Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
C
The unauthorized use of special program that bypass regular system controls to perform illegal acts is called
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
D
Which of the following would be least effective to reduce exposure to a computer virus?
(Multiple Choice)
4.7/5
(39)
Which of the following websites likely poses the most fraud and security risk?
(Multiple Choice)
4.9/5
(37)
Terrorists often use ________ because it is an effective way to transmit information and receive orders.
(Multiple Choice)
4.8/5
(36)
A part of a program that remains idle until a specified date or event activates it to cause havoc is called a
(Multiple Choice)
4.9/5
(39)
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
(Multiple Choice)
4.9/5
(36)
After graduating from college with a communications degree,Rado Ionesco experienced some difficulty in finding full-time employment.He free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter he was contacted by SitePromoter Incorporated,who offered to pay him to promote their clients in his blog.He set up several more blogs for this purpose and is now generating a reasonable level of income.He is engaged in
(Multiple Choice)
4.9/5
(37)
Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with
(Multiple Choice)
4.9/5
(36)
Individuals who use telephone lines to commit fraud and other illegal acts are typically called
(Multiple Choice)
4.9/5
(38)
Which of the following is not an example of social engineering?
(Multiple Choice)
4.8/5
(38)
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
(Multiple Choice)
4.7/5
(31)
True or False: Law enforcement uses key logging software,a form of malware,to detect crime.
(True/False)
4.7/5
(44)
Jim Chan decided to Christmas shop online.He linked to Amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the website's URL was actually Amazom.com.Jim was a victim of
(Multiple Choice)
4.7/5
(29)
True or False: Steganography malware uses encryption to increase its effectiveness.
(True/False)
4.9/5
(42)
Rina Misra,a first-time computer user,purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly.Since purchasing the computer,she had been accessing the Internet and had installed a variety of free software.The problem is mostly likely to be
(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)