Exam 6: Computer Fraud and Abuse Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The unauthorized access to,or use of,a computer system is known as

(Multiple Choice)
4.9/5
(40)

Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by

(Multiple Choice)
4.8/5
(32)

Which of the following is not a method of identity theft?

(Multiple Choice)
4.7/5
(36)

Describe at least six computer attacks and abuse techniques.

(Essay)
4.7/5
(29)

The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called

(Multiple Choice)
4.9/5
(34)

Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a

(Multiple Choice)
4.8/5
(35)

Mircea Vasilescu maintains an online brokerage account.In early March,Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone number to verify his customer information.When Mircea called the number,a recording asked that he enter the code from the e-mail,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the e-mail.Mircea was a victim of

(Multiple Choice)
4.7/5
(38)

Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as

(Multiple Choice)
4.8/5
(48)

In the 1960s,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as

(Multiple Choice)
4.8/5
(37)

Computers that are part of a botnet and are controlled by a bot herder are referred to as

(Multiple Choice)
4.8/5
(26)

Pretexting is best described as a social engineering technique that uses

(Multiple Choice)
5.0/5
(31)

A ________ is similar to a ________,except that it is a program rather than a code segment hidden in a host program.

(Multiple Choice)
4.9/5
(37)

True or False: Identify theft has always been a federal crime.

(True/False)
4.8/5
(33)

On the weekends,Thuy Nguyen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Thuy is most likely engaging in

(Multiple Choice)
4.9/5
(30)

Describe at least four social engineering techniques.

(Essay)
5.0/5
(34)

Which method of fraud is physical in its nature rather than electronic?

(Multiple Choice)
4.9/5
(30)

During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of

(Multiple Choice)
4.9/5
(43)

Wassim Masood has been the webmaster for Woori Finance only ten days when Woori's website was flooded with access attempts.Wassim shut down the site and only opened it to Web addresses which he specifically identified as legitimate.As a result,many of Woori's customers were unable to obtain loans,causing Woori to lose a significant amount of business.Woori Finance suffered from a

(Multiple Choice)
4.8/5
(36)

Which of the following is not a human trait social engineers take advantage of to entice people to reveal information they should keep confidential?

(Multiple Choice)
4.7/5
(33)

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called

(Multiple Choice)
4.9/5
(36)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)