CHAPTER 6 Computer Fraud and Abuse Techniques Flashcards

1
Q
  1. A set of instructions to increase a programmer’s pay rate by 10% is hidden inside an
    authorized program. It changes and updates the payroll file. What is this computer fraud
    technique called?
    a. virus
    b. worm
    c. trap door
    d. Trojan horse
A

d. Trojan horse (Correct. Placing unauthorized computer instructions, such as fraudulently
increasing an employee’s pay, in an authorized and properly functioning program
is an example of a Trojan horse.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which computer fraud technique involves a set of instructions hidden inside a calendar
    utility that copies itself each time the utility is enabled until memory is filled and the system
    crashes?
    a. logic bomb
    b. trap door
    c. virus
    d. Trojan horse
A

c. virus (Correct. A virus damages a system using a segment of executable code that attaches
itself to software, replicates itself, and spreads to other systems or files.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Interest calculations are truncated at two decimal places, and the excess decimals are put
    into an account the perpetrator controls. What is this fraud called?
    a. typosquatting
    b. URL hijacking
    c. chipping
    d. round-down fraud
A

d. round-down fraud (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A perpetrator attacks phone systems to obtain free phone line access or uses telephone
    lines to transmit viruses and to access, steal, and destroy data. What is this computer fraud
    technique called?
    a. phishing
    b. phreaking
    c. pharming
    d. vishing
A

b. phreaking (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Fraud perpetrators threaten to harm a company if it does not pay a specified amount of
    money. What is this fraud technique called?
    a. cyber-terrorism
    b. blackmailing
    c. cyber-extortion
    d. scareware
A

c. cyber-extortion (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Techniques used to obtain confidential information, often by tricking people, are referred to as what?
    a. pretexting
    b. posing
    c. social engineering
    d. identity theft
A

c. social engineering (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What type of software secretly collects personal information about users and sends it to
    someone else without the user’s permission?
    a. rootkit
    b. torpedo software
    c. spyware
    d. malware
A

c. spyware (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. What is the name of the computer attack which captures data from information items as it
travels over networks?
a. packet sniffers 
b. item sniffers 
c. malware 
d. adware
A

a. packet sniffers [Correct. Programs that capture data from information packets as they
travel over the Internet or company networks.]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which type of computer attack steals contact lists, images and other data using Bluetooth?
    a. Bluebugging
    b. Bluesnarfing
    c. Buffer overflow
    d. Carding
A

b. Bluesnarfing [Correct. Stealing (snarfing) contact lists, images, and other data using
flaws in Bluetooth applications.]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Someone redirects a website’s traffic to a bogus website, usually to gain access to personal
    and confidential information. What is this computer fraud technique called?
    a. vishing
    b. phishing
    c. pharming
    d. phreaking
A

c. pharming (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly