Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following would be least effective to reduce exposure to a computer virus?

(Multiple Choice)
4.9/5
(42)

What is a denial of service attack?

(Multiple Choice)
4.8/5
(35)

Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?

(Multiple Choice)
4.8/5
(27)

Which of the following is not a method of identity theft?

(Multiple Choice)
4.8/5
(37)

A ________ is similar to a ________,except that it is a program rather than a code segment hidden in a host program.

(Multiple Choice)
4.9/5
(35)

Illegally obtaining and using confidential information about a person for economic gain is known as

(Multiple Choice)
4.9/5
(38)

Taking control of a phone to make calls,send text messages,listen to calls,or read text messages is called

(Multiple Choice)
4.9/5
(34)

Creating a seemingly legitimate business,collecting personal data while making a sale,and never delivering items sold is known as

(Multiple Choice)
4.8/5
(33)

Hunter Carr is an accountant with AcctSmart.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Hunter received an e-mail claiming that there had been an error updating his password and it provided Hunter with a link to a website with instructions for re-updating his password.Something about the e-mail made Hunter suspicious,so he called AcctSmart's information technology department and found that the e-mail was fictitious.The e-mail was an example of

(Multiple Choice)
4.7/5
(36)

In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a

(Multiple Choice)
4.8/5
(37)

What is a SQL injection attack?

(Multiple Choice)
4.9/5
(35)

Ashley Baker works in the information technology department of Core Company.On Monday morning,she arrived at work,scanned her identity card,and entered her access code.At that moment,a man in a delivery uniform came up behind Ashley with a bunch of boxes.Although Ashley held the door for the delivery man,she later wondered if the man was engaged in

(Multiple Choice)
4.7/5
(44)

Computers that are part of a botnet and are controlled by a bot herder are referred to as

(Multiple Choice)
4.9/5
(32)

Using a small device with storage capacity (iPod,Flash drive)to download unauthorized data from A computer is called

(Multiple Choice)
4.9/5
(49)

Social engineering is

(Multiple Choice)
4.9/5
(34)

What is social engineering? Provide an example.

(Essay)
4.8/5
(47)

Describe ways to help minimize social engineering.

(Essay)
4.8/5
(36)

Describe the differences between a worm and a virus.

(Essay)
4.9/5
(41)

Individuals who control an army of malware-infected zombie computers are referred to as

(Multiple Choice)
4.9/5
(36)

Which method of fraud is physical in its nature rather than electronic?

(Multiple Choice)
4.7/5
(35)
Showing 61 - 80 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)