Question
Which of the following is not a common tactic used to steal passwords? Posing as a legitimate user and borrowing them from unsuspecting Creating phishing
-
Which of the following is not a common tactic used to steal passwords?
Posing as a legitimate user and borrowing them from unsuspecting
Creating phishing websites that ask users to input their passwords for security purposes
Using simulation programs that try all the words in the standard dictionary as potential passwords.
All the above
10 points
QUESTION 2
-
An important clue that can reveal computer fraud is the presence of anomalies that somehow go unchallenged.
True
False
10 points
QUESTION 3
-
Computer criminals are primarily caught as a result of luck, chance, or accident.
True
False Cybercrime Statistics; Page 303
10 points
QUESTION 4
-
Which of the following is not a component of the fraud triangle:
Integrity
Opportunity
Rationalization
Pressure
10 points
QUESTION 5
-
Forensic accountants have the required technical and legal experience to research to:
Research a given concern
Follow leads
Organize evidence for external review and law enforcement
All the above
10 points
QUESTION 6
-
Control procedures against computer viruses include:
Educating users about viruses
Discouraging computer users to follow the virus prevention and detection techniques
Adopting policies that encourage externally acquired computer programs
Requiring weak passwords
10 points
QUESTION 7
-
Top management is fully aware of the dangers of cybercrime, abuse and fraud.
True
False
10 points
QUESTION 8
-
Thieves steal identities in several ways including:
Dumpster Diving
Taking mail from mailboxes
Making telephone solicitations
All the above
10 points
QUESTION 9
-
Which of the following is a characteristic of an individual who commits cybercrime or abuse.
Noncriminal Background
College Degree
Criminal Background
Extensive technology skills
10 points
QUESTION 10
-
Most cybercrime and abuse succeed because of the ________ of controls.
absence
failure
destruction
out-of-date
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started