Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 5
Quiz 6: Computer Fraud and Abuse Techniques
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
Question 42
Multiple Choice
It was late on a Friday afternoon when Chloe Pike got a call at the help desk for Taggart Corp.A man with an edge of panic in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as Joe Andrew from the accounting department of Taggart Corp.He told Chloe that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Chloe knew that Taggart's new password policy required that passwords be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems for many users.Consequently,Chloe provided the password to Joe.The caller turned out not to be Joe Andrew,and Chloe was a victim of
Question 43
Multiple Choice
Mircea Vasilescu maintains an online brokerage account.In early March,Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone number to verify his customer information.When Mircea called the number,a recording asked that he enter the code from the e-mail,his account number,and his social security number.After he did so,he was told that he would be connected with a customer service representative,but the connection was terminated.He contacted the brokerage company and was informed that they had not sent the e-mail.Mircea was a victim of
Question 44
Multiple Choice
Hunter Carr is an accountant with AcctSmart.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Hunter received an e-mail claiming that there had been an error updating his password and it provided Hunter with a link to a website with instructions for re-updating his password.Something about the e-mail made Hunter suspicious,so he called AcctSmart's information technology department and found that the e-mail was fictitious.The e-mail was an example of
Question 45
Multiple Choice
Jim Cooper decided to do some Christmas shopping online.He visited Amazon.com,found a perfect gift for his daughter,and placed his order.It was only later when he noticed that the website's URL that he had placed the order was actually Amazom.com and not Amazon.com.Jim was a victim of
Question 46
Multiple Choice
Ashley Baker works in the information technology department of Core Company.On Monday morning,she arrived at work,scanned her identity card,and entered her access code.At that moment,a man in a delivery uniform came up behind Ashley with a bunch of boxes.Although Ashley held the door for the delivery man,she later wondered if the man was engaged in
Question 47
Essay
Describe the various form of spoofing.Select one type of spoofing and search for an actual case about the spoofing.Discuss what has happened and provide recommendations as to how the spoofing could have been prevented.