Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
The unauthorized access to,or use of,a computer system is known as
(Multiple Choice)
4.9/5
(40)
Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
(Multiple Choice)
4.8/5
(32)
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
(Multiple Choice)
4.9/5
(34)
Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a
(Multiple Choice)
4.8/5
(35)
Mircea Vasilescu maintains an online brokerage account.In early March,Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone number to verify his customer information.When Mircea called the number,a recording asked that he enter the code from the e-mail,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the e-mail.Mircea was a victim of
(Multiple Choice)
4.7/5
(38)
Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as
(Multiple Choice)
4.8/5
(48)
In the 1960s,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as
(Multiple Choice)
4.8/5
(37)
Computers that are part of a botnet and are controlled by a bot herder are referred to as
(Multiple Choice)
4.8/5
(26)
Pretexting is best described as a social engineering technique that uses
(Multiple Choice)
5.0/5
(31)
A ________ is similar to a ________,except that it is a program rather than a code segment hidden in a host program.
(Multiple Choice)
4.9/5
(37)
On the weekends,Thuy Nguyen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Thuy is most likely engaging in
(Multiple Choice)
4.9/5
(30)
Which method of fraud is physical in its nature rather than electronic?
(Multiple Choice)
4.9/5
(30)
During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of
(Multiple Choice)
4.9/5
(43)
Wassim Masood has been the webmaster for Woori Finance only ten days when Woori's website was flooded with access attempts.Wassim shut down the site and only opened it to Web addresses which he specifically identified as legitimate.As a result,many of Woori's customers were unable to obtain loans,causing Woori to lose a significant amount of business.Woori Finance suffered from a
(Multiple Choice)
4.8/5
(36)
Which of the following is not a human trait social engineers take advantage of to entice people to reveal information they should keep confidential?
(Multiple Choice)
4.7/5
(33)
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
(Multiple Choice)
4.9/5
(36)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)