Deck 5: Computer Fraud and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/95
Play
Full screen (f)
Deck 5: Computer Fraud and Security
1
The Treadway Commission studied 450 lawsuits against auditors and found that
A)misappropriation of assets was the reason for over one-half of the suits.
B)fraudulent financial reporting was the reason for over one-half of the suits.
C)white-collar criminals were responsible for only a fraction of the lawsuits.
D)only in a very few cases were financial statements falsified.
A)misappropriation of assets was the reason for over one-half of the suits.
B)fraudulent financial reporting was the reason for over one-half of the suits.
C)white-collar criminals were responsible for only a fraction of the lawsuits.
D)only in a very few cases were financial statements falsified.
B
2
Fraud is any and all means a person uses to gain an unfair advantage over another person.Current and former employees of an organization are much more likely to perpetrate fraud than external parties.The act by a person or group of persons resulting in materially misleading financial statements is called a(n)
A)misappropriation of assets.
B)employee fraud.
C)fraudulent financial reporting.
D)theft of assets.
A)misappropriation of assets.
B)employee fraud.
C)fraudulent financial reporting.
D)theft of assets.
C
3
In many cases of fraud,the __________ takes more time and effort than the __________ is worth.
A)concealment; theft
B)theft; concealment
C)conversion; theft
D)conversion; concealment
A)concealment; theft
B)theft; concealment
C)conversion; theft
D)conversion; concealment
A
4
Which of the following emotions could cause an employee to feel pressured to defraud his employer?
A)a feeling of not being appreciated
B)failing to receive a deserved promotion
C)believing that their pay is too low relative to others around them
D)All of the above emotions could be sources of pressure.
A)a feeling of not being appreciated
B)failing to receive a deserved promotion
C)believing that their pay is too low relative to others around them
D)All of the above emotions could be sources of pressure.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
5
There are three characteristics associated with most fraud.The characteristic that often takes more time and effort and leaves behind more evidence than other types of fraud is called
A)theft.
B)conversion.
C)concealment.
D)embezzlement.
A)theft.
B)conversion.
C)concealment.
D)embezzlement.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
6
An expert from the Information Systems Security Association estimates that the largest single source of security problems for systems is due to
A)human errors and omissions.
B)physical threats such as natural disasters.
C)dishonest employees.
D)fraud and embezzlement.
A)human errors and omissions.
B)physical threats such as natural disasters.
C)dishonest employees.
D)fraud and embezzlement.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
7
Perhaps the most striking fact about natural disasters in relation to AIS controls is that
A)many companies in one locale can be seriously affected at one time by a disaster.
B)losses are absolutely unpreventable.
C)there are a large number of major disasters every year.
D)disaster planning has largely been ignored in the literature.
A)many companies in one locale can be seriously affected at one time by a disaster.
B)losses are absolutely unpreventable.
C)there are a large number of major disasters every year.
D)disaster planning has largely been ignored in the literature.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
8
There are four distinct types of threats to an AIS: 1)software errors and equipment malfunctions; 2)unintentional acts; 3)intentional acts; and 4)__________.
A)computer fraud
B)data transmission errors
C)human carelessness
D)natural and political disasters
A)computer fraud
B)data transmission errors
C)human carelessness
D)natural and political disasters
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
9
Which AIS threat below would be classified as a natural or political disaster?
A)Accident
B)Corruption
C)Power outage
D)Terrorist attack
A)Accident
B)Corruption
C)Power outage
D)Terrorist attack
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
10
Which AIS threat below would be classified as a software error or equipment malfunction?
A)Earthquake
B)Logic error
C)Operating system crash
D)Sabotage
A)Earthquake
B)Logic error
C)Operating system crash
D)Sabotage
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the factors listed below is not a common factor for fraud?
A)pressure to commit fraud
B)opportunity to commit fraud
C)desire to get even with the employer
D)rationalization for the crime
A)pressure to commit fraud
B)opportunity to commit fraud
C)desire to get even with the employer
D)rationalization for the crime
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
12
Which AIS threat below would be classified an unintentional act?
A)a power outage
B)sabotage
C)high winds
D)a logic error
A)a power outage
B)sabotage
C)high winds
D)a logic error
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
13
Most fraud perpetrators are insiders because
A)insiders are more dishonest than outsiders.
B)insiders know more about the system and its weaknesses than outsiders.
C)outsiders are more likely to get caught than insiders.
D)insiders have more need for money than outsiders.
A)insiders are more dishonest than outsiders.
B)insiders know more about the system and its weaknesses than outsiders.
C)outsiders are more likely to get caught than insiders.
D)insiders have more need for money than outsiders.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
14
Which AIS threat below would be classified a computer crime?
A)Innocent error
B)Operating system crash
C)Sabotage
D)Terrorist attack
A)Innocent error
B)Operating system crash
C)Sabotage
D)Terrorist attack
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
15
Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that
A)few differences exist between white-collar criminals and the general public.
B)white-collar criminals eventually become violent criminals.
C)most white-collar criminals invest their illegal income rather than spend it.
D)most white-collar criminals are older and not technologically proficient.
A)few differences exist between white-collar criminals and the general public.
B)white-collar criminals eventually become violent criminals.
C)most white-collar criminals invest their illegal income rather than spend it.
D)most white-collar criminals are older and not technologically proficient.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
16
A majority of fraud perpetrators are
A)outsiders.
B)employees.
C)computer hackers.
D)vendors.
A)outsiders.
B)employees.
C)computer hackers.
D)vendors.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following motivators would be a good indication of financial pressure that would contribute to employee fraud?
A)a big change for the better in an employee's lifestyle
B)an employee suddenly acquires lots of credit cards
C)inadequate internal controls
D)too close association with suppliers or customers
A)a big change for the better in an employee's lifestyle
B)an employee suddenly acquires lots of credit cards
C)inadequate internal controls
D)too close association with suppliers or customers
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
18
Misappropriation of assets can also be called
A)Computer fraud
B)Employee fraud
C)Fraudulent financial reporting
D)Management fraud
A)Computer fraud
B)Employee fraud
C)Fraudulent financial reporting
D)Management fraud
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
19
Intentional or reckless conduct that results in materially misleading financial statements is called
A)financial fraud.
B)misstatement fraud.
C)fraudulent financial reporting.
D)audit failure fraud.
A)financial fraud.
B)misstatement fraud.
C)fraudulent financial reporting.
D)audit failure fraud.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
20
Reasons for committing a fraud include living beyond one's means,having heavy debts,or unusually high bills.Such a motivator for committing a fraud is commonly known as a
A)spark.
B)pressure.
C)flash-point.
D)catalyst.
A)spark.
B)pressure.
C)flash-point.
D)catalyst.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
21
Computer fraud can be analyzed using the traditional data processing model.According to this model,the simplest and most common fraud is __________ fraud.
A)input
B)processor
C)computer instructions
D)output
A)input
B)processor
C)computer instructions
D)output
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
22
What is the most prevalent opportunity within most companies to commit fraud?
A)the failure to have any internal controls
B)the failure to enforce the system of internal controls
C)the failure to have the correct controls
D)the failure to realize that fraud could occur
A)the failure to have any internal controls
B)the failure to enforce the system of internal controls
C)the failure to have the correct controls
D)the failure to realize that fraud could occur
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
23
Many fraud cases go unreported and unprosecuted for several reasons.Why is this the case?
A)Companies are reluctant to report computer crimes because a highly visible computer fraud is a public relations nightmare.
B)Such crimes are difficult,costly,and time-consuming to investigate and prosecute.
C)Law enforcement and the courts are often too busy with violent crimes that little time is left for fraud cases.
D)all of the above
A)Companies are reluctant to report computer crimes because a highly visible computer fraud is a public relations nightmare.
B)Such crimes are difficult,costly,and time-consuming to investigate and prosecute.
C)Law enforcement and the courts are often too busy with violent crimes that little time is left for fraud cases.
D)all of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
24
How can funds be stolen in payroll fraud?
A)by paying a fictitious or ghost employee
B)by increasing pay rates without permission
C)by keeping a real but terminated employee on the payroll
D)All of the above situations are possible.
A)by paying a fictitious or ghost employee
B)by increasing pay rates without permission
C)by keeping a real but terminated employee on the payroll
D)All of the above situations are possible.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
25
What is a denial of service attack?
A)A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses,overloading an Internet service provider's e-mail server.
B)A denial of service attack occurs when an e-mail message is sent through a re-mailer,who removes the message headers making the message anonymous,then resends the message to selected addresses.
C)A denial of service attack occurs when a cracker enters a system through an idle modem,captures the PC attached to the modem,and then gains access to the network to which it is connected.
D)A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more Usenet newsgroups LISTSERV lists.
A)A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses,overloading an Internet service provider's e-mail server.
B)A denial of service attack occurs when an e-mail message is sent through a re-mailer,who removes the message headers making the message anonymous,then resends the message to selected addresses.
C)A denial of service attack occurs when a cracker enters a system through an idle modem,captures the PC attached to the modem,and then gains access to the network to which it is connected.
D)A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more Usenet newsgroups LISTSERV lists.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
26
The US Justice Department defines computer fraud as
A)any crime in which a computer is used.
B)an illegal act in which knowledge of computer technology is essential.
C)any act in which cash is stolen using a computer.
D)an illegal act in which a computer is an integral part of the crime.
A)any crime in which a computer is used.
B)an illegal act in which knowledge of computer technology is essential.
C)any act in which cash is stolen using a computer.
D)an illegal act in which a computer is an integral part of the crime.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
27
What is one common way to hide a theft?
A)by creating cash through the transfer of money between banks
B)by the conversion of stolen assets into cash
C)by stealing cash from customer A and then using customer B's balance to pay customer A's accounts receivable
D)by charging the stolen item to an expense account
A)by creating cash through the transfer of money between banks
B)by the conversion of stolen assets into cash
C)by stealing cash from customer A and then using customer B's balance to pay customer A's accounts receivable
D)by charging the stolen item to an expense account
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
28
Computer fraud is often much more difficult to detect than other types of fraud because
A)perpetrators usually only steal very small amounts of money at a time,thus requiring a long period of time to have elapsed before they're discovered.
B)perpetrators can commit a fraud and leave little or no evidence.
C)most perpetrators invest their illegal income rather than spend it,thus concealing key evidence.
D)most computer criminals are older and are considered to be more cunning when committing such a fraud.
A)perpetrators usually only steal very small amounts of money at a time,thus requiring a long period of time to have elapsed before they're discovered.
B)perpetrators can commit a fraud and leave little or no evidence.
C)most perpetrators invest their illegal income rather than spend it,thus concealing key evidence.
D)most computer criminals are older and are considered to be more cunning when committing such a fraud.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
29
Stealing a master list of customers and selling it to a competitor is an example of
A)data theft.
B)output theft.
C)disbursement fraud.
D)a trap door technique.
A)data theft.
B)output theft.
C)disbursement fraud.
D)a trap door technique.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
30
In a disbursement fraud the company
A)pays too much for ordered goods.
B)pays for goods never received.
C)laps cash payments at the bank.
D)Both A and B are correct.
A)pays too much for ordered goods.
B)pays for goods never received.
C)laps cash payments at the bank.
D)Both A and B are correct.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
31
Characteristics connected with fraud include pressures,opportunities,and rationalizations.Of these characteristics,which one often stems from a lack of internal controls within an organization?
A)pressures
B)opportunities
C)rationalizations
D)none of the above
A)pressures
B)opportunities
C)rationalizations
D)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
32
In a __________ scheme,customer receipts are stolen and then subsequent payments by other customers are misapplied to cover the theft of the original receipts.
A)kiting
B)laundering
C)bogus expense
D)lapping
A)kiting
B)laundering
C)bogus expense
D)lapping
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
33
Characteristics connected with fraud include pressures,opportunities,and rationalizations.Of these characteristics,which one relates to excuses that perpetrators have allowing them to justify their illegal behavior?
A)pressures
B)opportunities
C)rationalizations
D)none of the above
A)pressures
B)opportunities
C)rationalizations
D)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
34
Why is computer fraud often more difficult to detect than other types of fraud?
A)Rarely is cash stolen in computer fraud.
B)The fraud may leave little or no evidence it ever happened.
C)Computers provide more opportunities for fraud.
D)Computer fraud perpetrators are just cleverer than other types of criminals.
A)Rarely is cash stolen in computer fraud.
B)The fraud may leave little or no evidence it ever happened.
C)Computers provide more opportunities for fraud.
D)Computer fraud perpetrators are just cleverer than other types of criminals.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
35
One computer fraud technique is known as data diddling.What is it?
A)gaining unauthorized access to and use of computer systems,usually by means of a personal computer and a telecommunications network
B)unauthorized copying of company data such as computer files
C)unauthorized access to a system by the perpetrator pretending to be an authorized user
D)changing data before,during,or after it is entered into the system in order to delete,alter,or add key system data
A)gaining unauthorized access to and use of computer systems,usually by means of a personal computer and a telecommunications network
B)unauthorized copying of company data such as computer files
C)unauthorized access to a system by the perpetrator pretending to be an authorized user
D)changing data before,during,or after it is entered into the system in order to delete,alter,or add key system data
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
36
Computer fraud has been categorized into several different classifications.The classification of computer fraud where the perpetrator causes a company to pay for ordered goods,or to pay for goods never ordered is called
A)disbursement fraud.
B)inventory fraud.
C)payroll fraud.
D)cash receipts fraud.
A)disbursement fraud.
B)inventory fraud.
C)payroll fraud.
D)cash receipts fraud.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
37
The simplest and most common way to commit a computer fraud is to
A)alter computer input.
B)alter computer output.
C)modify the processing.
D)corrupt the data base.
A)alter computer input.
B)alter computer output.
C)modify the processing.
D)corrupt the data base.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
38
Which situation below makes it easy for someone to commit a fraud?
A)the organization placing excessive trust in key employees
B)inadequate staffing within the organization
C)company policies within the organization are unclear
D)All of the above situations make it easy for someone to commit a fraud.
A)the organization placing excessive trust in key employees
B)inadequate staffing within the organization
C)company policies within the organization are unclear
D)All of the above situations make it easy for someone to commit a fraud.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
39
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as
A)lapping.
B)misappropriation of assets.
C)kiting.
D)concealment.
A)lapping.
B)misappropriation of assets.
C)kiting.
D)concealment.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
40
The unauthorized copying of company data is known as
A)Data leakage
B)Eavesdropping
C)Masquerading
D)Phishing
A)Data leakage
B)Eavesdropping
C)Masquerading
D)Phishing
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
41
A __________ is similar to a __________,except that it is a program rather than a code segment hidden in a host program.
A)worm; virus
B)Trojan horse; worm
C)worm; Trojan horse
D)virus; worm
A)worm; virus
B)Trojan horse; worm
C)worm; Trojan horse
D)virus; worm
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
42
Illegally obtaining and using confidential information about a person for economic gain
A)Eavesdropping
B)Identity theft
C)Packet sniffing
D)Piggybacking
A)Eavesdropping
B)Identity theft
C)Packet sniffing
D)Piggybacking
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
43
When a computer criminal gains access to a system by searching records or the trash of the target company,this is referred to as
A)data diddling.
B)dumpster diving.
C)eavesdropping.
D)piggybacking.
A)data diddling.
B)dumpster diving.
C)eavesdropping.
D)piggybacking.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
44
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
A)superzapping.
B)data leakage.
C)hacking.
D)piggybacking.
A)superzapping.
B)data leakage.
C)hacking.
D)piggybacking.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
45
Computer fraud perpetrators have developed many methods to commit their acts.One way is to modify programs during systems development allowing access into the system that bypasses normal system controls.This is known as
A)a Trojan horse.
B)a trap door.
C)the salami technique.
D)superzapping.
A)a Trojan horse.
B)a trap door.
C)the salami technique.
D)superzapping.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
46
Which type of antivirus program is most effective in spotting an infection soon after it starts?
A)a virus protection program
B)a virus identification program
C)a virus detection program
D)none of the above
A)a virus protection program
B)a virus identification program
C)a virus detection program
D)none of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
47
The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called
A)a Trojan horse.
B)a trap door.
C)the salami technique.
D)superzapping.
A)a Trojan horse.
B)a trap door.
C)the salami technique.
D)superzapping.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
48
A fraud technique that slices off tiny amounts from many projects is called the __________ technique.
A)Trojan horse
B)round down
C)salami
D)trap door
A)Trojan horse
B)round down
C)salami
D)trap door
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is not a method of identify theft
A)Scavenging
B)Phishing
C)Shoulder surfing
D)Phreaking
A)Scavenging
B)Phishing
C)Shoulder surfing
D)Phreaking
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
50
How can an organization reduce fraud losses?
A)encrypt data and programs
B)use forensic accountants
C)maintain adequate insurance
D)require vacations and rotate duties
A)encrypt data and programs
B)use forensic accountants
C)maintain adequate insurance
D)require vacations and rotate duties
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
51
Which method of fraud is physical in its nature rather than electronic?
A)cracking
B)hacking
C)eavesdropping
D)scavenging
A)cracking
B)hacking
C)eavesdropping
D)scavenging
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
52
A fraud technique that allows the hacker to bypass normal system controls and enter a secured system is called
A)superzapping.
B)data diddling.
C)using a trap door.
D)piggybacking.
A)superzapping.
B)data diddling.
C)using a trap door.
D)piggybacking.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
53
A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a
A)trap door.
B)data diddle.
C)logic bomb.
D)virus.
A)trap door.
B)data diddle.
C)logic bomb.
D)virus.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
54
Spyware is
A)Software that tells the user if anyone is spying on his computer
B)Software that monitors whether spies are looking at the computer
C)Software that monitors computing habits and sends the data it gathers to someone else
D)None of the above
A)Software that tells the user if anyone is spying on his computer
B)Software that monitors whether spies are looking at the computer
C)Software that monitors computing habits and sends the data it gathers to someone else
D)None of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
55
The unauthorized access to and use of computer systems
A)Hacking
B)Hijacking
C)Phreaking
D)Sniffing
A)Hacking
B)Hijacking
C)Phreaking
D)Sniffing
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
56
A set of unauthorized computer instructions in an otherwise properly functioning program
A)Logic bomb
B)Spyware
C)Trap door
D)Trojan horse
A)Logic bomb
B)Spyware
C)Trap door
D)Trojan horse
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
57
Gaining control of someone else's computer to carry out illicit activities without the user's knowledge
A)Hacking
B)Hijacking
C)Phreaking
D)Sniffing
A)Hacking
B)Hijacking
C)Phreaking
D)Sniffing
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?
A)dumpster diving
B)by use of a Trojan horse
C)using a telescope to peer at paper reports
D)electronic eavesdropping on computer monitors
A)dumpster diving
B)by use of a Trojan horse
C)using a telescope to peer at paper reports
D)electronic eavesdropping on computer monitors
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
59
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called __________.
A)cracking.
B)masquerading.
C)hacking.
D)superzapping.
A)cracking.
B)masquerading.
C)hacking.
D)superzapping.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
60
Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
A)hackers.
B)crackers.
C)phreakers.
D)jerks.
A)hackers.
B)crackers.
C)phreakers.
D)jerks.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
61
Wally Hewitt maintains an online brokerage account.In early March,Wally received an email from the firm that explained that there had been a computer error and that provided a phone number so that Wally could verify his customer information.When he called,a recording asked that he enter the code from the email,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the email.Wally was a victim of
A)Bluesnarfing.
B)splogging.
C)vishing.
D)typosquatting.
A)Bluesnarfing.
B)splogging.
C)vishing.
D)typosquatting.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
62
Christmas shopping online is a popular pastime.Jim Chan decided to give it a try.He linked to amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the Web site's URL was actually amazom.com.Jim was a victim of
A)Bluesnarfing.
B)splogging.
C)vishing.
D)typosquatting.
A)Bluesnarfing.
B)splogging.
C)vishing.
D)typosquatting.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
63
The call to tech support was fairly routine.A first-time computer user had purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly than it had at first.Had he been accessing the Internet? Yes.Had he installed any "free" software? Yes.The problem is likely to be a(an)
A)virus.
B)zero-day attack.
C)denial of service attack.
D)dictionary attack.
A)virus.
B)zero-day attack.
C)denial of service attack.
D)dictionary attack.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
64
Jiao Jan had been the Web master for Folding Squid Technologies for only three months when the Web site was inundated with access attempts.The only solution was to shut down the site and then selectively open it to access from certain Web addresses.FST suffered significant losses during the period.The company had been the victim of a(an)
A)denial-of-service attack.
B)zero-day attack.
C)malware attack.
D)cyber-extortion attack.
A)denial-of-service attack.
B)zero-day attack.
C)malware attack.
D)cyber-extortion attack.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
65
On Monday morning,Janet Pillsner,Chief Information Officer at International Securities Corporation (ISC),got some bad news.A tape used to store system data backups was lost while it was being transported to an offsite storage location.She called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?
A)The shipper has insurance that will reimburse ISC for the cost of the tape.
B)ISC has a copy of the tape onsite,so a new copy for storage offsite can easily be prepared.
C)The tape was encrypted and password protected.
D)ISC has a comprehensive disaster recovery plan.
A)The shipper has insurance that will reimburse ISC for the cost of the tape.
B)ISC has a copy of the tape onsite,so a new copy for storage offsite can easily be prepared.
C)The tape was encrypted and password protected.
D)ISC has a comprehensive disaster recovery plan.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
66
Chiller451 was chatting online with 3L3tCowboy."I can't believe how lame some people are! :)I can get into any system by checking out the company web site to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." Chiller451 is a __________ and the method he is describing is ___________.
A)phreaker; dumpster diving
B)hacker; social engineering
C)phreaker; the salami technique
D)hacker; password cracking
A)phreaker; dumpster diving
B)hacker; social engineering
C)phreaker; the salami technique
D)hacker; password cracking
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
67
Computers that are part of a botnet and are controlled by a bot herder are referred to as
A)posers.
B)zombies.
C)botsquats.
D)evil twins.
A)posers.
B)zombies.
C)botsquats.
D)evil twins.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
68
Wally Hewitt is an accountant with a large accounting firm.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Wally received an email from the firm that explained that there had been an error updating his password and that provided a link to a Web site with instructions for re-entering his password.Something about the email made Wally suspicious,so he called the firm's information technology department and found that the email was fictitious.The email was an example of
A)social engineering.
B)phishing.
C)piggybacking.
D)spamming.
A)social engineering.
B)phishing.
C)piggybacking.
D)spamming.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
69
Telefarm Industries is a telemarketing firm that operates in the Midwest.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used an unsecured computer to access the firm's database and copy a list of customers from the past three years that included credit card information.Telefarm was a victim of
A)Bluesnarfing.
B)splogging.
C)vishing.
D)typosquatting.
A)Bluesnarfing.
B)splogging.
C)vishing.
D)typosquatting.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
70
In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a
A)virus.
B)worm.
C)rootkit.
D)squirrel.
A)virus.
B)worm.
C)rootkit.
D)squirrel.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
71
Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a
A)Trojan horse.
B)key logger..
C)spoof.
D)back door.
A)Trojan horse.
B)key logger..
C)spoof.
D)back door.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
72
After graduating from college with a communications degree,Sylvia Placer experienced some difficulty in finding full time employment.She free-lanced during the summer as a writer and then started a blog in the fall.Shortly thereafter she was contacted by Clickadoo Online Services,who offered to pay her to promote their clients by mentioning them in her blog and linking to their Web sites.She set up several more blogs for this purpose and is now generating a reasonable level of income.She is engaged in
A)Bluesnarfing.
B)splogging.
C)vishing.
D)typosquatting.
A)Bluesnarfing.
B)splogging.
C)vishing.
D)typosquatting.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
73
Jiao Jan had been the Web master for Folding Squid Technologies for only three months when he received an anonymous email that threatened to inundate the company Web site with access attempts unless a payment was wired to an account in Eastern Europe.Jiao was concerned that FST would suffer significant losses if the threat was genuine.The author of the email was engaged in
A)a denial-of-service attack.
B)Internet terrorism.
C)hacking.
D)cyber-extortion.
A)a denial-of-service attack.
B)Internet terrorism.
C)hacking.
D)cyber-extortion.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
74
The first known examples of the practice of concealing a message within a message comes from the historian Herodotus,who wrote of a case in which a message was tattooed on the shaved head of a slave.When the slave's hair grew back,he traveled to the recipient and delivered the message by having his head shaved again.Modern applications involve concealing data within computer files.This practice is referred to as
A)latenography.
B)obfuscography.
C)cryptography.
D)steganography.
A)latenography.
B)obfuscography.
C)cryptography.
D)steganography.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
75
A simple method for catching or preventing many types of employee fraud is to
A)monitor all employee behavior using video cameras.
B)require all employees to take annual vacations.
C)explain to employees that fraud is illegal and that it will be severely punished.
D)monitor employee bank accounts and net worth.
A)monitor all employee behavior using video cameras.
B)require all employees to take annual vacations.
C)explain to employees that fraud is illegal and that it will be severely punished.
D)monitor employee bank accounts and net worth.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
76
Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with
A)typosquatting.
B)carding.
C)pharming.
D)phishing.
A)typosquatting.
B)carding.
C)pharming.
D)phishing.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
77
In the 1960's,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as
A)phreakers.
B)hackers.
C)hijackers.
D)superzappers.
A)phreakers.
B)hackers.
C)hijackers.
D)superzappers.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
78
During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of
A)kiting.
B)data diddling.
C)data leakage.
D)phreaking.
A)kiting.
B)data diddling.
C)data leakage.
D)phreaking.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
79
It was late on a Friday afternoon when Troy Willicott got a call at the help desk for Taggitt Finances.A man with an edge of panic clearly discernible in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as Chet Frazier from the Accounting Department.He told Troy that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Troy know that Taggitt's new password policy,that required that passwords must be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems.Consequently,Troy provided the password,listened as it was read back to him,and was profusely thanked before ending the call.The caller was not Chet Frazier,and Troy Willicott was a victim of
A)phreaking.
B)war dialing.
C)identity theft.
D)social engineering.
A)phreaking.
B)war dialing.
C)identity theft.
D)social engineering.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
80
I work in the information technology department of a company I'll call CMV.On Wednesday morning,I arrived at work,scanned in my identity card and punched in my code,when this guy in a delivery uniform came up behind me carrying a bunch of boxes.I opened the door for him,he nodded and grunted and went on in.I didn't think anything of it until later.Then I wondered if he might have been
A)typosquatting.
B)piggybacking.
C)posing.
D)spoofing.
A)typosquatting.
B)piggybacking.
C)posing.
D)spoofing.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck