Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called

(Multiple Choice)
4.8/5
(38)

What is social engineering? Provide an example.

(Essay)
4.9/5
(37)

A set of unauthorized computer instructions in an otherwise properly functioning program is known as a

(Multiple Choice)
4.8/5
(38)

Ashley Baker has been the webmaster for Berryhill Finance only ten days when Berryhill's website was flooded with access attempts.Ashley shut down the site and only opened it to Web addresses which she specifically identified as legitimate.As a result,many of Berryhill's customers were unable to obtain loans,causing Berryhill to lose a significant amount of business.Berryhill Finance suffered from a

(Multiple Choice)
4.8/5
(37)

A back door into a system that bypasses normal system controls is called a

(Multiple Choice)
4.8/5
(36)

A fraud technique that slices off tiny amounts from many projects is called the ________ technique.

(Multiple Choice)
4.9/5
(37)

Zeus is an example of a

(Multiple Choice)
4.8/5
(35)

LOLer was chatting online with l33ter."I can't believe how lame some people are! :)I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." LOLer is a ________,and the fraud he is describing is ________.

(Multiple Choice)
4.8/5
(39)

________ consists of the unauthorized copying of company data.

(Multiple Choice)
4.7/5
(35)

The unauthorized use of special program that bypass regular system controls to perform illegal acts is called

(Multiple Choice)
5.0/5
(33)

During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of

(Multiple Choice)
4.9/5
(36)

What is a denial of service attack?

(Multiple Choice)
4.9/5
(34)

Which method of fraud is physical in its nature rather than electronic?

(Multiple Choice)
4.9/5
(45)

Changing data before or during entry into a computer system to delete,alter,add,or incorrectly update data is called a

(Multiple Choice)
4.7/5
(27)

Secretly changing an already open browser tab using JavaScript is called

(Multiple Choice)
4.9/5
(32)

Carding is

(Multiple Choice)
4.8/5
(33)
Showing 81 - 96 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)