Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

It was late on a Friday afternoon when Makari Polzin got a call at the help desk for Taggart Transcontinental.A man with an edge of panic in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as John Galt from the Accounting Department.He told Makari that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Makari knew that Taggart's new password policy required that passwords be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems.Consequently,Makari provided the password to John.The caller was not John Galt,and Makari was a victim of

(Multiple Choice)
4.9/5
(29)

Terrorists often use ________ because it is an effective way to transmit information and receive orders.

(Multiple Choice)
4.9/5
(37)

Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using

(Multiple Choice)
4.9/5
(43)

Ransomware often comes in the form of

(Multiple Choice)
4.9/5
(38)

Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as

(Multiple Choice)
4.9/5
(40)

Pretexting is best described as a social engineering technique that uses

(Multiple Choice)
4.8/5
(42)

What is social engineering?

(Essay)
4.9/5
(30)

Which of the following websites likely poses the most fraud and security risk?

(Multiple Choice)
4.8/5
(37)

The unauthorized use of special program that bypass regular system controls to perform illegal acts is called

(Multiple Choice)
4.9/5
(39)

Wassim Masood works in the information technology department of TMV.On Monday morning,he arrived at work,scanned his identity card,and entered his code.At that moment,a lady in a delivery uniform came up behind Wassim with a bunch of boxes.Although Wassim held the door for the delivery lade,he later wondered if the delivery lady was engaged in

(Multiple Choice)
4.9/5
(35)

Rina Misra,a first-time computer user,purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly.Since purchasing the computer,she had been accessing the Internet and had installed a variety of free software.The problem is mostly likely to be

(Multiple Choice)
4.7/5
(32)

On the weekends,Thuy Nguyen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Thuy is most likely engaging in

(Multiple Choice)
4.8/5
(38)

Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

(Multiple Choice)
4.9/5
(33)

Identify theft has always been a federal crime.

(True/False)
4.9/5
(40)

Offering a free website,then charging the phone bills of the individuals who signed up for the free website is known as

(Multiple Choice)
4.7/5
(38)

In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a

(Multiple Choice)
4.9/5
(45)

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called

(Multiple Choice)
4.8/5
(37)

Spyware is

(Multiple Choice)
4.7/5
(35)

Jim Chan decided to Christmas shop online.He linked to Amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the website's URL was actually Amazom.com.Jim was a victim of

(Multiple Choice)
4.9/5
(35)

Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with

(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)