Exam 5: Computer Fraud and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

I work in the information technology department of a company I'll call CMV.On Wednesday morning,I arrived at work,scanned in my identity card and punched in my code,when this guy in a delivery uniform came up behind me carrying a bunch of boxes.I opened the door for him,he nodded and grunted and went on in.I didn't think anything of it until later.Then I wondered if he might have been

(Multiple Choice)
4.7/5
(32)

What are some of the distinguishing characteristics of fraud perpetrators?

(Essay)
4.9/5
(39)

The first known examples of the practice of concealing a message within a message comes from the historian Herodotus,who wrote of a case in which a message was tattooed on the shaved head of a slave.When the slave's hair grew back,he traveled to the recipient and delivered the message by having his head shaved again.Modern applications involve concealing data within computer files.This practice is referred to as

(Multiple Choice)
4.9/5
(37)

Characteristics connected with fraud include pressures,opportunities,and rationalizations.Of these characteristics,which one relates to excuses that perpetrators have allowing them to justify their illegal behavior?

(Multiple Choice)
4.9/5
(28)

In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a

(Multiple Choice)
4.9/5
(39)

How can an organization reduce fraud losses?

(Multiple Choice)
5.0/5
(38)

Perhaps the most striking fact about natural disasters in relation to AIS controls is that

(Multiple Choice)
4.8/5
(41)

Illegally obtaining and using confidential information about a person for economic gain

(Multiple Choice)
4.8/5
(38)

Wally Hewitt maintains an online brokerage account.In early March,Wally received an email from the firm that explained that there had been a computer error and that provided a phone number so that Wally could verify his customer information.When he called,a recording asked that he enter the code from the email,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the email.Wally was a victim of

(Multiple Choice)
4.8/5
(29)

Which of the following emotions could cause an employee to feel pressured to defraud his employer?

(Multiple Choice)
4.8/5
(27)

After graduating from college with a communications degree,Sylvia Placer experienced some difficulty in finding full time employment.She free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter she was contacted by Clickadoo Online Services,who offered to pay her to promote their clients by mentioning them in her blog and linking to their Web sites.She set up several more blogs for this purpose and is now generating a reasonable level of income.She is engaged in

(Multiple Choice)
4.8/5
(36)

An expert from the Information Systems Security Association estimates that the largest single source of security problems for systems is due to

(Multiple Choice)
4.8/5
(35)

Many fraud cases go unreported and unprosecuted for several reasons.Why is this the case?

(Multiple Choice)
4.9/5
(33)

A fraud technique that slices off tiny amounts from many projects is called the __________ technique.

(Multiple Choice)
4.9/5
(30)

The simplest and most common way to commit a computer fraud is to

(Multiple Choice)
4.8/5
(36)

Which AIS threat below would be classified a computer crime?

(Multiple Choice)
4.8/5
(25)

What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting?

(Essay)
4.7/5
(30)

Which AIS threat below would be classified as a software error or equipment malfunction?

(Multiple Choice)
4.8/5
(27)

What is one common way to hide a theft?

(Multiple Choice)
4.7/5
(32)

Define fraud.

(Essay)
4.9/5
(33)
Showing 21 - 40 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)