Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called

(Multiple Choice)
4.9/5
(43)

Which of the following websites likely poses the most fraud and security risk?

(Multiple Choice)
4.9/5
(31)

A part of a program that remains idle until a specified date or event activates it to cause havoc is called a

(Multiple Choice)
4.7/5
(31)

On a Friday evening you use a bar's ATM to withdraw $50 from your bank account.However,as you complete your withdrawal,your card gets jammed in the ATM machine.The individual waiting in line behind you approaches you and suggests re-entering your PIN number.You do.However,your card remains jammed.You leave the bar to call your bank to report the incident.However,after you left the individual who offered to help you removed a sleeve he inserted in the ATM to jam your card.He now has your ATM card and PIN number.You just fell victim to a ________ fraud.

(Multiple Choice)
4.8/5
(38)

Which of the following is not a method of identity theft?

(Multiple Choice)
4.8/5
(35)

Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down Berryhill's website unless Ashley wired payment to an overseas account.Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down,so she wired money to the appropriate account.The author of the e-mail successfully committed

(Multiple Choice)
4.8/5
(33)

On the weekends,Mary Andersen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Mary is most likely engaging in

(Multiple Choice)
4.7/5
(39)

Law enforcement uses key logging software,a form of malware,to detect crime.

(True/False)
4.7/5
(35)

What is a buffer overflow attack?

(Multiple Choice)
4.8/5
(38)

Recall that students used Facebook and VKontakte to identify Russian money laundering mules.What fraud case did these students help foil?

(Multiple Choice)
4.9/5
(33)

Offering a free website,then charging the phone bills of the individuals who signed up for the free website is known as

(Multiple Choice)
4.7/5
(31)

Woodlane Direct Sales is a telemarketing firm that operates out of Indiana.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copied a list of customers from the past three years and their credit card information.Woodlane Direct Sales was a victim of

(Multiple Choice)
4.8/5
(38)

Individuals who use telephone lines to commit fraud and other illegal acts are typically called

(Multiple Choice)
4.9/5
(43)

When a computer criminal gains access to a system by searching through discarded records,this is referred to as

(Multiple Choice)
4.8/5
(38)

Ashley Baker works in the information technology department of Core Company.On Monday morning,she arrived at work,scanned her identity card,and entered her access code.At that moment,a man in a delivery uniform came up behind Ashley with a bunch of boxes.Although Ashley held the door for the delivery man,she later wondered if the man was engaged in

(Multiple Choice)
4.9/5
(43)

Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

(Multiple Choice)
4.8/5
(31)

Which of the following is not a human trait social engineers take advantage of to entice people to reveal information they should keep confidential?

(Multiple Choice)
4.9/5
(38)

In the 1960s,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as

(Multiple Choice)
4.8/5
(42)

Which of the following would be least effective to reduce exposure to a computer virus?

(Multiple Choice)
4.8/5
(37)

Executable code that attaches itself to software,replicates itself,and spreads to other systems or files.When triggered,it makes unauthorized alterations to the way a system operates,which is called a

(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)