term1 Definition1term2 Definition2term3 Definition3
Please sign in to your Google account to access your documents:
http://www.homeworkfortune.com/ACC-564-Strayer-Week-5-Quiz-2-ACC564-06.htm
ACC 564 (Strayer) Week 5 Quiz 2
1) Wally Hewitt maintains an online brokerage account. In early March, Wally received an email from the firm that explained that there had been a COMPUTER ERROR and that provided a phone number so that Wally could verify his customer information. When he called, a recording asked that he enter the code from the email, his account number, and his social security number. After he did so, he was told that he would be connected with a customer service representative, but the connection was terminated. He contacted the brokerage company and was informed that they had not sent the email. Wally was a victim of
A) Bluesnarfing.
B) splogging.
C) vishing.
D) typosquatting.
2) When a computer criminal gains access to a system by SEARCHING RECORDS or the trash of the target company, this is referred to as
A) data diddling.
B) DUMPSTER diving.
C) eavesdropping.
D) piggybacking.
3) Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
A) scavenging.
B) skimming.
C) INTERNET AUCTION fraud.
D) cyber extortion.
4) A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a
A) trap DOOR.
B) data diddle.
C) logic bomb.
D) virus.
5) The unauthorized copying of company data is known as
A) data leakage.
B) eavesdropping.
C) masquerading.
D) phishing.
www.homeworkfortune.com
6) Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
A) hackers.
B) crackers.
C) phreakers.
D) jerks.
7) What is a denial of service attack?
A) A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an INTERNET SERVICE PROVIDER'S e-mail server.
B) A denial of service attack occurs when an e-mail message is sent through a re-mailer, who removes the message headers making the message anonymous, then resends the message to selected addresses.
C) A denial of service attack occurs when a cracker enters a system through an idle modem, captures the PC attached to the modem, and then gains access to the network to which it is connected.
D) A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more USENET NEWSGROUPS LISTSERV lists.
8) Gaining control of someone else's computer to carry out illicit activities without the owner's knowledge is known as
A) hacking.
B) hijacking.
C) phreaking.
D) sniffings.
9) Illegally obtaining and using confidential information about a person for economic gain is known as
A) eavesdropping.
B) identity theft.
C) packet sniffing.
20) Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
21) A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
A) superzapping.
B) data diddling.
C) using a trap door.
22) A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
A) logic bomb.
B) spyware.
C) trap door.
D) Trojan horse.
23) A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.
A) worm; virus
B) Trojan horse; worm
C) worm; Trojan horse
D) virus; worm
24) Wally Hewitt is an accountant with a large accounting firm. The firm has a very strict policy of requiring all users to change their passwords every sixty days. In early March, Wally received an email from the firm that explained that there had been an error updating his password and that provided a link to a Web site with instructions for re-entering his password. Something about the email made Wally suspicious, so he called the firm's information technology department and found that the email was fictitious. The email was an example of
A) social engineering.
B) phishing.
C) piggybacking.
D) spamming.
25) Developers of computer systems often include a user name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a
A) Trojan horse.
B) key logger.
C) spoof.
D) back door.
26) In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as
A) phreakers.
B) hackers.
C) hijackers.
D) superzappers.
27) During a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of
A) kiting.
C) data leakage.
D) phreaking.
28) It was late on a Friday afternoon when Troy Willicott got a call at the help desk for Taggitt Finances. A man with an edge of panic clearly discernible in his voice was on the phone. "I'm really in a bind and I sure hope that you can help me." He identified himself as Chet Frazier from the Accounting Department. He told Troy that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him. Troy knew that Taggitt's new password policy, that required that passwords must be at least fifteen characters long, must contain letters and numbers, and must be changed every sixty days, had created problems. Consequently, Troy provided the password, listened as it was read back to him, and was profusely thanked before ending the call. The caller was not Chet Frazier, and Troy Willicott was a victim of
A) phreaking.
B) war dialing.
C) identity theft.
D) social engineering.
29) Chiller451 was CHATTING ONLINE with 3L3tCowboy. "I can't believe how lame some people are! :) I can get into any system by checking out the company web site to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password." Chiller451 is a ________ and the fraud he is describing is ________.
A) phreaker; DUMPSTER diving
B) hacker; social engineering
C) phreaker; the salami technique
D) hacker; password cracking
30) After graduating from college with a communications degree, Sylvia Placer experienced some difficulty in finding full-time EMPLOYMENT. She free-lanced during the summer as a writer and then started a blog in the fall. Shortly thereafter she was contacted by Clickadoo Online Services, who offered to pay her to promote their clients by mentioning them in her blog and linking to their Web sites. She set up several more blogs for this purpose and is now generating a reasonable level of income. She is engaged in
More Questions are Included...
Need help typing ? See our FAQ (opens in new window)
Please sign in to create this set. We'll bring you back here when you are done.
Discard Changes Sign in
Please sign in to add to folders.
Sign in
Don't have an account? Sign Up »
You have created 2 folders. Please upgrade to Cram Premium to create hundreds of folders!