Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Accounting Information Systems: an Overview79 Questions
Exam 2: Overview of Transaction Processing and Erp Systems74 Questions
Exam 3: Systems Documentation Techniques83 Questions
Exam 4: Relational Databases80 Questions
Exam 5: Computer Fraud46 Questions
Exam 6: Computer Fraud and Abuse Techniques45 Questions
Exam 7: Control and Accounting Information Systems96 Questions
Exam 8: Information Systems Controls for System Reliability Part 1: Information Security53 Questions
Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy24 Questions
Exam 10: Information Systems Controls for Systems Reliability Part 3: Processing Integrity and Availability63 Questions
Exam 11: Auditing Computer-Based Information Systems72 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections81 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements83 Questions
Exam 14: The Production Cycle68 Questions
Exam 15: The Human Resources Management and Payroll Cycle58 Questions
Exam 16: General Ledger and Reporting System57 Questions
Exam 17: The Rea Data Model61 Questions
Exam 18: Implementing an Rea Model in a Relational Database68 Questions
Exam 19: Special Topics in Rea Modeling72 Questions
Exam 20: Introduction to Systems Development Systems Analysis90 Questions
Exam 21: Ais Development Strategies73 Questions
Exam 22: Systems Design, implementation, and Operation70 Questions
Select questions type
Jiao Jan had been the Web master for Folding Squid Technologies for only three months when he received an anonymous email that threatened to inundate the company Web site with access attempts unless a payment was wired to an account in Eastern Europe.Jiao was concerned that FST would suffer significant losses if the threat was genuine.The author of the email was engaged in
(Multiple Choice)
4.9/5
(36)
Jiao Jan had been the Web master for Folding Squid Technologies for only three months when the Web site was inundated with access attempts.The only solution was to shut down the site and then selectively open it to access from certain Web addresses.FST suffered significant losses during the period.The company had been the victim of a(an)
(Multiple Choice)
4.7/5
(32)
Wally Hewitt maintains an online brokerage account.In early March,Wally received an email from the firm that explained that there had been a computer error and that provided a phone number so that Wally could verify his customer information.When he called,a recording asked that he enter the code from the email,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the email.Wally was a victim of
(Multiple Choice)
4.8/5
(37)
Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using
(Multiple Choice)
5.0/5
(36)
A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a
(Multiple Choice)
4.8/5
(40)
Jim Chan decided to Christmas shop online.He linked to Amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the Web site's URL was actually Amazom.com.Jim was a victim of
(Multiple Choice)
4.8/5
(40)
Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with
(Multiple Choice)
4.8/5
(38)
Chiller451 was chatting online with 3L3tCowboy."I can't believe how lame some people are! :)I can get into any system by checking out the company web site to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." Chiller451 is a ________ and the fraud he is describing is ________.
(Multiple Choice)
4.8/5
(35)
Computers that are part of a botnet and are controlled by a bot herder are referred to as
(Multiple Choice)
4.9/5
(34)
Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
(Multiple Choice)
4.8/5
(40)
After graduating from college with a communications degree,Sylvia Placer experienced some difficulty in finding full-time employment.She free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter she was contacted by Clickadoo Online Services,who offered to pay her to promote their clients by mentioning them in her blog and linking to their Web sites.She set up several more blogs for this purpose and is now generating a reasonable level of income.She is engaged in
(Multiple Choice)
4.9/5
(37)
During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of
(Multiple Choice)
4.9/5
(30)
A ________ is similar to a ________,except that it is a program rather than a code segment hidden in a host program.
(Multiple Choice)
4.8/5
(42)
I work in the information technology department of a company I'll call CMV.On Wednesday morning,I arrived at work,scanned in my identity card and punched in my code.This guy in a delivery uniform came up behind me carrying a bunch of boxes.I opened the door for him,he nodded and went on in.I didn't think anything of it until later.Then I wondered if he might have been
(Multiple Choice)
4.7/5
(43)
Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?
(Multiple Choice)
4.9/5
(36)
Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a
(Multiple Choice)
4.9/5
(35)
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
(Multiple Choice)
4.9/5
(30)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)