Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
(Multiple Choice)
4.9/5
(43)
Which of the following websites likely poses the most fraud and security risk?
(Multiple Choice)
4.9/5
(31)
A part of a program that remains idle until a specified date or event activates it to cause havoc is called a
(Multiple Choice)
4.7/5
(31)
On a Friday evening you use a bar's ATM to withdraw $50 from your bank account.However,as you complete your withdrawal,your card gets jammed in the ATM machine.The individual waiting in line behind you approaches you and suggests re-entering your PIN number.You do.However,your card remains jammed.You leave the bar to call your bank to report the incident.However,after you left the individual who offered to help you removed a sleeve he inserted in the ATM to jam your card.He now has your ATM card and PIN number.You just fell victim to a ________ fraud.
(Multiple Choice)
4.8/5
(38)
Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down Berryhill's website unless Ashley wired payment to an overseas account.Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down,so she wired money to the appropriate account.The author of the e-mail successfully committed
(Multiple Choice)
4.8/5
(33)
On the weekends,Mary Andersen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Mary is most likely engaging in
(Multiple Choice)
4.7/5
(39)
Law enforcement uses key logging software,a form of malware,to detect crime.
(True/False)
4.7/5
(35)
Recall that students used Facebook and VKontakte to identify Russian money laundering mules.What fraud case did these students help foil?
(Multiple Choice)
4.9/5
(33)
Offering a free website,then charging the phone bills of the individuals who signed up for the free website is known as
(Multiple Choice)
4.7/5
(31)
Woodlane Direct Sales is a telemarketing firm that operates out of Indiana.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copied a list of customers from the past three years and their credit card information.Woodlane Direct Sales was a victim of
(Multiple Choice)
4.8/5
(38)
Individuals who use telephone lines to commit fraud and other illegal acts are typically called
(Multiple Choice)
4.9/5
(43)
When a computer criminal gains access to a system by searching through discarded records,this is referred to as
(Multiple Choice)
4.8/5
(38)
Ashley Baker works in the information technology department of Core Company.On Monday morning,she arrived at work,scanned her identity card,and entered her access code.At that moment,a man in a delivery uniform came up behind Ashley with a bunch of boxes.Although Ashley held the door for the delivery man,she later wondered if the man was engaged in
(Multiple Choice)
4.9/5
(43)
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
(Multiple Choice)
4.8/5
(31)
Which of the following is not a human trait social engineers take advantage of to entice people to reveal information they should keep confidential?
(Multiple Choice)
4.9/5
(38)
In the 1960s,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as
(Multiple Choice)
4.8/5
(42)
Which of the following would be least effective to reduce exposure to a computer virus?
(Multiple Choice)
4.8/5
(37)
Executable code that attaches itself to software,replicates itself,and spreads to other systems or files.When triggered,it makes unauthorized alterations to the way a system operates,which is called a
(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)