Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
LOLer was chatting online with l33ter."I can't believe how lame some people are! :)I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." LOLer is a ________,and the fraud he is describing is ________.
(Multiple Choice)
4.8/5
(31)
Wassim Masood works in the information technology department of TMV.On Monday morning,he arrived at work,scanned his identity card,and entered his code.At that moment,a lady in a delivery uniform came up behind Wassim with a bunch of boxes.Although Wassim held the door for the delivery lade,he later wondered if the delivery lady was engaged in
(Multiple Choice)
4.8/5
(31)
Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?
(Multiple Choice)
4.9/5
(35)
On a Friday evening you use a bar's ATM to withdraw $50 from your bank account.However,as you complete your withdrawal,your card gets jammed in the ATM machine.The individual waiting in line behind you approaches you and suggests re-entering your PIN number.You do.However,your card remains jammed.You leave the bar to call your bank to report the incident.However,after you left the individual who offered to help you removed a sleeve he inserted in the ATM to jam your card.He now has your ATM card and PIN number.You just fell victim to a ________ fraud.
(Multiple Choice)
4.9/5
(40)
________ consists of the unauthorized copying of company data.
(Multiple Choice)
4.8/5
(33)
Wassim Masood has been the webmaster for Woori Finance only ten days when he received an e-mail that threatened to shut down Woori's website unless Wassim wired payment to an account in South America.Wassim was concerned that Woori Finance would suffer huge losses if its website went down,so he wired money to the appropriate account.The author of the e-mail successfully committed
(Multiple Choice)
4.8/5
(45)
It was late on a Friday afternoon when Makari Polzin got a call at the help desk for Taggart Transcontinental.A man with an edge of panic in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as John Galt from the Accounting Department.He told Makari that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Makari knew that Taggart's new password policy required that passwords be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems.Consequently,Makari provided the password to John.The caller was not John Galt,and Makari was a victim of
(Multiple Choice)
4.8/5
(32)
A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
(Multiple Choice)
4.9/5
(41)
Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using
(Multiple Choice)
4.7/5
(38)
Illegally obtaining and using confidential information about a person for economic gain is known as
(Multiple Choice)
4.9/5
(36)
Spyware that pops banner ads on a monitor,then collects information about the users web-surfing and spending habits is an example of
(Multiple Choice)
4.8/5
(32)
When a computer criminal gains access to a system by searching through discarded records,this is referred to as
(Multiple Choice)
5.0/5
(37)
Dimitri Ivanov is an accountant with PwC.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Dimitri received an e-mail claiming that there had been an error updating his password and that provided a link to a website with instructions for re-updating his password.Something about the e-mail made Dimitri suspicious,so he called PwC's information technology department and found that the e-mail was fictitious.The e-mail was an example of
(Multiple Choice)
4.8/5
(47)
Narang Direct Sales is a telemarketing firm that operates out of India.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copied a list of customers from the past three years and their credit card information.Narang Direct Sales was a victim of
(Multiple Choice)
4.9/5
(42)
Offering a free website,then charging the phone bills of the individuals who signed up for the free website is known as
(Multiple Choice)
4.8/5
(36)
Recall that students used Facebook and VKontakte to identify Russian money laundering mules.What fraud case did these students help foil?
(Multiple Choice)
4.9/5
(36)
Showing 21 - 40 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)