Sie sind auf Seite 1von 4

Accounting Information Systems, 12e (Romney/Steinbart)

Chapter 6 Computer Fraud and Abuse Techniques


1) Wally Hewitt maintains an online brokerage account. In early March, Wally received
an email from the firm that explained that there had been a computer error and that
provided a phone number so that Wally could verify his customer information. When he
called, a recording asked that he enter the code from the email, his account number, and
his social security number. After he did so, he was told that he would be connected with a
customer service representative, but the connection was terminated. He contacted the
brokerage company and was informed that they had not sent the email. Wally was a
victim of
A) Bluesnarfing.
B) splogging.
C) vishing.
D) typosquatting.
Answer: C
Page Ref: 157
Objective: Learning Objective 2
Difficulty : Easy
AACSB: Analytic
2) When a computer criminal gains access to a system by searching records or the trash
of the target company, this is referred to as
A) data diddling.
B) dumpster diving.
C) eavesdropping.
D) piggybacking.
Answer: B
Page Ref: 159
Objective: Learning Objective 2
Difficulty : Easy
AACSB: Analytic
3) Jerry Schneider was able to amass operating manuals and enough technical data to
steal $1 million of electronic equipment by
A) scavenging.
B) skimming.
C) Internet auction fraud.
D) cyber extortion.
Answer: A
Page Ref: 159
Objective: Learning Objective 2
Difficulty : Easy
AACSB: Analytic

4) A part of a program that remains idle until some date or event occurs and then is
activated to cause havoc in the system is a
A) trap door.
B) data diddle.
C) logic bomb.
D) virus.
Answer: C
Page Ref: 161
Objective: Learning Objective 3
Difficulty : Easy
AACSB: Analytic
5) The unauthorized copying of company data is known as
A) data leakage.
B) eavesdropping.
C) masquerading.
D) phishing.
Answer: A
Page Ref: 154
Objective: Learning Objective 1
Difficulty : Easy
AACSB: Analytic
6) Computer fraud perpetrators who use telephone lines to commit fraud and other illegal
acts are typically called
A) hackers.
B) crackers.
C) phreakers.
D) jerks.
Answer: C
Page Ref: 154
Objective: Learning Objective 1
Difficulty : Easy
AACSB: Analytic
7) What is a denial of service attack?
A) A denial of service attack occurs when the perpetrator sends hundreds of messages
from randomly generated false addresses, overloading an Internet service provider's email server.
B) A denial of service attack occurs when an e-mail message is sent through a re-mailer,
who removes the message headers making the message anonymous, then resends the
message to selected addresses.
C) A denial of service attack occurs when a cracker enters a system through an idle
modem, captures the PC attached to the modem, and then gains access to the network to
which it is connected.
D) A denial of service attack occurs when the perpetrator e-mails the same message to
everyone on one or more Usenet newsgroups LISTSERV lists.

Answer: A
Page Ref: 150
Objective: Learning Objective 1
Difficulty : Moderate
AACSB: Analytic
8) Gaining control of someone else's computer to carry out illicit activities without the
owner's knowledge is known as
A) hacking.
B) hijacking.
C) phreaking.
D) sniffings.
Answer: B
Page Ref: 150
Objective: Learning Objective 1
Difficulty : Easy
AACSB: Analytic
9) Illegally obtaining and using confidential information about a person for economic
gain is known as
A) eavesdropping.
B) identity theft.
C) packet sniffing.
D) piggybacking.
Answer: B
Page Ref: 156
Objective: Learning Objective 2
Difficulty : Easy
AACSB: Analytic
10) Tapping into a communications line and then entering the system by accompanying a
legitimate user without their knowledge is called
A) superzapping.
B) data leakage.
C) hacking.
D) piggybacking.
Answer: D
Page Ref: 153
Objective: Learning Objective 1
Difficulty : Easy
AACSB: Analytic
11) Which of the following is not a method of identify theft?
A) Scavenging
B) Phishing
C) Shoulder surfing
D) Phreaking

Answer: D
Page Ref: 154
Objective: Learning Objective 1
Difficulty : Easy
AACSB: Analytic

Das könnte Ihnen auch gefallen