Exam 5: Computer Fraud and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The unauthorized access to and use of computer systems

(Multiple Choice)
4.7/5
(45)

Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?

(Multiple Choice)
4.7/5
(33)

In a disbursement fraud the company

(Multiple Choice)
4.9/5
(35)

A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a

(Multiple Choice)
4.9/5
(45)

Computer fraud has been categorized into several different classifications.The classification of computer fraud where the perpetrator causes a company to pay for ordered goods,or to pay for goods never ordered is called

(Multiple Choice)
4.9/5
(38)

During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of

(Multiple Choice)
4.7/5
(41)

Computer fraud is often much more difficult to detect than other types of fraud because

(Multiple Choice)
4.9/5
(36)

Chiller451 was chatting online with 3L3tCowboy."I can't believe how lame some people are! :)I can get into any system by checking out the company web site to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." Chiller451 is a __________ and the method he is describing is ___________.

(Multiple Choice)
4.7/5
(42)

What are some of the computer fraud techniques used by perpetrators?

(Essay)
4.8/5
(36)

Why do fraudulent acts often go unreported and are therefore not prosecuted?

(Essay)
4.7/5
(38)

A fraud technique that allows the hacker to bypass normal system controls and enter a secured system is called

(Multiple Choice)
4.9/5
(36)

Stealing a master list of customers and selling it to a competitor is an example of

(Multiple Choice)
4.9/5
(42)

There are three characteristics associated with most fraud.The characteristic that often takes more time and effort and leaves behind more evidence than other types of fraud is called

(Multiple Choice)
4.8/5
(42)

A __________ is similar to a __________,except that it is a program rather than a code segment hidden in a host program.

(Multiple Choice)
4.8/5
(38)

What are the two kinds of fraud in business?

(Essay)
4.8/5
(37)

Wally Hewitt is an accountant with a large accounting firm.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Wally received an email from the firm that explained that there had been an error updating his password and that provided a link to a Web site with instructions for re-entering his password.Something about the email made Wally suspicious,so he called the firm's information technology department and found that the email was fictitious.The email was an example of

(Multiple Choice)
4.8/5
(38)

Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

(Multiple Choice)
4.8/5
(40)

How can companies reduce losses from fraud?

(Essay)
4.9/5
(35)

Gaining control of someone else's computer to carry out illicit activities without the user's knowledge

(Multiple Choice)
4.9/5
(41)

In the 1960's,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as

(Multiple Choice)
4.8/5
(42)
Showing 61 - 80 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)