Multiple Choice
Consider the following examples of computer crime as you answer the question:
i.Social Security numbers are stolen from a company's database.ii.A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.iii.A supervisor receives threats from a worker via e-mail; the worker demands promotion as a condition of not exposing the supervisor's illegal acts.iv.An unhappy customer launches a denial-of-service attack.Which two items represent the same category of risk from the list discussed in the chapter?
A) I and II
B) I and III
C) II and IV
D) None of these
Correct Answer:

Verified
Correct Answer:
Verified
Q62: A private university maintains sensitive information about
Q63: COBIT comprises _ principles and _ enablers.<br>A)five;
Q64: The chapter discussed the four elements of
Q65: According to ISACA, which COBIT enabler provides
Q66: For each IT control listed below, indicate
Q67: According to COBIT 5, an organization's information
Q69: Fill in the blanks below according to
Q70: The COBIT framework comprises five principles and
Q71: According to COBIT's principles, information technology governance
Q72: According to COBIT's principles, information technology governance