Multiple Choice
Consider the following examples of computer crime as you answer the next question: i. Social Security numbers are stolen from a company's database.ii. A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more
Iii) A supervisor receives threats from a worker via e-mail; the worker demands promotion as a condition of not exposing the supervisor's illegal acts
Iv) An unhappy customer launches a denial-of-service attack
Which of the following pairs an item from the list with an appropriate description of a business risk?
A) Extortion, i
B) Service interruption, ii
C) Extortion, iii
D) None of the above
Correct Answer:

Verified
Correct Answer:
Verified
Q1: The CoBIT framework can be used to
Q3: In each statement that follows, circle the
Q6: Consider the following examples of computer crime
Q7: Information technology controls can be classified as
Q9: Organized crime and hackers are most likely
Q10: _ are _ driven by financial gain.<br>A)Hackers,
Q11: Consider the following examples of computer crime
Q26: All of the following are elements of
Q35: A bank's information system was hacked in
Q52: At HCK Corporation, only employees in the