Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
A back door into a system that bypasses normal system controls is called a
(Multiple Choice)
4.9/5
(41)
LOLer was chatting online with l33ter."I can't believe how lame some people are! :)I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." LOLer is a ________,and the fraud he is describing is ________.
(Multiple Choice)
4.8/5
(40)
Voice phishing,in which e-mail recipients are asked to call a phone number that asks them to
Divulge confidential data is known as
(Multiple Choice)
4.8/5
(36)
A fraud technique that allows a hacker to place himself or herself between a client and a host to intercept network traffic is called the ________ technique.
(Multiple Choice)
4.9/5
(41)
Mircea Vasilescu maintains an online brokerage account.In early March,Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone number to verify his customer information.When Mircea called the number,a recording asked that he enter the code from the e-mail,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the e-mail.Mircea was a victim of
(Multiple Choice)
4.7/5
(32)
Woodlane Direct Sales is a telemarketing firm that operates out of Indiana.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copied a list of customers from the past three years and their credit card information.Woodlane Direct Sales was a victim of
(Multiple Choice)
5.0/5
(28)
Unauthorized access,modification,or use of an electronic device or some element of a computer
System is known as
(Multiple Choice)
4.8/5
(45)
Steganography malware uses encryption to increase its effectiveness.
(True/False)
4.8/5
(33)
Inspecting information packets as they travel across computer networks are referred to as
(Multiple Choice)
4.8/5
(42)
Someone knocked on your door on a Friday afternoon.When you answered the door,a man dressed in a city official uniform approached you and introduced himself to you.The man said,"Hi,I am Andrew from the city public work department.We are updating our system and would like to obtain just a few piece of information from you." He proceeded to ask you several questions and obtained your driver license information and the last 4 digits of your social security number.As the man left your front porch,you saw that he was getting into his car which does not bear the city official logo.You later called the city public work department and found that they have no knowledge of a worker named Andrew and that they did not send anyone out to collect your information.You just fell victim to a ________ fraud.
(Multiple Choice)
4.8/5
(37)
When a computer criminal gains access to a system by searching through discarded records,this is referred to as
(Multiple Choice)
5.0/5
(38)
Sending an unsolicited message to many people at the same time is known as
(Multiple Choice)
4.8/5
(38)
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
(Multiple Choice)
4.9/5
(40)
Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using
(Multiple Choice)
4.9/5
(37)
Ashley Baker has been the webmaster for Berryhill Finance only ten days when Berryhill's website was scheduled for a routine security patch update.Unbeknown to Ashley,cybercrooks found out the timing of the patch update and launched attacks right before Berryhill's update from a remote location miles away.As a result of the attack,Berryhill lost a significant amount of clients' private information.Berryhill Finance suffered from a
(Multiple Choice)
4.9/5
(33)
Changing data before or during entry into a computer system to delete,alter,add,or incorrectly update data is called a
(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)