Filters
Question type

Study Flashcards

The unauthorized use of special program that bypass regular system controls to perform illegal acts is called


A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.

Correct Answer

verifed

verified

Wassim Masood works in the information technology department of TMV.On Monday morning,he arrived at work,scanned his identity card,and entered his code.At that moment,a lady in a delivery uniform came up behind Wassim with a bunch of boxes.Although Wassim held the door for the delivery lade,he later wondered if the delivery lady was engaged in


A) pretexting.
B) piggybacking.
C) posing.
D) spoofing.

Correct Answer

verifed

verified

Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as


A) hacking.
B) sniffing.
C) phreaking.
D) hijacking.

Correct Answer

verifed

verified

Rina Misra,a first-time computer user,purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly.Since purchasing the computer,she had been accessing the Internet and had installed a variety of free software.The problem is mostly likely to be


A) a zero-day attack.
B) a virus.
C) a spoof.
D) Bluesnarfing.

Correct Answer

verifed

verified

Which of the following websites likely poses the most fraud and security risk?


A) your school's website
B) a file sharing website
C) a social media website
D) your personal website

Correct Answer

verifed

verified

In November of 2005 it was discovered that many of the new CDs distributed by Sony BMG installed software when they were played on a computer.The software was intended to protect the CDs from copying.Unfortunately,it also made the computer vulnerable to attack by malware run over the Internet.The scandal and resulting backlash was very costly.The software installed by the CDs is a


A) virus.
B) worm.
C) rootkit.
D) squirrel.

Correct Answer

verifed

verified

Jim Chan decided to Christmas shop online.He linked to Amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the website's URL was actually Amazom.com.Jim was a victim of


A) Bluesnarfing.
B) splogging.
C) vishing.
D) typosquatting.

Correct Answer

verifed

verified

Pretexting is best described as a social engineering technique that uses


A) text messages to gain sensitive information.
B) an invented scenario to gain sensitive information.
C) threat of physical force to gain sensitive information.
D) impersonation of somebody you know to gain sensitive information.

Correct Answer

verifed

verified

Computer fraud perpetrators that modify programs during systems development,allowing access into the system that bypasses normal system controls are using


A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.

Correct Answer

verifed

verified

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called


A) superzapping.
B) data diddling.
C) using a trap door.
D) piggybacking.

Correct Answer

verifed

verified

Terrorists often use ________ because it is an effective way to transmit information and receive orders.


A) steganography
B) packet sniffers
C) trap doors
D) time bombs

Correct Answer

verifed

verified

On the weekends,Thuy Nguyen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Thuy is most likely engaging in


A) snarfing.
B) Wi-pilfering.
C) war driving.
D) data slurping.

Correct Answer

verifed

verified

It was late on a Friday afternoon when Makari Polzin got a call at the help desk for Taggart Transcontinental.A man with an edge of panic in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as John Galt from the Accounting Department.He told Makari that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Makari knew that Taggart's new password policy required that passwords be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems.Consequently,Makari provided the password to John.The caller was not John Galt,and Makari was a victim of


A) phreaking.
B) war dialing.
C) identity theft.
D) social engineering.

Correct Answer

verifed

verified

Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with


A) typosquatting.
B) carding.
C) pharming.
D) phishing.

Correct Answer

verifed

verified

Identify theft has always been a federal crime.

Correct Answer

verifed

verified

Spyware is


A) software that tells the user if anyone is spying on his computer.
B) software that monitors whether spies are looking at the computer.
C) software that monitors computing habits and sends the data it gathers to someone else.
D) none of the above

Correct Answer

verifed

verified

Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called


A) superzapping.
B) data leakage.
C) hacking.
D) piggybacking.

Correct Answer

verifed

verified

What is social engineering?

Correct Answer

verifed

verified

Social engineering refers to techniques ...

View Answer

Offering a free website,then charging the phone bills of the individuals who signed up for the free website is known as


A) snarfing.
B) web cramming.
C) podpounding.
D) e-scraping.

Correct Answer

verifed

verified

Ransomware often comes in the form of


A) fake antivirus software.
B) an e-mail that threatens to kidnap the reader unless a ransom is paid.
C) free performance-maximizing software.
D) free apps.

Correct Answer

verifed

verified

Showing 21 - 40 of 60

Related Exams

Show Answer