Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
In the 1960s,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as
Free
(Multiple Choice)
5.0/5
(40)
Correct Answer:
A
A part of a program that remains idle until a specified date or event activates it to cause havoc is called a
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
B
Describe the differences between a worm and a virus?
Free
(Essay)
4.7/5
(36)
Correct Answer:
A computer virus is a segment of executable code that attaches itself to computer software.A virus has two phases: it replicates itself and spreads to other systems or files,and in the attack phase,the virus carries out its mission to destroy files or the system itself.A worm is similar to a virus,except that it is a program rather than a code segment hidden in a host program.A worm can reside in e-mail attachments,which when opened or activated can damage a user's system.Worms can also reproduce themselves by mailing themselves to the addresses found in the recipient's mailing list.Worms do not have long lives,but their lives can be very destructive nonetheless.
Illegally obtaining and using confidential information about a person for economic gain is known as
(Multiple Choice)
4.9/5
(45)
Which of the following would be least effective to reduce exposure to a computer virus?
(Multiple Choice)
4.9/5
(38)
Wassim Masood has been the webmaster for Woori Finance only ten days when he received an e-mail that threatened to shut down Woori's website unless Wassim wired payment to an account in South America.Wassim was concerned that Woori Finance would suffer huge losses if its website went down,so he wired money to the appropriate account.The author of the e-mail successfully committed
(Multiple Choice)
4.8/5
(36)
A ________ is similar to a ________,except that it is a program rather than a code segment hidden in a host program.
(Multiple Choice)
4.8/5
(40)
Mircea Vasilescu maintains an online brokerage account.In early March,Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone number to verify his customer information.When Mircea called the number,a recording asked that he enter the code from the e-mail,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the e-mail.Mircea was a victim of
(Multiple Choice)
4.9/5
(33)
LOLer was chatting online with l33ter."I can't believe how lame some people are! :)I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." LOLer is a ________,and the fraud he is describing is ________.
(Multiple Choice)
4.8/5
(33)
Which method of fraud is physical in its nature rather than electronic?
(Multiple Choice)
4.8/5
(45)
Individuals who use telephone lines to commit fraud and other illegal acts are typically called
(Multiple Choice)
4.9/5
(38)
Which of the following is not a human trait social engineers take advantage of to entice people to reveal information they should keep confidential?
(Multiple Choice)
4.9/5
(39)
Spyware that pops banner ads on a monitor,then collects information about the users web-surfing and spending habits is an example of
(Multiple Choice)
5.0/5
(35)
Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?
(Multiple Choice)
4.8/5
(42)
Dimitri Ivanov is an accountant with PwC.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Dimitri received an e-mail claiming that there had been an error updating his password and that provided a link to a website with instructions for re-updating his password.Something about the e-mail made Dimitri suspicious,so he called PwC's information technology department and found that the e-mail was fictitious.The e-mail was an example of
(Multiple Choice)
4.7/5
(39)
Wassim Masood has been the webmaster for Woori Finance only ten days when Woori's website was flooded with access attempts.Wassim shut down the site and only opened it to Web addresses which he specifically identified as legitimate.As a result,many of Woori's customers were unable to obtain loans,causing Woori to lose a significant amount of business.Woori Finance suffered from a
(Multiple Choice)
4.9/5
(35)
Which of the following is not an example of social engineering?
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)