【单选题】
王某利用计算机知识获取某公司上网账号和密码后,以每3个月100元的价格出售上网账号和密码,从中获利5000元,给该公司造成4万元的损失。对此,下列说法正确的是()。
A. 王某的行为构成盗窃罪,盗窃数额为5000元
B. 王某的行为构成诈骗罪,诈骗数额为5000元
C. 王某的行为构成盗窃罪,盗窃数额为4万元
D. 王某的行为构成诈骗罪,诈骗数额为4万元
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
C
解析
C【精解】《刑法》第287条规定:利用计算机实施金融诈骗、盗窃、贪污、挪用公款、窃取国家秘密或者其他犯罪的,依照本法有关规定定罪处罚。即对利用电脑进行金融诈骗、盗窃、贪污、挪用公款、窃取国家秘密活动的,分别按照金融诈骗罪、盗窃罪、贪污罪、挪用公款罪、非法获取国家秘密罪定罪处罚。另外,《最高人民法院、最高人民检察院关于办理盗窃案件中具体应用法律的若干问题的解答》中规定:对被盗财物只计算直接损失,不包括间接损失;计算被盗财物的实际价格,不是指盗窃犯低价销赃的价格。对于电信资费的损失也是按照合法用户为其支付的电话费计算。因此,对于王某的盗窃数额,应按照给公司造成的4万元损失计算。故选C项。
相关试题
【单选题】
下列关于强令违章冒险作业罪的说法,错误的是()。
A. 强令违章冒险作业罪属于危害公共安全的犯罪
B. 强令违章冒险作业罪不能由单位构成
C. 强令违章冒险作业罪的犯罪主体为特殊主体,包括对矿山作业负有组织、指挥或者管理职责的负责人、管理人员、实际控制人、投资人等
D. 强令违章冒险作业罪是过失犯罪
【单选题】
关于共犯,下列说法正确的是()。
A. 策划分裂国家,由他人实施分裂国家的行为,策划者不是分裂国 家的实行犯
B. 以出卖为目的,为拐卖妇女的犯罪分子接送、中转被拐卖的妇女 的,以拐卖妇女罪的帮助犯论处
C. 与走私罪犯通谋,为其提供资金、账号的,以走私罪的共犯论处
D. 明知是贪污所得,而协助将资金汇往境外的,以贪污罪的帮助犯 论处
【单选题】
审判的时候怀孕的妇女依法不适用死刑。对这一规定的理解,下 列选项错误的是()。
A. 关押期间人工流产的,属于审判的时候怀孕的妇女
B. 关押期间自然流产的,属于审判的时候怀孕的妇女
C. 不适用死刑,是指不适用死刑立即执行但可适用死缓
D. 不适用死刑,既包括不适用死刑立即执行,也包括不适用死缓
【单选题】
2016年12月15日,某市中区法院对张某等15人以非法买卖枪支罪 判处有期徒刑。 2018年4月9日,中区法院根据最新司法解释的规定对该 案件进行重审,经审理认为,该案所涉枪支为气枪,因此维持原定罪判 决,但因枪支杀伤力不足,涉案人员主观上认为是玩具枪,客观上没有 造成严重后果,且有自首、立功等情节,因而免于刑事处罚。对于本 案,下列说法错误的是()。
A. 法院重审后对涉枪人员的判决体现了罪责刑相适应原则
B. 法院根据最新司法解释作出判决,并对涉案人员免于刑事处罚, 这体现了从旧兼从轻原则
C. 法院的判决坚持了主客观相统一原则
D. 法院对涉枪人员依法改判体现了刑法所具有的保障机能
【单选题】
甲因对社会不满,企图制造事故,使火车脱轨,遂在火车到达之 前5分钟将一块大石头搬运到铁轨上,足以使火车发生倾覆。约2分钟 后,甲又将该石头搬离了铁轨,有效地避免了事故的发生。甲的行为属 于()。
A. 犯罪预备
B. 自动放弃犯罪的犯罪中止
C. 自动有效地防止犯罪结果发生的犯罪中止
D. 犯罪既遂
【单选题】
下列不属于自动投案的是()。
A. 犯罪后主动报案,虽未表明自己是作案人,但没有逃离现场,在 司法机关询问时交代自己罪行的
B. 明知他人报案而在现场等待,抓捕时无拒捕行为,供认犯罪事实 的
C. 在司法机关未确定犯罪嫌疑人,尚在一般性排查询问时主动交代 自己罪行的
D. 犯罪嫌疑人被亲友采用捆绑等手段送到司法机关的
【单选题】
甲因犯盗窃罪被逮捕,在侦查人员对其审讯期间,甲供述了司 法机关尚未掌握的其和乙在火车上持枪抢劫的事实,并协助侦查人员将 乙抓获。对甲的抢劫罪()。
A. 可以减轻或者免除处罚
B. 可以从轻或者减轻处罚
C. 应当减轻或者免除处罚
D. 应当从轻或者免除处罚
【单选题】
甲于1995年2月犯故意伤害罪被判处无期徒刑, 1998年2月因在 劳动改造生产中抗御自然灾害舍己救人有重大立功表现,被法院裁减为 有期徒刑18年。如无再次减刑,甲将在()年2月刑满释放。
A. 2015
B. 2016
C. 2013
D. 2012
【单选题】
出租汽车司机甲因被单位领导批评,为发泄不满、私愤,驾车 驶入闹市区向密集的人群冲去,当场轧死5人,撞伤19人。对甲的行为 应认定为()。
A. 故意杀人罪
B. 交通肇事罪
C. 以危险方法危害公共安全罪
D. 重大责任事故罪
【单选题】
拐卖妇女后,又强迫被拐卖的妇女卖淫或者将被拐卖的妇女卖 给他人迫使其卖淫的,应定()。
A. 拐卖妇女罪
B. 强迫卖淫罪
C. 拐卖妇女罪和强迫卖淫罪数罪并罚
D. 引诱卖淫罪
【单选题】
下列选项中,构成刑法中的正当化事由的是()。
A. 医生经病人同意对其实施“安乐死”
B. 甲经过乙的同意将乙的一批货物销毁
C. 丙挑拨丁攻击自己,然后拔刀将丁刺成重伤
D. 黑夜中的乙以为对方是自己的丈夫而同意发生性关系
【单选题】
甲开办一间小汽修店,因修理一进口轿车缺零配件,便于晚间 在一停车场将一同型号小轿车备用轮胎一个(价值1200元)和发动机 (价值5万元)拆下盗走,甲的行为()。
A. 构成盗窃罪和破坏交通工具罪,数罪并罚
B. 构成盗窃罪和破坏交通工具罪,属想象竞合犯,从一重罪即破坏 交通工具罪定罪处罚
C. 只构成破坏交通工具罪
D. 只构成盗窃罪
【单选题】
甲为杀害贺某,在偏僻处埋伏,见有人过来,以为是贺某,便 开枪射击。黑影倒地后,甲发现死者竟然是自己的父亲。事后查明,甲 的子弹并未击中其父亲,其父亲患有严重心脏病,因听到枪声后过度惊 吓死亡。关于甲的行为,下列说法正确的是()。
A. 构成故意杀人罪既遂
B. 构成故意杀人罪未遂
C. 构成过失致人死亡罪
D. 应按照故意杀人罪未遂和过失致人死亡罪择一重罪处罚
【单选题】
下列关于犯罪、刑罚与刑事责任的说法,正确的是()。
A. 我国在犯罪、刑事责任与刑罚的关系上采取罪、责平行说
B. 刑事责任是犯罪与刑罚的上位概念
C. 有犯罪和刑事责任就有刑罚
D. 刑事责任是联系犯罪与刑罚的纽带
【单选题】
甲于1997年8月实施了故意杀人行为,于2004年7月被抓获归案。
A. 应适用1997年刑法
B. 应适用1979年刑法
C. 由审理本案的法院审判委员会决定适用1979年刑法还是1997年刑 法
D. 报请最高人民法院裁定适用1979年刑法还是1997年刑法
【单选题】
下列不属于告诉才处理的情形是()。
A. 侵占罪
B. 侮辱罪未严重危害社会秩序和国家利益的
C. 虐待罪致使被害人重伤、死亡的
D. 暴力干涉婚姻自由罪,未致使被害人死亡的
【单选题】
甲与乙有仇,欲置乙于死地。某日,甲见乙与丙被绳索悬吊于半 空中洗擦楼房外墙玻璃,便用刀割断绳索,致乙、丙一起坠地死亡。对 此,甲的主观罪过形式是()。
A. 对乙属直接故意,对丙属间接故意,具有两个罪过
B. 对乙属直接故意,对丙属轻信过失,具有两个罪过
C. 对乙属直接故意,对丙也是直接故意
D. 对乙属直接故意,对丙属意外事件,只具有一个罪过
【单选题】
行为人负刑事责任的哲学根据是()。
A. 行为人在实施犯罪时有认识能力
B. 行为人在实施犯罪时有相对的意志自由
C. 行为人在实施犯罪时有违法性认识
D. 行为人在实施犯罪时存在主观罪过
【单选题】
甲和乙共同入户抢劫并致人死亡后分头逃跑,后甲因犯强奸罪被 抓获归案。在羁押期间,甲向公安人员供述了自己和乙共同所犯的抢劫 罪行,并协助公安机关将乙抓获。对于本案,下列哪一选项是正确的? ()
A. 甲的行为属于坦白,但不成立特别自首
B. 甲的行为成立特别自首,但不成立立功
C. 甲的行为成立特别自首和立功,但不成立重大立功
D. 甲的行为成立特别自首和重大立功
【单选题】
李某与王某发生口角后,王某声称要把李某杀死,并去商店买了 一把匕首,李某怕王某杀死自己,就在王某从商店回来的路上,用猎枪 打死了王某。李某的行为属于()。
A. 正当防卫
B. 防卫过当
C. 假想防卫
D. 故意犯罪
【单选题】
下列关于立功的说法,错误的有()。
A. 犯罪分子被羁押后与律师、亲友会见过程中违反监管规定,获取 他人犯罪线索并“检举揭发”的,不能认定为有立功表现
B. 犯罪分子从负有查办犯罪、监管职责的国家工作人员处获取的他 人犯罪线索予以检举揭发的,不能认定为有立功表现
C. 犯罪分子亲友为使犯罪分子“立功”,向司法机关提供他人犯罪线 索、协助抓捕犯罪嫌疑人的,可以认定为犯罪分子有立功表现
D. 犯罪分子将其本人在以往查办犯罪的职务活动中掌握的他人犯罪 线索,予以检举揭发的,不能认定为有立功表现
【单选题】
甲将刚买回的彩电放在楼道门口,便上楼开门,被恰好路过的 乙发现。乙抱起彩电就跑。乙刚跑出10米远,甲正好下楼,将乙抓获。 关于乙的行为,下列说法正确的是()。
A. 构成侵占罪既遂
B. 构成侵占罪未遂
C. 构成盗窃罪既遂
D. 构成盗窃罪未遂
【单选题】
下列关于骗取贷款、票据承兑、金融票证罪的说法,正确的有 ()。
A. 本罪和诈骗罪都属于侵犯财产罪
B. 本罪既可以由单位构成也可以由自然人构成
C. 行为人既骗取贷款又骗取金融票证的,应当进行数罪并罚
D. 行为人以非法占有为目的骗取银行贷款的,构成骗取票据承兑罪
【单选题】
孙某将周某打成重伤而休克,临时起意拿走了周某的手机,孙 某将手机占为己有。经鉴定,手机价值4000元。对于孙某行为的定性, 下列说法正确的是()。
A. 构成故意伤害罪和抢劫罪
B. 构成故意伤害罪和抢夺罪
C. 构成故意伤害罪和盗窃罪
D. 只构成抢劫罪
【单选题】
某县有一伙人以暴力、威胁等手段,有组织地进行违法犯罪活 动,称霸当地,为非作歹,欺压、残害群众,严重破坏经济、社会秩 序。张某参加该组织并按该组织授意杀害了丁某全家。张某的行为构成 ()。
A. 参加恐怖组织罪
B. 参加恐怖组织罪、故意杀人罪
C. 参加黑社会性质组织罪、故意杀人罪
D. 参加黑社会性质组织罪
【单选题】
绑架罪的既遂应以()为标准。
A. 行为人实际控制被害人(人质)或者完成偷盗婴幼儿的行为
B. 行为人实际勒索到财物或者获取非法利益
C. 行为人对被害人人身自由开始进行限制时
D. 以上选项都不对
【单选题】
下列说法正确的有()。
A. 盗窃增值税专用发票的,构成逃税罪
B. 携带凶器盗窃的,构成抢劫罪
C. 盗窃信用卡并使用的,构成信用卡诈骗罪
D. 携带凶器抢夺的,构成抢劫罪
推荐试题
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network