Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 16 You have just completed a fraud examination in which you concluded, based on security camera footage, that an outside intruder entered the company
QUESTION 16
- You have just completed a fraud examination in which you concluded, based on security camera footage, that an outside intruder entered the company dressed as a computer repair person. The footage shows the intruder chatting amiably with several individuals in the bookkeeping department, followed by logging onto their computers as they stand watching over his shoulder, using credentials they shared when he showed them his vendor badge (which was counterfeit). This type of attack is executed using:
- Shoulder surfing
- a Trojan horse
- Social engineering
- Spear phishing
6 points
QUESTION 17
- Adequate hacker detection programs contain three primary components: (1) log files should be printed and regularly reviewed by the data security officer, (2) the data security function should have sufficient resources and staff to administer passwords, maintain security software, review system activity reports and follow up on potential security violations, and (3):
- Anti-social engineering training for all users with passwords
- Buffer over-flow backup and redundancy streaming with auto EXE piggybacking
- Use of distributed ledger technology
- Periodic reviews of telecommunications security should be performed by internal or external auditors or other professionals
6 points
QUESTION 18
- ______________ and _______________ are any defalcation, fraud, or financial crime accomplished by tampering with computer programs, data files, operations, equipment, or media, and resulting in losses sustained by the organization whose computer was compromised.
- Computer crime; asset misappropriation schemes
- Financial crimes; blockchain compromises
- Computer-based fraud;financial crimes
- Cybercrime; complex frauds
6 points
QUESTION 19
- The most prevalent method of committing computer fraud is________________________________.
- Network weaving
- Digital device hacking
- Alteration or falsification of input transactions (and/or documents)
- Social engineering
6 points
QUESTION 20
- The U.S. government agency charged with investigating counterfeiting, credit card fraud, and some computer crimes is the:
- Internet Cybercrime Counterinsurgency Center (IC3)
- Financial Crimes Enforcement Network (FINCEN)
- Secret service
- Financial Action Task Force (FATF)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started