the first


A) weapon of mass destruction.
B) human clone.
C) modern system of personal identification.
D) application of DNA technology in criminal cases.

Correct Answer

verifed

verified

________ technology is used to search cargo and luggage for particles left behind when narcotics and explosives contraband are packaged and handled.


A) Radiation detection equipment
B) Surveillance drone
C) Trace detection
D) Nanoreality

Correct Answer

verifed

verified

________ applies scientific techniques to the detection and evaluation of criminal evidence.


A) Profiling
B) Pathology
C) Social engineering
D) Criminalistics

Correct Answer

verifed

verified

A criminal offense that employs any form of advanced or emerging technology in its commission is called a(n)________.

Correct Answer

verifed

verified

________ includes criminal offenses committed through the use of altered genetic material.


A) WMD
B) Biometrics
C) Biocrime
D) Terrorist crime

Correct Answer

verifed

verified

The ________ is a volunteer organization that uses DNA technology to investigate and challenge dubious convictions.

Correct Answer

verifed

verified

In criminal justice,________ are particularly significant because they may create perceived injustices.


A) sentinel events
B) audit trails
C) technocrimes
D) biometrics

Correct Answer

verifed

verified

________ includes computer worms and Trojan horses.


A) Technoware
B) Malware
C) Phishing
D) Bioware

Correct Answer

verifed

verified

A criminal offense perpetrated through the use of biologically active substances,including chemicals,toxins,or disease-causing organisms in known as a(n)________.

Correct Answer

verifed

verified

Illegally harvesting medical organs for transplantation is a type of biocrime.

Correct Answer

verifed

verified

Define criminalistics.Explain three methods used to identify individuals.Which of these do you think is the most useful for law enforcement and why?

Correct Answer

verifed

verified

Answers will vary but should define crim...

View Answer

Ransomware is a form of cybercrime.

Correct Answer

verifed

verified

What was the purpose of the SMILECon conference for police officers?


A) To help develop ways to raise public opinion of the police
B) To train police in the use of social media
C) To make police aware of new high-technology investigative tools
D) To create linkages between police and criminalists

Correct Answer

verifed

verified

Showing 21 - 40 of 83

Related Exams

Show Answer