Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
________ consists of the unauthorized copying of company data.
(Multiple Choice)
4.8/5
(35)
The unauthorized access to,or use of,a computer system is known as
(Multiple Choice)
4.8/5
(40)
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
(Multiple Choice)
4.8/5
(35)
Narang Direct Sales is a telemarketing firm that operates out of India.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copied a list of customers from the past three years and their credit card information.Narang Direct Sales was a victim of
(Multiple Choice)
4.8/5
(40)
Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a
(Multiple Choice)
4.7/5
(33)
On a Friday evening you use a bar's ATM to withdraw $50 from your bank account.However,as you complete your withdrawal,your card gets jammed in the ATM machine.The individual waiting in line behind you approaches you and suggests re-entering your PIN number.You do.However,your card remains jammed.You leave the bar to call your bank to report the incident.However,after you left the individual who offered to help you removed a sleeve he inserted in the ATM to jam your card.He now has your ATM card and PIN number.You just fell victim to a ________ fraud.
(Multiple Choice)
4.8/5
(35)
When a computer criminal gains access to a system by searching through discarded records,this is referred to as
(Multiple Choice)
4.9/5
(27)
After graduating from college with a communications degree,Rado Ionesco experienced some difficulty in finding full-time employment.He free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter he was contacted by SitePromoter Incorporated,who offered to pay him to promote their clients in his blog.He set up several more blogs for this purpose and is now generating a reasonable level of income.He is engaged in
(Multiple Choice)
4.9/5
(39)
Computers that are part of a botnet and are controlled by a bot herder are referred to as
(Multiple Choice)
4.8/5
(35)
Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
(Multiple Choice)
4.8/5
(35)
Recall that students used Facebook and VKontakte to identify Russian money laundering mules.What fraud case did these students help foil?
(Multiple Choice)
4.8/5
(37)
A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
(Multiple Choice)
4.9/5
(40)
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
(Multiple Choice)
4.9/5
(31)
During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of
(Multiple Choice)
4.9/5
(43)
Law enforcement uses key logging software,a form of malware,to detect crime.
(True/False)
4.9/5
(41)
Steganography malware uses encryption to increase its effectiveness.
(True/False)
4.8/5
(47)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)