Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

C

The unauthorized use of special program that bypass regular system controls to perform illegal acts is called

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

D

Data diddling is

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

Spyware is

(Multiple Choice)
4.8/5
(38)

Which of the following would be least effective to reduce exposure to a computer virus?

(Multiple Choice)
4.7/5
(39)

Which of the following websites likely poses the most fraud and security risk?

(Multiple Choice)
4.9/5
(37)

Terrorists often use ________ because it is an effective way to transmit information and receive orders.

(Multiple Choice)
4.8/5
(36)

A part of a program that remains idle until a specified date or event activates it to cause havoc is called a

(Multiple Choice)
4.9/5
(39)

A fraud technique that slices off tiny amounts from many projects is called the ________ technique.

(Multiple Choice)
4.9/5
(36)

After graduating from college with a communications degree,Rado Ionesco experienced some difficulty in finding full-time employment.He free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter he was contacted by SitePromoter Incorporated,who offered to pay him to promote their clients in his blog.He set up several more blogs for this purpose and is now generating a reasonable level of income.He is engaged in

(Multiple Choice)
4.9/5
(37)

Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with

(Multiple Choice)
4.9/5
(36)

Individuals who use telephone lines to commit fraud and other illegal acts are typically called

(Multiple Choice)
4.9/5
(38)

Which of the following is not an example of social engineering?

(Multiple Choice)
4.8/5
(38)

Ransomware often comes in the form of

(Multiple Choice)
4.8/5
(45)

Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

(Multiple Choice)
4.7/5
(31)

True or False: Law enforcement uses key logging software,a form of malware,to detect crime.

(True/False)
4.7/5
(44)

Jim Chan decided to Christmas shop online.He linked to Amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the website's URL was actually Amazom.com.Jim was a victim of

(Multiple Choice)
4.7/5
(29)

True or False: Steganography malware uses encryption to increase its effectiveness.

(True/False)
4.9/5
(42)

Rina Misra,a first-time computer user,purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly.Since purchasing the computer,she had been accessing the Internet and had installed a variety of free software.The problem is mostly likely to be

(Multiple Choice)
4.8/5
(30)

What is social engineering?

(Essay)
4.9/5
(34)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)