Exam 5: Computer Fraud and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The US Justice Department defines computer fraud as

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

B

What techniques are used to conceal theft by fraud?

Free
(Essay)
4.9/5
(35)
Correct Answer:
Verified

Some techniques used to conceal theft by fraud are charging stolen assets to an expense account,lapping or misapplying cash payments from customers and stealing part of the receipts,kiting or creating fictitious bank balances by shuttling monies between bank accounts,and playing the bank float,then stealing some of the cash.

What is a denial of service attack?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

A

The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called __________.

(Multiple Choice)
4.9/5
(35)

Which of the factors listed below is not a common factor for fraud?

(Multiple Choice)
4.8/5
(36)

What is a computer fraud?

(Essay)
4.9/5
(35)

Misappropriation of assets can also be called

(Multiple Choice)
4.8/5
(34)

Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a

(Multiple Choice)
4.8/5
(39)

Which type of antivirus program is most effective in spotting an infection soon after it starts?

(Multiple Choice)
4.8/5
(37)

Computers that are part of a botnet and are controlled by a bot herder are referred to as

(Multiple Choice)
4.9/5
(32)

Computer fraud can be analyzed using the traditional data processing model.According to this model,the simplest and most common fraud is __________ fraud.

(Multiple Choice)
4.9/5
(34)

There are four distinct types of threats to an AIS: 1)software errors and equipment malfunctions; 2)unintentional acts; 3)intentional acts; and 4)__________.

(Multiple Choice)
4.9/5
(31)

The unauthorized copying of company data is known as

(Multiple Choice)
4.8/5
(38)

Which of the following motivators would be a good indication of financial pressure that would contribute to employee fraud?

(Multiple Choice)
4.9/5
(30)

The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called

(Multiple Choice)
4.7/5
(33)

The call to tech support was fairly routine.A first-time computer user had purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly than it had at first.Had he been accessing the Internet? Yes.Had he installed any "free" software? Yes.The problem is likely to be a(an)

(Multiple Choice)
4.7/5
(32)

Fraud is any and all means a person uses to gain an unfair advantage over another person.Current and former employees of an organization are much more likely to perpetrate fraud than external parties.The act by a person or group of persons resulting in materially misleading financial statements is called a(n)

(Multiple Choice)
4.9/5
(38)

Jiao Jan had been the Web master for Folding Squid Technologies for only three months when the Web site was inundated with access attempts.The only solution was to shut down the site and then selectively open it to access from certain Web addresses.FST suffered significant losses during the period.The company had been the victim of a(an)

(Multiple Choice)
4.7/5
(26)

On Monday morning,Janet Pillsner,Chief Information Officer at International Securities Corporation (ISC),got some bad news.A tape used to store system data backups was lost while it was being transported to an offsite storage location.She called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?

(Multiple Choice)
4.7/5
(37)

Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)