Exam 10: Cybercrime, Fraud, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Most states now have at least one cybercrime law.In general, successful prosecution is predicated on

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

Forensic accountants are to accounting as detectives are to criminal justice.

Free
(True/False)
5.0/5
(29)
Correct Answer:
Verified

True

Fraudsters often rationalize their actions by convincing themselves that everyone is doing it, or that their actions serve the greater good.

Free
(True/False)
4.9/5
(44)
Correct Answer:
Verified

True

Some firms and governmental organizations use ethical hackers to help find any vulnerabilities that could be exploited by a malicious hacker.Which of the following is also used to refer to ethical hacking?

(Multiple Choice)
4.8/5
(31)

A DDOS attack often utilizes a botnet controlled by a nefarious actor.

(True/False)
4.9/5
(47)

When organizations discover a cybercrime, the cost of auditing and investigating the loss often exceeds the actual monetary loss.

(True/False)
4.9/5
(44)

A conflict exists between providing bona fide AIS users easy access to computer resources and security objectives.

(True/False)
4.8/5
(29)

At present, we think that cybercrime is:

(Multiple Choice)
4.9/5
(32)

Thwarting most forms of cybercrime does not require the support of top management.

(True/False)
4.9/5
(32)

Which of these is an acronym for computer crime legislation?

(Multiple Choice)
4.7/5
(35)

The theft of millions of credit card numbers from customers of Target stores using malware is an example of:

(Multiple Choice)
4.8/5
(35)

Which of the following is true?

(Multiple Choice)
4.9/5
(33)

Effective computer security usually begins with:

(Multiple Choice)
4.8/5
(43)

According to the chapter, which of these statements is most accurate?

(Multiple Choice)
4.9/5
(32)

A "strong password" is a password that lasts a long time.

(True/False)
4.9/5
(41)

Which of the following does not destroy data but merely replicates itself repeatedly until the user runs out of internal memory or disk space?

(Multiple Choice)
4.9/5
(46)

A DDOS attack works by:

(Multiple Choice)
4.7/5
(36)

One conclusion that we can draw about cybercrime is that it is growing.

(True/False)
4.9/5
(37)

A forensic accountant is an accountant who:

(Multiple Choice)
4.8/5
(34)

Which of these terms describes a computer program that remains dormant until triggered by some specific circumstance or date?

(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)