Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
It was late on a Friday afternoon when Makari Polzin got a call at the help desk for Taggart Transcontinental.A man with an edge of panic in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as John Galt from the Accounting Department.He told Makari that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Makari knew that Taggart's new password policy required that passwords be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems.Consequently,Makari provided the password to John.The caller was not John Galt,and Makari was a victim of
(Multiple Choice)
4.9/5
(29)
Terrorists often use ________ because it is an effective way to transmit information and receive orders.
(Multiple Choice)
4.9/5
(37)
Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using
(Multiple Choice)
4.9/5
(43)
Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as
(Multiple Choice)
4.9/5
(40)
Pretexting is best described as a social engineering technique that uses
(Multiple Choice)
4.8/5
(42)
Which of the following websites likely poses the most fraud and security risk?
(Multiple Choice)
4.8/5
(37)
The unauthorized use of special program that bypass regular system controls to perform illegal acts is called
(Multiple Choice)
4.9/5
(39)
Wassim Masood works in the information technology department of TMV.On Monday morning,he arrived at work,scanned his identity card,and entered his code.At that moment,a lady in a delivery uniform came up behind Wassim with a bunch of boxes.Although Wassim held the door for the delivery lade,he later wondered if the delivery lady was engaged in
(Multiple Choice)
4.9/5
(35)
Rina Misra,a first-time computer user,purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly.Since purchasing the computer,she had been accessing the Internet and had installed a variety of free software.The problem is mostly likely to be
(Multiple Choice)
4.7/5
(32)
On the weekends,Thuy Nguyen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Thuy is most likely engaging in
(Multiple Choice)
4.8/5
(38)
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
(Multiple Choice)
4.9/5
(33)
Offering a free website,then charging the phone bills of the individuals who signed up for the free website is known as
(Multiple Choice)
4.7/5
(38)
In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a
(Multiple Choice)
4.9/5
(45)
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
(Multiple Choice)
4.8/5
(37)
Jim Chan decided to Christmas shop online.He linked to Amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the website's URL was actually Amazom.com.Jim was a victim of
(Multiple Choice)
4.9/5
(35)
Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with
(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)