Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Data diddling is

(Multiple Choice)
4.8/5
(39)

________ consists of the unauthorized copying of company data.

(Multiple Choice)
4.8/5
(35)

The unauthorized access to,or use of,a computer system is known as

(Multiple Choice)
4.8/5
(40)

A fraud technique that slices off tiny amounts from many projects is called the ________ technique.

(Multiple Choice)
4.8/5
(35)

Narang Direct Sales is a telemarketing firm that operates out of India.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copied a list of customers from the past three years and their credit card information.Narang Direct Sales was a victim of

(Multiple Choice)
4.8/5
(40)

Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a

(Multiple Choice)
4.7/5
(33)

On a Friday evening you use a bar's ATM to withdraw $50 from your bank account.However,as you complete your withdrawal,your card gets jammed in the ATM machine.The individual waiting in line behind you approaches you and suggests re-entering your PIN number.You do.However,your card remains jammed.You leave the bar to call your bank to report the incident.However,after you left the individual who offered to help you removed a sleeve he inserted in the ATM to jam your card.He now has your ATM card and PIN number.You just fell victim to a ________ fraud.

(Multiple Choice)
4.8/5
(35)

Describe at least six computer attacks and abuse techniques.

(Essay)
4.8/5
(42)

When a computer criminal gains access to a system by searching through discarded records,this is referred to as

(Multiple Choice)
4.9/5
(27)

After graduating from college with a communications degree,Rado Ionesco experienced some difficulty in finding full-time employment.He free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter he was contacted by SitePromoter Incorporated,who offered to pay him to promote their clients in his blog.He set up several more blogs for this purpose and is now generating a reasonable level of income.He is engaged in

(Multiple Choice)
4.9/5
(39)

How can a system be protected from viruses?

(Essay)
4.8/5
(40)

Computers that are part of a botnet and are controlled by a bot herder are referred to as

(Multiple Choice)
4.8/5
(35)

Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by

(Multiple Choice)
4.8/5
(35)

What is a denial of service attack?

(Multiple Choice)
4.8/5
(31)

Recall that students used Facebook and VKontakte to identify Russian money laundering mules.What fraud case did these students help foil?

(Multiple Choice)
4.8/5
(37)

A set of unauthorized computer instructions in an otherwise properly functioning program is known as a

(Multiple Choice)
4.9/5
(40)

The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called

(Multiple Choice)
4.9/5
(31)

During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of

(Multiple Choice)
4.9/5
(43)

Law enforcement uses key logging software,a form of malware,to detect crime.

(True/False)
4.9/5
(41)

Steganography malware uses encryption to increase its effectiveness.

(True/False)
4.8/5
(47)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)