Question: test 1 : please choose the answer abcd from the following questions A computer crime that involves attacking phone lines is: a. data diddling b.

test 1 : please choose the answer abcd from the following questions 

A computer crime that involves attacking phone lines is:

a. data diddling

b. phreaking

c. phishing

d. pharming

Hackers use all of the techniques except:

a. war dialing

b. war driving

c.. war chalking

d. war walking

Social engineering facilitates what type of computer fraud?

a. Click fraud

b. Identity theft

c. Spoofing

d. Dictionary attacks

The computer crime of piggy backing

a. involves the clandestine use of another user's WIFI

b. usually results from spamming

c. requires the permission of another user to gain access.

d. None of the above

A network of computers used in a denial-of-service (DoS) attack is called a (an):

a. Worm

b. Botnet

c. Rootkit

d. Splog

Time bombs are most likely planted in an information system by:

a. advertisers

b. spammers

c. disgruntled computer programmers

d. customers who have read-only access

Spyware infections came from:

a. worms/viruses

b. drive-by downloads

c. file-sharing programs

d. All of the above

Which of the following is not a characteristic of computer viruses?

a. They can lie dormant for a time without doing damage

b. They can mutate which increases their ability to do damage

c. They can hinder system performance

d. They are easy to detect and destroy

Which of the following is known as a zero-day attack?

a. An attack between the time a new software vulnerability is discovered and the time a patch for fixing the problem is released

b. An attack on the first day a software program is released

c. An attack on New Year's Day since it is a holiday and most people are not at work

d. None of the above

Which of the following is a method used to embezzle money a small amount at a time from many different accounts?

a. Data diddling

b. Pretexting

c. Spoofing

d. Salami technique

Which of the following is NOT a method that is used for identity theft?

a. Dumpster diving

b. Phishing

c. Shoulder surfing

d. Spamming

A computer fraud and abuse technique that steals information, trade secrets, and intellectual property

a. Cyber-extortion

b. Data diddling

c. Economic espionage

d. Skimming.

choose the answer TRUE/FALSE from the following questions 

Internet pump-and-dump inflates advertising bills by manipulating click numbers on websites.

a. True

b. False

Pretexting is a technique employed in Social Engineering schemes.

a. True

b. False

A rootkit captures data from packets that travel across networks.

a. True

b. False

Bluesnarfing is the act of stealing contact lists, images, and other data using Bluetooth.

a. True

b. False

"Hacking" is an external attack on an accounting information system.

a. True

b.False

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!