Monday 6 February 2017

ACC 564 Quiz 2 – Strayer New

ACC 564 Quiz 2 – Strayer New

ACC 564 Week 5 Quiz 2 Chapter 6 Through 9

Click On The Link Below To Purchase
Instant Download

http://www.budapp.net/ACC-564-Quiz-2-Strayer-New-ACC564Q2.htm

Chapter 6   Computer Fraud and Abuse Techniques

1) Wally Hewitt maintains an online brokerage account. In early March, Wally received an email from the firm that explained that there had been a computer error and that provided a phone number so that Wally could verify his customer information. When he called, a recording asked that he enter the code from the email, his account number, and his social security number. After he did so, he was told that he would be connected with a customer service representative, but the connection was terminated. He contacted the brokerage company and was informed that they had not sent the email. Wally was a victim of
A) Bluesnarfing.
B) splogging.
C) vishing.
D) typosquatting.
Answer:
Page Ref: 157
Objective:  Learning Objective 2
Difficulty :  Easy
AACSB:  Analytic

2) When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as
A) data diddling.
B) dumpster diving.
C) eavesdropping.
D) piggybacking.
Answer:
Page Ref: 159
Objective:  Learning Objective 2
Difficulty :  Easy
AACSB:  Analytic

3) Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
A) scavenging.
B) skimming.
C) Internet auction fraud.
D) cyber extortion.
Answer:
Page Ref: 159
Objective:  Learning Objective 2
Difficulty :  Easy
AACSB:  Analytic

4) A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a
A) trap door.
B) data diddle.
C) logic bomb.
D) virus.
Answer:
Page Ref: 161
Objective:  Learning Objective 3
Difficulty :  Easy
AACSB:  Analytic

5) The unauthorized copying of company data is known as
A) data leakage.
B) eavesdropping.
C) masquerading.
D) phishing.
Answer:
Page Ref: 154
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic

6) Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
A) hackers.
B) crackers.
C) phreakers.
D) jerks.
Answer:
Page Ref: 154
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic
7) What is a denial of service attack?
A) A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider's e-mail server.
B) A denial of service attack occurs when an e-mail message is sent through a re-mailer, who removes the message headers making the message anonymous, then resends the message to selected addresses.
C) A denial of service attack occurs when a cracker enters a system through an idle modem, captures the PC attached to the modem, and then gains access to the network to which it is connected.
D) A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more Usenet newsgroups LISTSERV lists.
Answer:
Page Ref: 150
Objective:  Learning Objective 1
Difficulty :  Moderate
AACSB:  Analytic

8) Gaining control of someone else's computer to carry out illicit activities without the owner's knowledge is known as
A) hacking.
B) hijacking.
C) phreaking.
D) sniffings.
Answer:
Page Ref: 150
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic

9) Illegally obtaining and using confidential information about a person for economic gain is known as
A) eavesdropping.
B) identity theft.
C) packet sniffing.
D) piggybacking.
Answer:
Page Ref: 156
Objective:  Learning Objective 2
Difficulty :  Easy
AACSB:  Analytic
10) Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
A) superzapping.
B) data leakage.
C) hacking.
D) piggybacking.
Answer:
Page Ref: 153
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic

11) Which of the following is not a method of identify theft?
A) Scavenging
B) Phishing
C) Shoulder surfing
D) Phreaking
Answer:
Page Ref: 154
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic


12) Which method of fraud is physical in its nature rather than electronic?
A) cracking
B) hacking
C) eavesdropping
D) scavenging
Answer:
Page Ref: 159
Objective:  Learning Objective 2
Difficulty :  Easy
AACSB:  Analytic

13) Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?
A) dumpster diving
B) by use of a Trojan horse
C) using a telescope to peer at paper reports
D) electronic eavesdropping on computer monitors
Answer:
Page Ref: 159
Objective:  Learning Objective 2
Difficulty :  Easy
AACSB:  Analytic
14) The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
A) cracking.
B) masquerading.
C) hacking.
D) superzapping.
Answer:
Page Ref: 153
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic

15) The unauthorized access to, and use of, computer systems is known as
A) hacking.
B) hijacking.
C) phreaking.
D) sniffing.
Answer:
Page Ref: 149
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic


16) A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
A) Trojan horse
B) round down
C) salami
D) trap door
Answer:
Page Ref: 154
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic
17) Data diddling is
A) gaining unauthorized access to and use of computer systems, usually by means of a personal computer and a telecommunications network.
B) unauthorized copying of company data such as computer files.
C) unauthorized access to a system by the perpetrator pretending to be an authorized user.
D) changing data before, during, or after it is entered into the system in order to delete, alter, or add key system data.
Answer:
Page Ref: 154
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic

18) Spyware is
A) software that tells the user if anyone is spying on his computer.
B) software that monitors whether spies are looking at the computer.
C) software that monitors computing habits and sends the data it gathers to someone else.
D) none of the above
Answer:
Page Ref: 159
Objective:  Learning Objective 3
Difficulty :  Easy
AACSB:  Analytic

19) The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Answer:
Page Ref: 162
Objective:  Learning Objective 3
Difficulty :  Easy
AACSB:  Analytic

20) Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Answer:
Page Ref: 162
Objective:  Learning Objective 3
Difficulty :  Easy
AACSB:  Analytic

21) A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
A) superzapping.
B) data diddling.
C) using a trap door.
D) piggybacking.
Answer:
Page Ref: 162
Objective:  Learning Objective 3
Difficulty :  Easy
AACSB:  Analytic

22) A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
A) logic bomb.
B) spyware.
C) trap door.
D) Trojan horse.
Answer:
Page Ref: 161
Objective:  Learning Objective 3
Difficulty :  Easy
AACSB:  Analytic
23) A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.
A) worm; virus
B) Trojan horse; worm
C) worm; Trojan horse
D) virus; worm
Answer:
Page Ref: 163
Objective:  Learning Objective 3
Difficulty :  Easy
AACSB:  Analytic

24) Wally Hewitt is an accountant with a large accounting firm. The firm has a very strict policy of requiring all users to change their passwords every sixty days. In early March, Wally received an email from the firm that explained that there had been an error updating his password and that provided a link to a Web site with instructions for re-entering his password. Something about the email made Wally suspicious, so he called the firm's information technology department and found that the email was fictitious. The email was an example of
A) social engineering.
B) phishing.
C) piggybacking.
D) spamming.
Answer:
Page Ref: 157
Objective:  Learning Objective 2
Difficulty :  Easy
AACSB:  Analytic

25) Developers of computer systems often include a user name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a
A) Trojan horse.
B) key logger.
C) spoof.
D) back door.
Answer:
Page Ref: 162
Objective:  Learning Objective 3
Difficulty :  Easy
AACSB:  Analytic
26) In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as
A) phreakers.
B) hackers.
C) hijackers.
D) superzappers.
Answer:
Page Ref: 154
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic


27) During a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of
A) kiting.
B) data diddling.
C) data leakage.
D) phreaking.
Answer:
Page Ref: 154
Objective:  Learning Objective 1
Difficulty :  Easy
AACSB:  Analytic

28) It was late on a Friday afternoon when Troy Willicott got a call at the help desk for Taggitt Finances. A man with an edge of panic clearly discernible in his voice was

No comments:

Post a Comment