Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Telefarm Industries is a telemarketing firm that operates in the Midwest.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copy a list of customers from the past three years that included credit card information.Telefarm was a victim of

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

A

Gaining control of someone else's computer to carry out illicit activities without the owner's knowledge is known as

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

B

When a computer criminal gains access to a system by searching records or the trash of the target company,this is referred to as

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

B

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called

(Multiple Choice)
4.8/5
(45)

Which of the following would be least effective to reduce exposure to a computer virus?

(Multiple Choice)
4.9/5
(38)

Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called

(Multiple Choice)
4.7/5
(45)

Illegally obtaining and using confidential information about a person for economic gain is known as

(Multiple Choice)
4.7/5
(31)

In the 1960s,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as

(Multiple Choice)
4.8/5
(40)

The unauthorized access to,and use of,computer systems is known as

(Multiple Choice)
4.8/5
(40)

The call to tech support was fairly routine.A first-time computer user had purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly than it had at first.Had he been accessing the Internet? Yes.Had he installed any "free" software? Yes.The problem is likely to be a(an)

(Multiple Choice)
4.8/5
(49)

The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called

(Multiple Choice)
5.0/5
(33)

Wally Hewitt is an accountant with a large accounting firm.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Wally received an email from the firm that explained that there had been an error updating his password and that provided a link to a Web site with instructions for re-entering his password.Something about the email made Wally suspicious,so he called the firm's information technology department and found that the email was fictitious.The email was an example of

(Multiple Choice)
4.7/5
(44)

Which of the following is not a method of identify theft?

(Multiple Choice)
4.8/5
(39)

Describe the differences between a worm and a virus?

(Essay)
4.7/5
(26)

A set of unauthorized computer instructions in an otherwise properly functioning program is known as a

(Multiple Choice)
4.9/5
(41)

In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a

(Multiple Choice)
4.9/5
(32)

It was late on a Friday afternoon when Troy Willicott got a call at the help desk for Taggitt Finances.A man with an edge of panic clearly discernible in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as Chet Frazier from the Accounting Department.He told Troy that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Troy knew that Taggitt's new password policy,that required that passwords must be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems.Consequently,Troy provided the password,listened as it was read back to him,and was profusely thanked before ending the call.The caller was not Chet Frazier,and Troy Willicott was a victim of

(Multiple Choice)
4.9/5
(35)

The unauthorized copying of company data is known as

(Multiple Choice)
4.8/5
(43)

A fraud technique that slices off tiny amounts from many projects is called the ________ technique.

(Multiple Choice)
4.8/5
(42)

The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called

(Multiple Choice)
4.9/5
(43)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)