Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A part of a program that remains idle until a specified date or event activates it to cause havoc is called a

(Multiple Choice)
4.8/5
(32)

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called

(Multiple Choice)
4.8/5
(39)

Using special software to bypass system controls and perform illegal acts is called

(Multiple Choice)
4.9/5
(48)

Maureen Boyd was arrested in Kansas City for running an online business that specialized in buying and reselling stolen credit card information.Maureen was charged with

(Multiple Choice)
4.9/5
(41)

A set of unauthorized computer instructions in an otherwise properly functioning program is known as a

(Multiple Choice)
4.8/5
(38)

The unauthorized access to,or use of,a computer system is known as

(Multiple Choice)
4.9/5
(39)

A wireless network with the same name as another wireless access point is referred to as

(Multiple Choice)
4.8/5
(45)

Recall that students used Facebook and VKontakte to identify Russian money laundering mules.What fraud case did these students help foil?

(Multiple Choice)
4.8/5
(35)

Describe at least six computer attacks and abuse techniques.

(Essay)
4.9/5
(34)

Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down Berryhill's website unless Ashley wired payment to an overseas account.Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down,so she wired money to the appropriate account.The author of the e-mail successfully committed

(Multiple Choice)
4.9/5
(44)

A fraud technique that slices off tiny amounts from many projects is called the ________ technique.

(Multiple Choice)
4.8/5
(28)

Acting under false pretenses to gain confidential information is called

(Multiple Choice)
4.7/5
(39)

Terrorists often use ________ because it is an effective way to transmit information and receive orders.

(Multiple Choice)
4.9/5
(30)

Individuals who create new viruses,spyware,and Trojan horses that are used to infect computers are referred to as

(Multiple Choice)
4.9/5
(35)

Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by

(Multiple Choice)
4.9/5
(41)

Carding is

(Multiple Choice)
4.9/5
(39)
Showing 81 - 96 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)