Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Individuals who buy the malware are referred to as

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

Pretexting is best described as a social engineering technique that uses

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

B

Which of the following is not an example of social engineering?

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

B

Listening to private voice or data transmissions is called

(Multiple Choice)
4.9/5
(34)

Jim Cooper decided to do some Christmas shopping online.He visited Amazon.com,found a perfect gift for his daughter,and placed his order.It was only later when he noticed that the website's URL that he had placed the order was actually Amazom.com and not Amazon.com.Jim was a victim of

(Multiple Choice)
4.9/5
(33)

After graduating from college,Rob Johnson experienced some difficulty in finding full-time employment.He free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter he was contacted by SitePromoter Incorporated,who offered to pay him to promote their clients in his blog.He set up several more blogs for this purpose and is now generating a reasonable level of income.He is engaged in

(Multiple Choice)
4.9/5
(40)

Executable code that attaches itself to software,replicates itself,and spreads to other systems or files.When triggered,it makes unauthorized alterations to the way a system operates,which is called a

(Multiple Choice)
4.9/5
(30)

Zeus is an example of a

(Multiple Choice)
4.9/5
(39)

Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a

(Multiple Choice)
4.8/5
(35)

________ consists of the unauthorized copying of company data.

(Multiple Choice)
5.0/5
(41)

Ashley Baker has been the webmaster for Berryhill Finance only ten days when Berryhill's website was flooded with access attempts.Ashley shut down the site and only opened it to Web addresses which she specifically identified as legitimate.As a result,many of Berryhill's customers were unable to obtain loans,causing Berryhill to lose a significant amount of business.Berryhill Finance suffered from a

(Multiple Choice)
4.8/5
(32)

On the weekends,Mary Andersen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Mary is most likely engaging in

(Multiple Choice)
4.8/5
(47)

Spyware is

(Multiple Choice)
4.9/5
(47)

The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called

(Multiple Choice)
4.9/5
(35)

Which of the following websites likely poses the most fraud and security risk?

(Multiple Choice)
4.9/5
(47)

Offering a free website,then charging the phone bills of the individuals who signed up for the free website is known as

(Multiple Choice)
4.8/5
(44)

Individuals who use telephone lines to commit fraud and other illegal acts are typically called

(Multiple Choice)
4.8/5
(38)

During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of

(Multiple Choice)
4.9/5
(34)

A fraud technique that uses unauthorized codes in an authorized and properly functioning program is called the ________ technique.

(Multiple Choice)
4.8/5
(38)

Using computer technology to harm another person is known as

(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)