Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
Individuals who buy the malware are referred to as
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
Pretexting is best described as a social engineering technique that uses
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
Which of the following is not an example of social engineering?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
B
Jim Cooper decided to do some Christmas shopping online.He visited Amazon.com,found a perfect gift for his daughter,and placed his order.It was only later when he noticed that the website's URL that he had placed the order was actually Amazom.com and not Amazon.com.Jim was a victim of
(Multiple Choice)
4.9/5
(33)
After graduating from college,Rob Johnson experienced some difficulty in finding full-time employment.He free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter he was contacted by SitePromoter Incorporated,who offered to pay him to promote their clients in his blog.He set up several more blogs for this purpose and is now generating a reasonable level of income.He is engaged in
(Multiple Choice)
4.9/5
(40)
Executable code that attaches itself to software,replicates itself,and spreads to other systems or files.When triggered,it makes unauthorized alterations to the way a system operates,which is called a
(Multiple Choice)
4.9/5
(30)
Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a
(Multiple Choice)
4.8/5
(35)
________ consists of the unauthorized copying of company data.
(Multiple Choice)
5.0/5
(41)
Ashley Baker has been the webmaster for Berryhill Finance only ten days when Berryhill's website was flooded with access attempts.Ashley shut down the site and only opened it to Web addresses which she specifically identified as legitimate.As a result,many of Berryhill's customers were unable to obtain loans,causing Berryhill to lose a significant amount of business.Berryhill Finance suffered from a
(Multiple Choice)
4.8/5
(32)
On the weekends,Mary Andersen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Mary is most likely engaging in
(Multiple Choice)
4.8/5
(47)
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
(Multiple Choice)
4.9/5
(35)
Which of the following websites likely poses the most fraud and security risk?
(Multiple Choice)
4.9/5
(47)
Offering a free website,then charging the phone bills of the individuals who signed up for the free website is known as
(Multiple Choice)
4.8/5
(44)
Individuals who use telephone lines to commit fraud and other illegal acts are typically called
(Multiple Choice)
4.8/5
(38)
During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of
(Multiple Choice)
4.9/5
(34)
A fraud technique that uses unauthorized codes in an authorized and properly functioning program is called the ________ technique.
(Multiple Choice)
4.8/5
(38)
Using computer technology to harm another person is known as
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)