Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Lebanese looping is

(Multiple Choice)
4.9/5
(37)

A back door into a system that bypasses normal system controls is called a

(Multiple Choice)
4.9/5
(41)

LOLer was chatting online with l33ter."I can't believe how lame some people are! :)I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." LOLer is a ________,and the fraud he is describing is ________.

(Multiple Choice)
4.8/5
(40)

Voice phishing,in which e-mail recipients are asked to call a phone number that asks them to Divulge confidential data is known as

(Multiple Choice)
4.8/5
(36)

A fraud technique that allows a hacker to place himself or herself between a client and a host to intercept network traffic is called the ________ technique.

(Multiple Choice)
4.9/5
(41)

Mircea Vasilescu maintains an online brokerage account.In early March,Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone number to verify his customer information.When Mircea called the number,a recording asked that he enter the code from the e-mail,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the e-mail.Mircea was a victim of

(Multiple Choice)
4.7/5
(32)

Woodlane Direct Sales is a telemarketing firm that operates out of Indiana.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copied a list of customers from the past three years and their credit card information.Woodlane Direct Sales was a victim of

(Multiple Choice)
5.0/5
(28)

Unauthorized access,modification,or use of an electronic device or some element of a computer System is known as

(Multiple Choice)
4.8/5
(45)

Steganography malware uses encryption to increase its effectiveness.

(True/False)
4.8/5
(33)

Ransomware often comes in the form of

(Multiple Choice)
4.9/5
(46)

Inspecting information packets as they travel across computer networks are referred to as

(Multiple Choice)
4.8/5
(42)

Someone knocked on your door on a Friday afternoon.When you answered the door,a man dressed in a city official uniform approached you and introduced himself to you.The man said,"Hi,I am Andrew from the city public work department.We are updating our system and would like to obtain just a few piece of information from you." He proceeded to ask you several questions and obtained your driver license information and the last 4 digits of your social security number.As the man left your front porch,you saw that he was getting into his car which does not bear the city official logo.You later called the city public work department and found that they have no knowledge of a worker named Andrew and that they did not send anyone out to collect your information.You just fell victim to a ________ fraud.

(Multiple Choice)
4.8/5
(37)

When a computer criminal gains access to a system by searching through discarded records,this is referred to as

(Multiple Choice)
5.0/5
(38)

Sending an unsolicited message to many people at the same time is known as

(Multiple Choice)
4.8/5
(38)

Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

(Multiple Choice)
4.9/5
(40)

What is a buffer overflow attack?

(Multiple Choice)
4.9/5
(40)

Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using

(Multiple Choice)
4.9/5
(37)

Ashley Baker has been the webmaster for Berryhill Finance only ten days when Berryhill's website was scheduled for a routine security patch update.Unbeknown to Ashley,cybercrooks found out the timing of the patch update and launched attacks right before Berryhill's update from a remote location miles away.As a result of the attack,Berryhill lost a significant amount of clients' private information.Berryhill Finance suffered from a

(Multiple Choice)
4.9/5
(33)

Describe the differences between spyware,scareware,and ransomware.

(Essay)
4.8/5
(33)

Changing data before or during entry into a computer system to delete,alter,add,or incorrectly update data is called a

(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)