Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a

(Multiple Choice)
4.8/5
(38)

Spyware is

(Multiple Choice)
4.9/5
(34)

Social engineering is

(Multiple Choice)
4.9/5
(36)

After graduating from college,Rob Johnson experienced some difficulty in finding full-time employment.He free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter he was contacted by SitePromoter Incorporated,who offered to pay him to promote their clients in his blog.He set up several more blogs for this purpose and is now generating a reasonable level of income.He is engaged in

(Multiple Choice)
4.9/5
(45)

A wireless network with the same name as another wireless access point is referred to as

(Multiple Choice)
4.9/5
(38)

Data diddling is

(Multiple Choice)
4.8/5
(44)

What is a dictionary attack?

(Multiple Choice)
4.9/5
(41)

Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as

(Multiple Choice)
5.0/5
(34)

Describe the various form of spoofing.Select one type of spoofing and search for an actual case about the spoofing.Discuss what has happened and provide recommendations as to how the spoofing could have been prevented.

(Essay)
5.0/5
(37)

Lebanese looping is

(Multiple Choice)
5.0/5
(42)

Voice phishing,in which e-mail recipients are asked to call a phone number that asks them to divulge confidential data is known as

(Multiple Choice)
4.9/5
(36)

Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using

(Multiple Choice)
4.9/5
(48)

Using special software to bypass system controls and perform illegal acts is called

(Multiple Choice)
4.9/5
(46)

Terrorists often use ________ because it is an effective way to transmit information and receive orders.

(Multiple Choice)
4.9/5
(40)

A fraud technique that uses a back door into a system that bypasses normal system controls is called the ________ technique.

(Multiple Choice)
4.8/5
(35)

Steganography malware uses encryption to increase its effectiveness.

(True/False)
4.8/5
(33)

Describe at least six computer attacks and abuse techniques.

(Essay)
4.8/5
(50)

In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a

(Multiple Choice)
4.8/5
(27)

Acting under false pretenses to gain confidential information is called

(Multiple Choice)
4.8/5
(31)

Maureen Boyd was arrested in Kansas City for running an online business that specialized in buying and reselling stolen credit card information.Maureen was charged with

(Multiple Choice)
4.8/5
(27)
Showing 61 - 80 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)