Question
test 1 : please choose the answer abcd from the following questions A computer crime that involves attacking phone lines is: a. data diddling b.
test 1 : please choose the answer abcd from the following questions
A computer crime that involves attacking phone lines is:
a. data diddling
b. phreaking
c. phishing
d. pharming
Hackers use all of the techniques except:
a. war dialing
b. war driving
c.. war chalking
d. war walking
Social engineering facilitates what type of computer fraud?
a. Click fraud
b. Identity theft
c. Spoofing
d. Dictionary attacks
The computer crime of piggy backing
a. involves the clandestine use of another user's WIFI
b. usually results from spamming
c. requires the permission of another user to gain access.
d. None of the above
A network of computers used in a denial-of-service (DoS) attack is called a (an):
a. Worm
b. Botnet
c. Rootkit
d. Splog
Time bombs are most likely planted in an information system by:
a. advertisers
b. spammers
c. disgruntled computer programmers
d. customers who have read-only access
Spyware infections came from:
a. worms/viruses
b. drive-by downloads
c. file-sharing programs
d. All of the above
Which of the following is not a characteristic of computer viruses?
a. They can lie dormant for a time without doing damage
b. They can mutate which increases their ability to do damage
c. They can hinder system performance
d. They are easy to detect and destroy
Which of the following is known as a zero-day attack?
a. An attack between the time a new software vulnerability is discovered and the time a patch for fixing the problem is released
b. An attack on the first day a software program is released
c. An attack on New Year's Day since it is a holiday and most people are not at work
d. None of the above
Which of the following is a method used to embezzle money a small amount at a time from many different accounts?
a. Data diddling
b. Pretexting
c. Spoofing
d. Salami technique
Which of the following is NOT a method that is used for identity theft?
a. Dumpster diving
b. Phishing
c. Shoulder surfing
d. Spamming
A computer fraud and abuse technique that steals information, trade secrets, and intellectual property
a. Cyber-extortion
b. Data diddling
c. Economic espionage
d. Skimming.
choose the answer TRUE/FALSE from the following questions
Internet pump-and-dump inflates advertising bills by manipulating click numbers on websites.
a. True
b. False
Pretexting is a technique employed in Social Engineering schemes.
a. True
b. False
A rootkit captures data from packets that travel across networks.
a. True
b. False
Bluesnarfing is the act of stealing contact lists, images, and other data using Bluetooth.
a. True
b. False
"Hacking" is an external attack on an accounting information system.
a. True
b.False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started