Podcast
Questions and Answers
Which of the following best describes extortion?
Which of the following best describes extortion?
- A type of theft involving the use of fear and threats to obtain a benefit (correct)
- A type of cybercrime involving the use of technology to commit theft
- A type of robbery involving immediate harm to the victim
- A type of bribery involving financial incentives to gain a benefit
What is the difference between extortion and bribery?
What is the difference between extortion and bribery?
- Extortion involves threatening harm to gain a benefit, while bribery involves offering financial incentives to gain a benefit (correct)
- Extortion involves seeking personal gain, while bribery involves seeking reputational gain
- Extortion involves immediate harm to the victim, while bribery involves future harm
- Extortion involves nonviolent threats, while bribery involves violent threats
What can be considered a threatened harm in extortion?
What can be considered a threatened harm in extortion?
- Accusing someone of a crime
- Revealing a secret
- Inflicting personal injury
- All of the above (correct)
Which of the following is a common cyber variation of a traditional crime?
Which of the following is a common cyber variation of a traditional crime?
What is a cyber-dependent crime?
What is a cyber-dependent crime?
What is the purpose of phishing schemes?
What is the purpose of phishing schemes?
What is an example of a larger scale cybercrime?
What is an example of a larger scale cybercrime?
Which type of crime recognizes both the person offering the bribe and the one taking the bribe as offenders?
Which type of crime recognizes both the person offering the bribe and the one taking the bribe as offenders?
What is the basic criminal component to bribery?
What is the basic criminal component to bribery?
What distinguishes cyber-dependent crimes from cyber-enabled crimes?
What distinguishes cyber-dependent crimes from cyber-enabled crimes?
What is the actus reus in cybercrimes?
What is the actus reus in cybercrimes?
Flashcards are hidden until you start studying