Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

test 1 : please choose the answer abcd from the following questions A computer crime that involves attacking phone lines is: a. data diddling b.

test 1 : please choose the answer abcd from the following questions 

A computer crime that involves attacking phone lines is:

a. data diddling

b. phreaking

c. phishing

d. pharming

Hackers use all of the techniques except:

a. war dialing

b. war driving

c.. war chalking

d. war walking

Social engineering facilitates what type of computer fraud?

a. Click fraud

b. Identity theft

c. Spoofing

d. Dictionary attacks

The computer crime of piggy backing

a. involves the clandestine use of another user's WIFI

b. usually results from spamming

c. requires the permission of another user to gain access.

d. None of the above

A network of computers used in a denial-of-service (DoS) attack is called a (an):

a. Worm

b. Botnet

c. Rootkit

d. Splog

Time bombs are most likely planted in an information system by:

a. advertisers

b. spammers

c. disgruntled computer programmers

d. customers who have read-only access

Spyware infections came from:

a. worms/viruses

b. drive-by downloads

c. file-sharing programs

d. All of the above

Which of the following is not a characteristic of computer viruses?

a. They can lie dormant for a time without doing damage

b. They can mutate which increases their ability to do damage

c. They can hinder system performance

d. They are easy to detect and destroy

Which of the following is known as a zero-day attack?

a. An attack between the time a new software vulnerability is discovered and the time a patch for fixing the problem is released

b. An attack on the first day a software program is released

c. An attack on New Year's Day since it is a holiday and most people are not at work

d. None of the above

Which of the following is a method used to embezzle money a small amount at a time from many different accounts?

a. Data diddling

b. Pretexting

c. Spoofing

d. Salami technique

Which of the following is NOT a method that is used for identity theft?

a. Dumpster diving

b. Phishing

c. Shoulder surfing

d. Spamming

A computer fraud and abuse technique that steals information, trade secrets, and intellectual property

a. Cyber-extortion

b. Data diddling

c. Economic espionage

d. Skimming.

choose the answer TRUE/FALSE from the following questions 

Internet pump-and-dump inflates advertising bills by manipulating click numbers on websites.

a. True

b. False

Pretexting is a technique employed in Social Engineering schemes.

a. True

b. False

A rootkit captures data from packets that travel across networks.

a. True

b. False

Bluesnarfing is the act of stealing contact lists, images, and other data using Bluetooth.

a. True

b. False

"Hacking" is an external attack on an accounting information system.

a. True

b.False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Financial Accounting

Authors: Robert Libby, Patricia A Libby

7th Edition

0078111021, 9780078111020

More Books

Students also viewed these Accounting questions

Question

5. Give examples of binary thinking.

Answered: 1 week ago