Question: QUESTION 1 Match each fraud technique with the appropriate description. Phishing A. Using special software to bypass system controls and perform illegal Zero-day Attack acts.

QUESTION 1 Match each fraud technique with the
QUESTION 1 Match each fraud technique with the appropriate description. Phishing A. Using special software to bypass system controls and perform illegal Zero-day Attack acts. B: Communications that request recipients to disclose confidential Trap Door information by responding to an e-mail or visiting a Web site. Key Logger C. Redirecting traffic to a spoofed Web site to obtain confidential V Scareware information. War Dialing D. Malicious software of no benefit that is sold using scare tactics. Superzapping E. A back door into a system that bypasses normal system controls. F. Inserting a sleeve into an ATM so that it will not eject the victim's card, Pharming pretending to help the victim as a means to discover his or her PIN, Vishing and then using the PIN to drain their account. Lebanese Looping G. Voice phishing, in which e-mail recipients are asked to call a phone number that asks them to divulge confidential data. H. Using spyware to record a user's keystrokes. Attack between the time a software vulnerability is discovered and a patch to fix the problem is released. J. Dialing phone lines to find idle modems to use to enter a system, capture the attached computer, and gain access to its network. with

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!