ACC 564 Quiz 2 – Strayer New
ACC 564 Week 5 Quiz 2 Chapter 6
Through 9
Click On The
Link Below To Purchase
Instant Download
Chapter
6 Computer Fraud and Abuse Techniques
1) Wally Hewitt
maintains an online brokerage account. In early March, Wally received an email
from the firm that explained that there had been a computer error and that
provided a phone number so that Wally could verify his customer information.
When he called, a recording asked that he enter the code from the email, his
account number, and his social security number. After he did so, he was told
that he would be connected with a customer service representative, but the
connection was terminated. He contacted the brokerage company and was informed
that they had not sent the email. Wally was a victim of
A) Bluesnarfing.
B) splogging.
C) vishing.
D)
typosquatting.
Answer:
Page
Ref: 157
Objective: Learning Objective 2
Difficulty
: Easy
AACSB: Analytic
2)
When a computer criminal gains access to a system by searching records or the
trash of the target company, this is referred to as
A)
data diddling.
B)
dumpster diving.
C)
eavesdropping.
D)
piggybacking.
Answer:
Page
Ref: 159
Objective: Learning Objective 2
Difficulty
: Easy
AACSB: Analytic
3)
Jerry Schneider was able to amass operating manuals and enough technical data
to steal $1 million of electronic equipment by
A)
scavenging.
B)
skimming.
C)
Internet auction fraud.
D)
cyber extortion.
Answer:
Page
Ref: 159
Objective: Learning Objective 2
Difficulty
: Easy
AACSB:
Analytic
4)
A part of a program that remains idle until some date or event occurs and then
is activated to cause havoc in the system is a
A)
trap door.
B)
data diddle.
C)
logic bomb.
D)
virus.
Answer:
Page
Ref: 161
Objective: Learning Objective 3
Difficulty
: Easy
AACSB: Analytic
5)
The unauthorized copying of company data is known as
A)
data leakage.
B)
eavesdropping.
C)
masquerading.
D)
phishing.
Answer:
Page
Ref: 154
Objective: Learning Objective 1
Difficulty
: Easy
AACSB: Analytic
6)
Computer fraud perpetrators who use telephone lines to commit fraud and other
illegal acts are typically called
A)
hackers.
B)
crackers.
C)
phreakers.
D)
jerks.
Answer:
Page
Ref: 154
Objective: Learning Objective 1
Difficulty
: Easy
AACSB:
Analytic
7)
What is a denial of service attack?
A)
A denial of service attack occurs when the perpetrator sends hundreds of
messages from randomly generated false addresses, overloading an Internet
service provider's e-mail server.
B)
A denial of service attack occurs when an e-mail message is sent through a
re-mailer, who removes the message headers making the message anonymous, then
resends the message to selected addresses.
C)
A denial of service attack occurs when a cracker enters a system through an
idle modem, captures the PC attached to the modem, and then gains access to the
network to which it is connected.
D)
A denial of service attack occurs when the perpetrator e-mails the same message
to everyone on one or more Usenet newsgroups LISTSERV lists.
Answer:
Page
Ref: 150
Objective: Learning Objective 1
Difficulty
: Moderate
AACSB: Analytic
8)
Gaining control of someone else's computer to carry out illicit activities
without the owner's knowledge is known as
A)
hacking.
B)
hijacking.
C)
phreaking.
D)
sniffings.
Answer:
Page
Ref: 150
Objective: Learning Objective 1
Difficulty
: Easy
AACSB: Analytic
9)
Illegally obtaining and using confidential information about a person for
economic gain is known as
A)
eavesdropping.
B)
identity theft.
C)
packet sniffing.
D)
piggybacking.
Answer:
Page
Ref: 156
Objective: Learning Objective 2
Difficulty
: Easy
AACSB:
Analytic
10)
Tapping into a communications line and then entering the system by accompanying
a legitimate user without their knowledge is called
A)
superzapping.
B)
data leakage.
C)
hacking.
D)
piggybacking.
Answer:
Page
Ref: 153
Objective: Learning Objective 1
Difficulty
: Easy
AACSB: Analytic
11)
Which of the following is not a method of identify theft?
A)
Scavenging
B)
Phishing
C)
Shoulder surfing
D)
Phreaking
Answer:
Page
Ref: 154
Objective: Learning Objective 1
Difficulty
: Easy
AACSB: Analytic
12)
Which method of fraud is physical in its nature rather than electronic?
A)
cracking
B)
hacking
C)
eavesdropping
D)
scavenging
Answer:
Page
Ref: 159
Objective: Learning Objective 2
Difficulty
: Easy
AACSB: Analytic
13)
Which of the following is the easiest method for a computer criminal to steal
output without ever being on the premises?
A)
dumpster diving
B)
by use of a Trojan horse
C)
using a telescope to peer at paper reports
D)
electronic eavesdropping on computer monitors
Answer:
Page
Ref: 159
Objective: Learning Objective 2
Difficulty
: Easy
AACSB:
Analytic
14)
The deceptive method by which a perpetrator gains access to the system by
pretending to be an authorized user is called
A)
cracking.
B)
masquerading.
C)
hacking.
D)
superzapping.
Answer:
Page
Ref: 153
Objective: Learning Objective 1
Difficulty
: Easy
AACSB: Analytic
15)
The unauthorized access to, and use of, computer systems is known as
A)
hacking.
B)
hijacking.
C)
phreaking.
D)
sniffing.
Answer:
Page
Ref: 149
Objective: Learning Objective 1
Difficulty
: Easy
AACSB: Analytic
16)
A fraud technique that slices off tiny amounts from many projects is called the
________ technique.
A)
Trojan horse
B)
round down
C)
salami
D)
trap door
Answer:
Page
Ref: 154
Objective: Learning Objective 1
Difficulty
: Easy
AACSB:
Analytic
17)
Data diddling is
A)
gaining unauthorized access to and use of computer systems, usually by means of
a personal computer and a telecommunications network.
B)
unauthorized copying of company data such as computer files.
C)
unauthorized access to a system by the perpetrator pretending to be an
authorized user.
D)
changing data before, during, or after it is entered into the system in order
to delete, alter, or add key system data.
Comments
Post a Comment