Exam 10: Cybercrime, Fraud, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

No one really knows how much is lost each year as the result of cybercrime.

(True/False)
4.9/5
(35)

___ protects data in transit and at rest by transforming the data into an unintelligible format, readable only if the key is possessed.

(Multiple Choice)
5.0/5
(35)

The U.S.Congress passed the first federal computer crime law in 1986 making it illegal to alter or destroy federal information.

(True/False)
4.9/5
(41)

In thwarting cybercrime, which of the following is true?

(Multiple Choice)
4.9/5
(34)

According to the most recent ACFE Report to the Nations, the greatest median fraud loss is reported among fraudsters who:

(Multiple Choice)
4.8/5
(36)

A DDOS is a collection of compromise internet-enabled devices that are utilized in concert to commit cybercrime.

(True/False)
4.9/5
(44)

One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is the intent to illegally obtain information or tangible property through the use of computers.Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system?

(Multiple Choice)
4.8/5
(25)

The absence of good statistics on cybercrime is partially explained by the fact that a large proportion of the cybercrime committed in private organizations is handled as an internal matter and thus is never publicly divulged.

(True/False)
4.9/5
(41)

A computer virus may lie dormant in a system until software is copied and run on non?licensed machines.

(True/False)
5.0/5
(39)

A computer virus is:

(Multiple Choice)
4.8/5
(37)

Which of these would be an example of "denial-of-service" computer abuse?

(Multiple Choice)
4.8/5
(33)

Organizations that stress the importance of business ethics tend to get about the same results as companies that do not stress its importance.

(True/False)
4.7/5
(31)

Accounting "ethics" means:

(Multiple Choice)
4.7/5
(36)

The Fraud Triangle provides a useful framework for understanding the drivers that must be present for cybercrime to occur.

(True/False)
4.8/5
(37)

It is generally accepted that hackers are motivated only by greed.

(True/False)
4.8/5
(42)
Showing 61 - 75 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)