Chapter 3 MCQ Flashcards
According to the chapter, which of these statements is most accurate?
a) Almost all cybercrime is committed for personal gain
b) Very little cybercrime is committed for personal gain
c) Most cybercrime is just as easily described as “embezzlement”
d) We actually know very little about cybercrime
D
According to the chapter, which of these statements is most accurate?
a) Most cybercrime is performed as retaliation against employers
b) Very little cybercrime is committed for personal gain
c) Some cybercrime is performed simply to meet a challenge
d) We catch most computer abusers with good accounting controls
C
Which of these would be an example of “denial-of-service” computer abuse?
a) Computer virus
b) Salami technique
c) Trojan horse computer program
d) Embezzlement using computerized data
e) none of these
E
Which of these terms describes a computer program that remains dormant until triggered by some specific circumstance or date?
a) Trojan horse program
b) DDoS program
c) Logic bomb
d) Dial back system
C
Much of what has been termed cybercrime has merely involved the computer but probably would be more accurately classified as other types of crimes. A notable exception to this involves:
a) Raiding dormant bank accounts
b) Inventory misappropriation
c) Embezzlement
d) Theft of computer time
D
The process of changing data before, during, or after they are entered into a computer system is called:
a) Data diddling
b) Salami techinique
c) Logic bombs
d)Social engineering
A
This term describes the technique of stealing small amounts of money from a large number of accounts over time.
a) Salami technique
b) Buffet system
c) Baloney method
d) Dialing for dollars
A
This best explains why we have incomplete information on cybercrime.
a) Most companies handle abuse as an internal matter
b) Most newspapers no longer have any interest in reporting cybercrime
c) Documentation of abuses is usually poor
d) We believe that most cybercrime is not caught
D
At present, we think that cybercrime is:
a) Falling
b) Random
c) Rising
d) Flat
C
All of these are reasons why we think that cybercrime is rising except:1)
a) Some Internet web sites now instruct users how to perform certain types ofcomputer abuse
b) More people now know how to use computers
c) Computer usage continues to grow
d) all of these are reasons
D
According to the chapter, which of these statements is most accurate?
a) Today, most computers are safe from computer abuse
b) Today, very few computers are completely safe from computer abuse
c) Today, “hacking” is no longer possible
d) Today, all of these statements are accurate
B
The TRW Credit Data Case is an example of:
a) The round-off trick
b) An outsider ripping off a corporate computer
c) Valuable information computer crime
d) none of the above
C
The TRW Case is notable because:
a) The amount of dollars involved was so large
b) No one got caught
c) The real victims were TRW customers
d) A routine audit was responsible for detecting the fraud
C
Which of these is an acronym for computer crime legislation?
a) ACL
b) BART
c) CFAA
d) DDoS
C
Hacking involves:
a) Stealing carbons of credit cards
b) Destroying computer hardware
c) Gaining illegal entry to computer files from remote locations
d) Inserting a logic bomb in a computer program
C
A computer virus is:
a) A disease that computer programmers are very susceptible to
b) A small processing routine that the user accidentally introduces into the system
c) A misnomer, since unlike biological viruses, computer viruses cannot reproduce themselves
d) Harmless
B
Computer programs that can scan computer disks for virus-like coding are called:
a) Antivirus software
b) Virus software
c) Detection software
d) Friendly applets
A
All of the following are ways to thwart computer viruses except:
a) Acquire a vaccine or anti-virus program
b) Do not download computer games from questionable sources
c) Maintain complete backup files
d) Buy shrink-wrapped software from reputable sources
C
A small computer program that is stored on a web server and designed to run in
a) Applet
b) Logic bomb
c) Worm
d) Boot sector
A
Thwarting computer abuse can be enhanced by all of the following except:
a) Enlisting top-management support
b) Increasing employee awareness and education c) Allowing only 10% of employees access to computers
d) Using strong passwords
C
In thwarting cybercrime, which of the following is true?
a) It is not important to enlist the support of top management
b) Many IT managers do not think cybercrime is very important
c) Cybercrime mostly means controlling computer hardware
d) Most cybercrime happens because of a failure of controls, not an absence of controls
D
Almost all computer criminals can be described as:
a) Professional criminals
b) Technical hackers possessing strong computer skills
c) White collar professional criminals
d) Amateurs who describe themselves as relatively honest
D
Most computer criminals who have been caught:
a) Have inferior educational backgrounds
b) Have superior educational backgrounds
c) Work for organized crime
d) Are ill suited to their jobs
B
A forensic accountant is an accountant who:
a) Performs autopsies on dead accountants
b) Tries to explain why some accounts become inactive
c) Investigates suspected fraud
d) Performs court-approved accounting tasks for bankrupt companies
C