Multiple Choice
According to Carter's taxonomy of computer crime, which of the following best describes the computer as a target?
A) Using the computer to further a criminal end.
B) Focusing on the system or its data.
C) Not required, but related to the criminal act.
D) New versions of traditional crimes.
Correct Answer:

Verified
Correct Answer:
Verified
Q48: As a business risk, extortion can be
Q49: According to the COBIT accountability framework, the
Q50: According to Carter's taxonomy of computer crime,
Q51: The COBIT framework can be used to
Q52: Identify the type of computer criminal described
Q53: Which type of computer criminal is least
Q55: Administrative security controls can be used to
Q56: A customer's bank account should be credited
Q57: Which type of internal control is most
Q58: Computer crime taxonomy, computer criminals and internal