Exam 10: Cybercrime, Fraud, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The term "smishing" means:

(Multiple Choice)
4.8/5
(37)

Most computer abuse that we have caught so far has been because of good accounting controls.

(True/False)
4.9/5
(38)

Thwarting computer abuse can be enhanced by all of the following except:

(Multiple Choice)
4.8/5
(37)

Cybercrime and fraud are one and the same.

(True/False)
4.8/5
(35)

Most computer criminals are individuals of questionable background, little education, and no morals.

(True/False)
4.8/5
(40)

Watching for tell-tale signs may help detect computer crime.

(True/False)
4.8/5
(42)

Most computer criminals we have been fortunate enough to catch have had long, criminal backgrounds.

(True/False)
4.9/5
(26)

Much of what has been termed cybercrime has merely involved the computer but probably would be more accurately classified as other types of crimes.A notable exception to this involves:

(Multiple Choice)
4.8/5
(40)

An example of a conflict-of-interest situation is:

(Multiple Choice)
4.9/5
(34)

Experts suggest that policies on computer abuse are ineffective, and therefore should not be used to help educate employees about computer abuse.

(True/False)
4.9/5
(35)

According to most security professionals, most computer criminals are discovered because of

(Multiple Choice)
4.9/5
(40)

Automated accounting information systems are a particularly important potential target of cybercrime.

(True/False)
4.8/5
(31)

Probably the most important federal legislation governing activities involving computers is:

(Multiple Choice)
4.9/5
(44)

Examples of pressures that motivate the fraudster to act include financial difficulties and unobtainable sales / bonus goals.

(True/False)
4.8/5
(34)

Hacking involves:

(Multiple Choice)
4.9/5
(33)

A small computer program that is stored on a web server and designed to run in conjunction with browser software is called a(n):

(Multiple Choice)
4.8/5
(34)

Today's accountants have no responsibility for designing or implementing control procedures that protect AISs from cybercrime and fraud.

(True/False)
4.9/5
(40)

According to the chapter, which of these statements is most accurate?

(Multiple Choice)
4.9/5
(32)

Acts such as dumpster diving, phishing, and smishing are all conducted to:

(Multiple Choice)
4.9/5
(39)

According to the chapter, a computer virus is an example of a type of cybercrime called "denial of service."

(True/False)
4.8/5
(40)
Showing 21 - 40 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)