CPST 7800 Final Exam Questions With
Correct Answers
Congress |has |the |authority |to |enact |criminal |statutes |aimed |at |cybercrimes |involving |the |
Internet |under |which |provision |of |the |United |States |Constitution? |- |CORRECT |ANSWER✔✔-
Necessary |and |Proper |Clause
T/F
A |person |who |willfully |infringes |on |copyrights |can |face |prosecution |under |state |law |for |
criminal |copyright |infringement. |- |CORRECT |ANSWER✔✔-False
T/F
The |Internet |is |an |instrumentality |of |interstate |commerce, |and |the |use |of |it |in |furtherance |of |
a |crime |creates |a |sufficient |nexus |for |federal |subject |matter |jurisdiction. |- |CORRECT |
ANSWER✔✔-True
What |is |the |name |of |the |main |federal |law |that |makes |it |a |felony |to |gain |unauthorized |access |
to |computer |systems? |- |CORRECT |ANSWER✔✔-Computer |Fraud |and |Abuse |Act
T/F
Sexting |is |the |practice |of |sending |or |posting |sexually |suggestive |text |messages |and |images |via |
cellular |phones. |- |CORRECT |ANSWER✔✔-True
Theft |of |a |company |s |mainframe |computer |falls |under |which |general |category |of |computer-
related |crimes? |- |CORRECT |ANSWER✔✔-all |of |the |above
, The |fruit-of-the-poisonous-tree |doctrine |that |stems |from |the |exclusionary |rule |is |based |on |
which |provision |under |the |United |States |Constitution? |- |CORRECT |ANSWER✔✔-Fourth |
Amendment
T/F
Evidence |seized |from |a |defendant's |computer |obtained |as |a |result |of |police |officers' |failure |to |
administer |Miranda |warnings |will |generally |be |admissible |in |a |prosecution. |- |CORRECT |
ANSWER✔✔-False
A |phishing |scheme |to |commit |identity |theft |falls |under |which |general |category |of |computer-
related |crimes? |- |CORRECT |ANSWER✔✔-crimes |in |which |a |computer |is |the |instrument |of |a |
crime
T/F
There |is |no |reasonable |expectation |of |privacy |in |the |content |of |private |e-mail |messages. |- |
CORRECT |ANSWER✔✔-False
A |computer |virus |falls |under |which |general |category |of |computer-related |crimes? |- |CORRECT |
ANSWER✔✔-crimes |in |which |a |computer |is |the |subject |of |a |crime
T/F
In |order |to |convict |a |person |of |aggravated |identity |theft, |the |federal |government |must |prove |
that |the |defendant |had |actual |knowledge |that |the |identity |in |question |belonged |to |another |
person. |- |CORRECT |ANSWER✔✔-True
Which |of |the |following |is |a |reason |why |some |computer |crimes |are |not |prosecuted? |- |
CORRECT |ANSWER✔✔-all |of |the |above
T/F
Correct Answers
Congress |has |the |authority |to |enact |criminal |statutes |aimed |at |cybercrimes |involving |the |
Internet |under |which |provision |of |the |United |States |Constitution? |- |CORRECT |ANSWER✔✔-
Necessary |and |Proper |Clause
T/F
A |person |who |willfully |infringes |on |copyrights |can |face |prosecution |under |state |law |for |
criminal |copyright |infringement. |- |CORRECT |ANSWER✔✔-False
T/F
The |Internet |is |an |instrumentality |of |interstate |commerce, |and |the |use |of |it |in |furtherance |of |
a |crime |creates |a |sufficient |nexus |for |federal |subject |matter |jurisdiction. |- |CORRECT |
ANSWER✔✔-True
What |is |the |name |of |the |main |federal |law |that |makes |it |a |felony |to |gain |unauthorized |access |
to |computer |systems? |- |CORRECT |ANSWER✔✔-Computer |Fraud |and |Abuse |Act
T/F
Sexting |is |the |practice |of |sending |or |posting |sexually |suggestive |text |messages |and |images |via |
cellular |phones. |- |CORRECT |ANSWER✔✔-True
Theft |of |a |company |s |mainframe |computer |falls |under |which |general |category |of |computer-
related |crimes? |- |CORRECT |ANSWER✔✔-all |of |the |above
, The |fruit-of-the-poisonous-tree |doctrine |that |stems |from |the |exclusionary |rule |is |based |on |
which |provision |under |the |United |States |Constitution? |- |CORRECT |ANSWER✔✔-Fourth |
Amendment
T/F
Evidence |seized |from |a |defendant's |computer |obtained |as |a |result |of |police |officers' |failure |to |
administer |Miranda |warnings |will |generally |be |admissible |in |a |prosecution. |- |CORRECT |
ANSWER✔✔-False
A |phishing |scheme |to |commit |identity |theft |falls |under |which |general |category |of |computer-
related |crimes? |- |CORRECT |ANSWER✔✔-crimes |in |which |a |computer |is |the |instrument |of |a |
crime
T/F
There |is |no |reasonable |expectation |of |privacy |in |the |content |of |private |e-mail |messages. |- |
CORRECT |ANSWER✔✔-False
A |computer |virus |falls |under |which |general |category |of |computer-related |crimes? |- |CORRECT |
ANSWER✔✔-crimes |in |which |a |computer |is |the |subject |of |a |crime
T/F
In |order |to |convict |a |person |of |aggravated |identity |theft, |the |federal |government |must |prove |
that |the |defendant |had |actual |knowledge |that |the |identity |in |question |belonged |to |another |
person. |- |CORRECT |ANSWER✔✔-True
Which |of |the |following |is |a |reason |why |some |computer |crimes |are |not |prosecuted? |- |
CORRECT |ANSWER✔✔-all |of |the |above
T/F