Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the 1960s,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as

Free
(Multiple Choice)
5.0/5
(40)
Correct Answer:
Verified

A

A part of a program that remains idle until a specified date or event activates it to cause havoc is called a

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

B

Describe the differences between a worm and a virus?

Free
(Essay)
4.7/5
(36)
Correct Answer:
Verified

A computer virus is a segment of executable code that attaches itself to computer software.A virus has two phases: it replicates itself and spreads to other systems or files,and in the attack phase,the virus carries out its mission to destroy files or the system itself.A worm is similar to a virus,except that it is a program rather than a code segment hidden in a host program.A worm can reside in e-mail attachments,which when opened or activated can damage a user's system.Worms can also reproduce themselves by mailing themselves to the addresses found in the recipient's mailing list.Worms do not have long lives,but their lives can be very destructive nonetheless.

Illegally obtaining and using confidential information about a person for economic gain is known as

(Multiple Choice)
4.9/5
(45)

Zeus is an example of a

(Multiple Choice)
4.8/5
(41)

Which of the following would be least effective to reduce exposure to a computer virus?

(Multiple Choice)
4.9/5
(38)

Wassim Masood has been the webmaster for Woori Finance only ten days when he received an e-mail that threatened to shut down Woori's website unless Wassim wired payment to an account in South America.Wassim was concerned that Woori Finance would suffer huge losses if its website went down,so he wired money to the appropriate account.The author of the e-mail successfully committed

(Multiple Choice)
4.8/5
(36)

A ________ is similar to a ________,except that it is a program rather than a code segment hidden in a host program.

(Multiple Choice)
4.8/5
(40)

Mircea Vasilescu maintains an online brokerage account.In early March,Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone number to verify his customer information.When Mircea called the number,a recording asked that he enter the code from the e-mail,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the e-mail.Mircea was a victim of

(Multiple Choice)
4.9/5
(33)

Which of the following is not a method of identity theft?

(Multiple Choice)
4.9/5
(32)

LOLer was chatting online with l33ter."I can't believe how lame some people are! :)I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." LOLer is a ________,and the fraud he is describing is ________.

(Multiple Choice)
4.8/5
(33)

Which method of fraud is physical in its nature rather than electronic?

(Multiple Choice)
4.8/5
(45)

Individuals who use telephone lines to commit fraud and other illegal acts are typically called

(Multiple Choice)
4.9/5
(38)

Describe at least four social engineering techniques.

(Essay)
4.7/5
(39)

Which of the following is not a human trait social engineers take advantage of to entice people to reveal information they should keep confidential?

(Multiple Choice)
4.9/5
(39)

Spyware that pops banner ads on a monitor,then collects information about the users web-surfing and spending habits is an example of

(Multiple Choice)
5.0/5
(35)

Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?

(Multiple Choice)
4.8/5
(42)

Dimitri Ivanov is an accountant with PwC.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Dimitri received an e-mail claiming that there had been an error updating his password and that provided a link to a website with instructions for re-updating his password.Something about the e-mail made Dimitri suspicious,so he called PwC's information technology department and found that the e-mail was fictitious.The e-mail was an example of

(Multiple Choice)
4.7/5
(39)

Wassim Masood has been the webmaster for Woori Finance only ten days when Woori's website was flooded with access attempts.Wassim shut down the site and only opened it to Web addresses which he specifically identified as legitimate.As a result,many of Woori's customers were unable to obtain loans,causing Woori to lose a significant amount of business.Woori Finance suffered from a

(Multiple Choice)
4.9/5
(35)

Which of the following is not an example of social engineering?

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)