Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe the various form of spoofing.Select one type of spoofing and search for an actual case about the spoofing.Discuss what has happened and provide recommendations as to how the spoofing could have been prevented.

(Essay)
4.7/5
(45)

The unauthorized use of special program that bypass regular system controls to perform illegal acts is called

(Multiple Choice)
4.7/5
(48)

Spyware that pops banner ads on a monitor,then collects information about the users web-surfing and spending habits is an example of

(Multiple Choice)
4.8/5
(37)

A fraud technique that uses a back door into a system that bypasses normal system controls is called the ________ technique.

(Multiple Choice)
4.9/5
(34)

Redirecting traffic to a spoofed website to obtain confidential information is known as

(Multiple Choice)
4.8/5
(33)

Secretly changing an already open browser tab using JavaScript is called

(Multiple Choice)
4.8/5
(37)

It was late on a Friday afternoon when Chloe Pike got a call at the help desk for Taggart Corp.A man with an edge of panic in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as Joe Andrew from the accounting department of Taggart Corp.He told Chloe that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Chloe knew that Taggart's new password policy required that passwords be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems for many users.Consequently,Chloe provided the password to Joe.The caller turned out not to be Joe Andrew,and Chloe was a victim of

(Multiple Choice)
4.9/5
(41)

Megan has purchased a brand new laptop about three months ago.Recently,she feels that her computer is operating much more slowly and sluggishly than before.Since purchasing the computer,Megan had been accessing the Internet and had installed a variety of free software.The problem is mostly likely to be

(Multiple Choice)
4.9/5
(36)

Which of the following is not a human trait social engineers take advantage of to entice people to reveal information they should keep confidential?

(Multiple Choice)
4.7/5
(42)

Identify theft has always been a federal crime.

(True/False)
4.8/5
(45)

In the 1960s,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as

(Multiple Choice)
4.9/5
(36)

Data diddling is

(Multiple Choice)
4.8/5
(39)

On a Friday evening you use a bar's ATM to withdraw $50 from your bank account.However,as you complete your withdrawal,your card gets jammed in the ATM machine.The individual waiting in line behind you approaches you and suggests re-entering your PIN number.You do.However,your card remains jammed.You leave the bar to call your bank to report the incident.However,after you left the individual who offered to help you removed a sleeve he inserted in the ATM to jam your card.He now has your ATM card and PIN number.You just fell victim to a ________ fraud.

(Multiple Choice)
4.8/5
(34)

After graduating from college,Rob Johnson experienced some difficulty in finding full-time employment.Trying to make ends meet,Rob used all of his saving to buy a significant number of shares in small,low-priced,thinly traded penny stocks.He then uses spam e-mails and blog postings to disseminate overly optimistic information about the company in hope to drives up the company's stock price.He is waiting to sell his shares to investors and pocket a profit.He is engaged in

(Multiple Choice)
4.8/5
(40)

What is a dictionary attack?

(Multiple Choice)
4.9/5
(42)

Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as

(Multiple Choice)
4.8/5
(31)

Law enforcement uses key logging software,a form of malware,to detect crime.

(True/False)
5.0/5
(43)

A hacker who changed the voice mail greeting of a company to say that it is offering free products by asking customers to dial a different phone number to claim their gifts is engaging in

(Multiple Choice)
4.7/5
(38)

How can a system be protected from viruses?

(Essay)
4.8/5
(43)

Describe at least four social engineering techniques.Provide an example for one of the techniques.

(Essay)
4.8/5
(37)
Showing 41 - 60 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)