Exam 14: Computer Crime and Information Technology Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A hacker launches a denial of service attack against an information system, then demands money to stop it. The hacker's actions are an example of:

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

A

Web site defacements are an example of: (i) computer as a crime target, (ii) computer as an instrumentality?

Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
Verified

B

According to Carter's taxonomy of computer crime, which of the following best describes the computer as an instrumentality?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

All of the following are business risks and threats related to computer crime except:

(Multiple Choice)
4.8/5
(34)

A well-developed information security policy will enhance internal control by helping to fulfill which of COBIT's information criteria?

(Multiple Choice)
4.9/5
(37)

According to the COBIT framework, information that is "relevant and pertinent to the business process and is delivered in a timely, correct, consistent and usable manner" meets the ___ criterion.

(Multiple Choice)
4.9/5
(31)

An organization experiencing a denial of service attack is most likely failing to fulfill which of COBIT's information criteria?

(Multiple Choice)
5.0/5
(35)

Computer hackers driven by financial gain are called:

(Multiple Choice)
4.8/5
(34)

Calvin works as an accountant for RRI Inc., a corporation that manages the financial assets of wealthy clients, such as movie stars and politicians. Calvin has not received a pay increase in three years and has grown unhappy in his position. He has been approached by a tabloid newspaper with an offer for significant monetary compensation in exchange for personal facts about RRI's clients. Because he feels unappreciated and underpaid, Calvin is seriously considering the tabloid's offer, even though it violates RRI's information security policy and the agreements RRI has with its clients. -Assuming Calvin accepts the offer, he could be described as all of the following except:

(Multiple Choice)
4.8/5
(35)

According to the COBIT framework, information that is "accurate and complete and is in accordance with business values and expectations" meets the ___ criterion.

(Multiple Choice)
4.8/5
(37)

Which of the following is not an element of the CIA triad?

(Multiple Choice)
4.9/5
(40)

Which of the following is not part of the IT control taxonomy presented in the text?

(Multiple Choice)
4.9/5
(41)

Calvin works as an accountant for RRI Inc., a corporation that manages the financial assets of wealthy clients, such as movie stars and politicians. Calvin has not received a pay increase in three years and has grown unhappy in his position. He has been approached by a tabloid newspaper with an offer for significant monetary compensation in exchange for personal facts about RRI's clients. Because he feels unappreciated and underpaid, Calvin is seriously considering the tabloid's offer, even though it violates RRI's information security policy and the agreements RRI has with its clients. -Based on the description above, RRI is exposed to all of the following risks except:

(Multiple Choice)
4.8/5
(32)

The textbook discussed seven types of computer criminals. Explain which types most clearly describe Tim based on the above situation.

(Essay)
4.9/5
(40)

According to the COBIT accountability framework, which of the following stakeholder groups should create disclosures regarding information governance controls?

(Multiple Choice)
4.8/5
(37)

Which type of computer control is most likely to prevent the threat of system intrusions?

(Multiple Choice)
4.9/5
(32)

Errors are most likely to lead to which of the following business risks/threats?

(Multiple Choice)
4.8/5
(39)

"Any illegal act for which knowledge of computer technology is used to commit the offense" is the United States Department of Justice definition of:

(Multiple Choice)
4.8/5
(40)

The COBIT framework can be used to strengthen internal controls against computer crime by:

(Multiple Choice)
4.8/5
(38)

A company installs video surveillance outside the room that houses its central computer servers. The video system is an example of a(n):

(Multiple Choice)
4.9/5
(49)
Showing 1 - 20 of 58
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)