Deck 11: Computer Crime, Fraud, Ethics, and Privacy

Full screen (f)
exit full mode
Question
The TRW Company Credit Data Case is an example of "valuable information" computer crime.
Use Space or
up arrow
down arrow
to flip the card.
Question
Many types of computer abuse have other, more common names such as "vandalism" or "embezzlement."
Question
"Shoulder surfing" is a victimless crime.
Question
In Canada, trafficking in passwords is immoral, but not illegal.
Question
Canada passed an important piece of federal legislation referring to criminal activities involving computers in 1987, making it illegal to alter or destroy federal information.
Question
The absence of good statistics on computer crime is partially explained by the fact that a large proportion of the computer crime committed in private organizations is handled as an internal matter and thus is never publicly divulged.
Question
According to the chapter, a computer virus is an example of a type of computer crime called "denial of service."
Question
The largest known computer crime of record is the TRW Company Credit Data Case.
Question
A conflict exists between providing bona fide AIS users easy access to computer resources and security objectives.
Question
We believe that most computer crimes are not discovered.
Question
One conclusion that we can draw about computer crime is that it is growing.
Question
There were less than 200 documented cases of computer crime at the time the textbook was written.
Question
VoIP refers to a type of antivirus software.
Question
Automated accounting information systems are a particularly important potential target of computer crime.
Question
Most computer abuse that we have caught so far has been because of good accounting controls.
Question
It is generally accepted that hackers are motivated only by greed.
Question
In Canada, there is a widely accepted definition of computer crime given by the Canadian Police College.
Question
A paradoxical matter in the TRW Case was that the prosecution had trouble acquiring testimonies because the buyers as well as the sellers of the credit information were technically in violation of the law.
Question
No one really knows how much is lost each year as the result of computer abuse.
Question
When organizations discover a computer crime, the cost of auditing and investigating the loss can exceed the actual monetary loss.
Question
Computer abuse could still result in computer crime, even though the person realized no personal gain.
Question
Smishing scams use text messages on cell phones to ask you to provide or update your personal information.
Question
Experts suggest that policies on computer abuse are ineffective, and therefore should not be used to help educate employees about computer abuse.
Question
Most computer criminals are individuals of questionable background, little education, and no morals.
Question
Worm programs are viruses that insert themselves into computer systems and disrupt operations or files.
Question
The RCMP estimates that credit card fraud in Canada cost banks over $365 million in 2010, while debit card fraud cost was over $119 million.
Question
Most computer criminals we have been fortunate enough to catch have had long, criminal backgrounds.
Question
Forensic accountants are to accounting as detectives are to criminal justice.
Question
VoIP converts voice signal into digital signals that travel over the Internet.
Question
According to a recent CSI survey, the most common problem encountered by the respondents is viruses.
Question
Fortunately, thwarting most forms of computer abuse does not require the support of top management.
Question
Most computer criminals we have been fortunate enough to catch have had strong, technical backgrounds.
Question
Monitoring activity over Wi-Fi networks is crucial for an effective physical security of the IT network of a company.
Question
Watching for telltale signs may help detect computer crime.
Question
When a hacker commits a distributed denial-of-service attack, he or she uses virus software to infect a single computer.
Question
A "strong password" is a password that lasts a long time.
Question
The term "distributed denial-of-service" is closely connected with the term "zombie computers."
Question
According to a KPMG survey, companies that stress the importance of business ethics tend to get about the same results as companies that do not stress its importance.
Question
Cultural standards have no impact on ethical standards.
Question
A computer virus may lie dormant in a system until software is copied and run on non?licensed machines.
Question
All of these are reasons why we think that computer crime is rising except:

A)Some Internet web sites now instruct users how to perform certain types of computer abuse
B)More people now know how to use computers
C)Computer usage continues to grow
D)all of these are reasons
Question
Which of the following best explains why we have incomplete information on computer crime?

A)Most companies handle abuse as an internal matter
B)Most newspapers no longer have any interest in reporting computer crime
C)Documentation of abuses is usually poor
D)We believe that most computer crime is not caught
Question
The TRW Case is notable because:

A)The amount of dollars involved was so large
B)No one got caught
C)The real victims were TRW customers
D)A routine audit was responsible for detecting the fraud
Question
At present, we think that computer crime is:

A)Falling
B)Random
C)Rising
D)Flat
Question
According to the chapter, which of these statements is most accurate?

A)Today, most computers are safe from computer abuse
B)Today, very few computers are completely safe from computer abuse
C)Today, "hacking" is no longer possible
D)Today, all of these statements are accurate
Question
According to the chapter, which of these statements is most accurate?

A)Almost all computer crime is committed for personal gain
B)Very little computer crime is committed for personal gain
C)Most computer crime is just as easily described as "embezzlement"
D)We actually know very little about computer abuse
Question
According to the chapter, which of these statements is most accurate?

A)Most computer abuses are performed as retaliation against employers
B)Very little computer crime is committed for personal gain
C)Some computer abuses are performed simply to meet a challenge
D)We catch most computer abusers with good accounting controls
Question
_________ was eventually arrested for computer hacking.

A)Robert Moore
B)Bernard Madoff
C)Kenneth Lay
D)Barak Obama
Question
Which of the following statements is true?

A)Many Canadian provinces lack specific computer crime laws
B)Most computer crime laws define their terms
C)All computer crime laws have only felony provisions
D)none of the above statements is true
Question
A "logic bomb" is a computer program that:

A)Rewrites the instructions of a particular computer program
B)Remains dormant until an event triggers it
C)Contains an error in it
D)"Blows away" impresses)the boss when he or she sees it
Question
The process of changing data before, during, or after they are entered into a computer system is called:

A)Data diddling
B)Salami technique
C)Logic bombs
D)Social engineering
Question
Which of these would be an example of "denial-of-service" computer abuse?

A)Social engineering
B)Salami technique
C)Trojan horse program
D)Embezzlement using computerized data
E)none of these
Question
Which of these is an acronym for privacy legislation?

A)ACL
B)BART
C)PIPEDA
D)DOS
Question
Hacking involves:

A)Stealing carbons of credit cards
B)Destroying computer hardware
C)Gaining illegal entry to computer files from remote locations
D)Inserting a logic bomb in a computer program
Question
Some of the most informative reports of computer abuses are found in which of the following periodicals?

A)Dr.Virus
B)Hacking Today
C)Parade of Perpetrators
D)Computerworld
Question
The TRW Credit Data Case is an example of:

A)The round?off trick
B)An outsider ripping off a corporate computer
C)Valuable information computer crime
D)none of the above
Question
A computer virus is:

A)A disease that computer programmers are very susceptible to
B)A small processing routine that the user accidentally introduces into the system
C)A misnomer, since unlike biological viruses, computer viruses cannot reproduce themselves
D)Harmless
Question
Much of what has been termed computer crime has merely involved the computer but probably would be more accurately classified as other types of crimes.A notable exception to this involves:

A)Raiding dormant bank accounts
B)Inventory misappropriation
C)Embezzlement
D)Theft of computer time
Question
Which of these terms describes a computer program that remains dormant until triggered by some specific circumstance or date?

A)Trojan horse program
B)DDoS program
C)Logic bomb
D)Dial back system
Question
__________ describes the technique of stealing small amounts of money from a large number of accounts over time.

A)Salami technique
B)Buffet system
C)Baloney method
D)Dialing for dollars
Question
A forensic accountant is an accountant who:

A)Performs autopsies on dead accountants
B)Tries to explain why some accounts become inactive
C)Investigates suspected fraud
D)Performs court-approved accounting tasks for bankrupt companies
Question
Probably the most important federal legislation governing the privacy of personal information is:

A)CAN-SPAM Act
B)Federal Privacy Act
C)PIPEDA
D)Criminal Code of Canada
Question
Computer programs that can scan computer disks for virus-like coding are called:

A)Antivirus software
B)Virus software
C)Detection software
D)Friendly applets
Question
Accounting "ethics" means:

A)Whatever the corporate manual says it means
B)Acting responsibly as long as no dollars are involved
C)Only being honest; everything else is up for grabs
D)Acting responsibly, no matter what
Question
An example of a conflict-of-interest situation is:

A)Not working for a new company in a job similar to your last job
B)Not talking to outsiders about general business concerns
C)A decision where personal and corporate goals conflict
D)Refusing to use a new computer if your colleagues are not provided similar systems
Question
One of the most effective deterrents to prevent/discourage computer hacking is:

A)User education, that is, making potential hackers aware of the ethical issues involved in this sort of behavior
B)The Criminal Law Improvement Act of 1987
C)The Criminal Law Amendment Act of 1985
D)none of the above
Question
The term "smishing" means:

A)Conducting identify theft by using text messages on cell phones
B)Attempting to appear unnoticeable for an illegal act
C)Stealing small amounts of monies from several computer accounts
D)Masquerading as a corporate manager in order to obtain useful information
Question
In the context of thwarting computer abuse, which of the following is true?

A)It is not important to enlist the support of top management
B)Many top managers are not concerned about computer abuse
C)Computer crime mostly means controlling computer hardware
D)Most computer crime happens because of a failure of controls, not an absence of controls
Question
It is important to be able to recognize the symptoms of employee fraud.In practice, which of the following might be the best clue that fraud might be occurring?

A)Accounting irregularities
B)Internal control procedures that managers feel are inadequate
C)Anomalies that, together, seem unreasonable
D)Trial balances that almost always contain errors
Question
Most computer criminals who have been caught:

A)Have inferior educational backgrounds
B)Have superior educational backgrounds
C)Work for organized crime
D)Are ill suited to their jobs
Question
Thwarting computer abuse can be enhanced by all of the following except:

A)Enlisting top-management support
B)Increasing employee awareness and education
C)Allowing only 10% of employees access to computers
D)Using strong passwords
Question
Almost all computer criminals can be described as:

A)Professional criminals
B)Technical hackers possessing strong computer skills
C)White collar professional criminals
D)Amateurs who describe themselves as relatively honest
Question
One of the major computer crimes is the intent to illegally obtain information or tangible property through the use of computers.Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system?

A)Salami technique
B)Data diddling
C)Shoulder surfing
D)Trojan horse program
Question
A small computer program that is stored on a web server and designed to run in conjunction with browser software is called an):

A)Applet
B)Logic bomb
C)Worm
D)Boot sector
Question
Which of the following is true?

A)Only the AICPA has drafted an ethical code of conduct
B)Computer crime only refers to manipulating a computer to dishonestly obtain money, property, or some other advantage of value
C)ACM society is an acronym meaning "association of corporate managers"
D)Ethical use of computers means realizing that the availability of a system does not convey its unrestricted use
Question
All of the following are ways to thwart computer viruses except:

A)Acquiring a vaccine or anti?virus program
B)Avoiding downloading computer games from questionable sources
C)Opening suspicious emails and attachments
D)Buying shrink?wrapped software from reputable sources
Question
Acts such as dumpster diving, phishing, and smishing are all conducted to:

A)Conduct a denial of service attack
B)Disrupt computer services
C)Get food
D)Perform identity theft
Question
Which of the following is an important reason why accountants should be concerned about computer crime and abuse?

A)They might lose their job if they don't detect computer crime or abuse in their organization
B)They might lose their professional credibility and license if computer crime or abuse continues for a long time in their organization and they do not detect it
C)They are responsible for designing, implementing, and monitoring the control procedures for AISs
D)all of the above are equally important
Question
Which of the following is not a common way to steal personal identity information?

A)Altering computer records
B)Using key logging software
C)Dumpster diving
D)Phishing
Question
Which of the following does not destroy data but merely replicates itself repeatedly until the user runs out of internal memory or disk space?

A)Computer virus
B)Worm program
C)Java applet
D)Salami technique
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/83
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Computer Crime, Fraud, Ethics, and Privacy
1
The TRW Company Credit Data Case is an example of "valuable information" computer crime.
True
2
Many types of computer abuse have other, more common names such as "vandalism" or "embezzlement."
True
3
"Shoulder surfing" is a victimless crime.
False
4
In Canada, trafficking in passwords is immoral, but not illegal.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
5
Canada passed an important piece of federal legislation referring to criminal activities involving computers in 1987, making it illegal to alter or destroy federal information.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
6
The absence of good statistics on computer crime is partially explained by the fact that a large proportion of the computer crime committed in private organizations is handled as an internal matter and thus is never publicly divulged.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
7
According to the chapter, a computer virus is an example of a type of computer crime called "denial of service."
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
8
The largest known computer crime of record is the TRW Company Credit Data Case.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
9
A conflict exists between providing bona fide AIS users easy access to computer resources and security objectives.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
10
We believe that most computer crimes are not discovered.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
11
One conclusion that we can draw about computer crime is that it is growing.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
12
There were less than 200 documented cases of computer crime at the time the textbook was written.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
13
VoIP refers to a type of antivirus software.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
14
Automated accounting information systems are a particularly important potential target of computer crime.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
15
Most computer abuse that we have caught so far has been because of good accounting controls.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
16
It is generally accepted that hackers are motivated only by greed.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
17
In Canada, there is a widely accepted definition of computer crime given by the Canadian Police College.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
18
A paradoxical matter in the TRW Case was that the prosecution had trouble acquiring testimonies because the buyers as well as the sellers of the credit information were technically in violation of the law.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
19
No one really knows how much is lost each year as the result of computer abuse.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
20
When organizations discover a computer crime, the cost of auditing and investigating the loss can exceed the actual monetary loss.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
21
Computer abuse could still result in computer crime, even though the person realized no personal gain.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
22
Smishing scams use text messages on cell phones to ask you to provide or update your personal information.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
23
Experts suggest that policies on computer abuse are ineffective, and therefore should not be used to help educate employees about computer abuse.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
24
Most computer criminals are individuals of questionable background, little education, and no morals.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
25
Worm programs are viruses that insert themselves into computer systems and disrupt operations or files.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
26
The RCMP estimates that credit card fraud in Canada cost banks over $365 million in 2010, while debit card fraud cost was over $119 million.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
27
Most computer criminals we have been fortunate enough to catch have had long, criminal backgrounds.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
28
Forensic accountants are to accounting as detectives are to criminal justice.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
29
VoIP converts voice signal into digital signals that travel over the Internet.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
30
According to a recent CSI survey, the most common problem encountered by the respondents is viruses.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
31
Fortunately, thwarting most forms of computer abuse does not require the support of top management.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
32
Most computer criminals we have been fortunate enough to catch have had strong, technical backgrounds.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
33
Monitoring activity over Wi-Fi networks is crucial for an effective physical security of the IT network of a company.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
34
Watching for telltale signs may help detect computer crime.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
35
When a hacker commits a distributed denial-of-service attack, he or she uses virus software to infect a single computer.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
36
A "strong password" is a password that lasts a long time.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
37
The term "distributed denial-of-service" is closely connected with the term "zombie computers."
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
38
According to a KPMG survey, companies that stress the importance of business ethics tend to get about the same results as companies that do not stress its importance.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
39
Cultural standards have no impact on ethical standards.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
40
A computer virus may lie dormant in a system until software is copied and run on non?licensed machines.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
41
All of these are reasons why we think that computer crime is rising except:

A)Some Internet web sites now instruct users how to perform certain types of computer abuse
B)More people now know how to use computers
C)Computer usage continues to grow
D)all of these are reasons
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following best explains why we have incomplete information on computer crime?

A)Most companies handle abuse as an internal matter
B)Most newspapers no longer have any interest in reporting computer crime
C)Documentation of abuses is usually poor
D)We believe that most computer crime is not caught
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
43
The TRW Case is notable because:

A)The amount of dollars involved was so large
B)No one got caught
C)The real victims were TRW customers
D)A routine audit was responsible for detecting the fraud
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
44
At present, we think that computer crime is:

A)Falling
B)Random
C)Rising
D)Flat
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
45
According to the chapter, which of these statements is most accurate?

A)Today, most computers are safe from computer abuse
B)Today, very few computers are completely safe from computer abuse
C)Today, "hacking" is no longer possible
D)Today, all of these statements are accurate
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
46
According to the chapter, which of these statements is most accurate?

A)Almost all computer crime is committed for personal gain
B)Very little computer crime is committed for personal gain
C)Most computer crime is just as easily described as "embezzlement"
D)We actually know very little about computer abuse
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
47
According to the chapter, which of these statements is most accurate?

A)Most computer abuses are performed as retaliation against employers
B)Very little computer crime is committed for personal gain
C)Some computer abuses are performed simply to meet a challenge
D)We catch most computer abusers with good accounting controls
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
48
_________ was eventually arrested for computer hacking.

A)Robert Moore
B)Bernard Madoff
C)Kenneth Lay
D)Barak Obama
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following statements is true?

A)Many Canadian provinces lack specific computer crime laws
B)Most computer crime laws define their terms
C)All computer crime laws have only felony provisions
D)none of the above statements is true
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
50
A "logic bomb" is a computer program that:

A)Rewrites the instructions of a particular computer program
B)Remains dormant until an event triggers it
C)Contains an error in it
D)"Blows away" impresses)the boss when he or she sees it
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
51
The process of changing data before, during, or after they are entered into a computer system is called:

A)Data diddling
B)Salami technique
C)Logic bombs
D)Social engineering
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
52
Which of these would be an example of "denial-of-service" computer abuse?

A)Social engineering
B)Salami technique
C)Trojan horse program
D)Embezzlement using computerized data
E)none of these
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
53
Which of these is an acronym for privacy legislation?

A)ACL
B)BART
C)PIPEDA
D)DOS
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
54
Hacking involves:

A)Stealing carbons of credit cards
B)Destroying computer hardware
C)Gaining illegal entry to computer files from remote locations
D)Inserting a logic bomb in a computer program
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
55
Some of the most informative reports of computer abuses are found in which of the following periodicals?

A)Dr.Virus
B)Hacking Today
C)Parade of Perpetrators
D)Computerworld
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
56
The TRW Credit Data Case is an example of:

A)The round?off trick
B)An outsider ripping off a corporate computer
C)Valuable information computer crime
D)none of the above
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
57
A computer virus is:

A)A disease that computer programmers are very susceptible to
B)A small processing routine that the user accidentally introduces into the system
C)A misnomer, since unlike biological viruses, computer viruses cannot reproduce themselves
D)Harmless
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
58
Much of what has been termed computer crime has merely involved the computer but probably would be more accurately classified as other types of crimes.A notable exception to this involves:

A)Raiding dormant bank accounts
B)Inventory misappropriation
C)Embezzlement
D)Theft of computer time
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
59
Which of these terms describes a computer program that remains dormant until triggered by some specific circumstance or date?

A)Trojan horse program
B)DDoS program
C)Logic bomb
D)Dial back system
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
60
__________ describes the technique of stealing small amounts of money from a large number of accounts over time.

A)Salami technique
B)Buffet system
C)Baloney method
D)Dialing for dollars
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
61
A forensic accountant is an accountant who:

A)Performs autopsies on dead accountants
B)Tries to explain why some accounts become inactive
C)Investigates suspected fraud
D)Performs court-approved accounting tasks for bankrupt companies
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
62
Probably the most important federal legislation governing the privacy of personal information is:

A)CAN-SPAM Act
B)Federal Privacy Act
C)PIPEDA
D)Criminal Code of Canada
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
63
Computer programs that can scan computer disks for virus-like coding are called:

A)Antivirus software
B)Virus software
C)Detection software
D)Friendly applets
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
64
Accounting "ethics" means:

A)Whatever the corporate manual says it means
B)Acting responsibly as long as no dollars are involved
C)Only being honest; everything else is up for grabs
D)Acting responsibly, no matter what
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
65
An example of a conflict-of-interest situation is:

A)Not working for a new company in a job similar to your last job
B)Not talking to outsiders about general business concerns
C)A decision where personal and corporate goals conflict
D)Refusing to use a new computer if your colleagues are not provided similar systems
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
66
One of the most effective deterrents to prevent/discourage computer hacking is:

A)User education, that is, making potential hackers aware of the ethical issues involved in this sort of behavior
B)The Criminal Law Improvement Act of 1987
C)The Criminal Law Amendment Act of 1985
D)none of the above
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
67
The term "smishing" means:

A)Conducting identify theft by using text messages on cell phones
B)Attempting to appear unnoticeable for an illegal act
C)Stealing small amounts of monies from several computer accounts
D)Masquerading as a corporate manager in order to obtain useful information
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
68
In the context of thwarting computer abuse, which of the following is true?

A)It is not important to enlist the support of top management
B)Many top managers are not concerned about computer abuse
C)Computer crime mostly means controlling computer hardware
D)Most computer crime happens because of a failure of controls, not an absence of controls
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
69
It is important to be able to recognize the symptoms of employee fraud.In practice, which of the following might be the best clue that fraud might be occurring?

A)Accounting irregularities
B)Internal control procedures that managers feel are inadequate
C)Anomalies that, together, seem unreasonable
D)Trial balances that almost always contain errors
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
70
Most computer criminals who have been caught:

A)Have inferior educational backgrounds
B)Have superior educational backgrounds
C)Work for organized crime
D)Are ill suited to their jobs
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
71
Thwarting computer abuse can be enhanced by all of the following except:

A)Enlisting top-management support
B)Increasing employee awareness and education
C)Allowing only 10% of employees access to computers
D)Using strong passwords
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
72
Almost all computer criminals can be described as:

A)Professional criminals
B)Technical hackers possessing strong computer skills
C)White collar professional criminals
D)Amateurs who describe themselves as relatively honest
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
73
One of the major computer crimes is the intent to illegally obtain information or tangible property through the use of computers.Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system?

A)Salami technique
B)Data diddling
C)Shoulder surfing
D)Trojan horse program
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
74
A small computer program that is stored on a web server and designed to run in conjunction with browser software is called an):

A)Applet
B)Logic bomb
C)Worm
D)Boot sector
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is true?

A)Only the AICPA has drafted an ethical code of conduct
B)Computer crime only refers to manipulating a computer to dishonestly obtain money, property, or some other advantage of value
C)ACM society is an acronym meaning "association of corporate managers"
D)Ethical use of computers means realizing that the availability of a system does not convey its unrestricted use
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
76
All of the following are ways to thwart computer viruses except:

A)Acquiring a vaccine or anti?virus program
B)Avoiding downloading computer games from questionable sources
C)Opening suspicious emails and attachments
D)Buying shrink?wrapped software from reputable sources
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
77
Acts such as dumpster diving, phishing, and smishing are all conducted to:

A)Conduct a denial of service attack
B)Disrupt computer services
C)Get food
D)Perform identity theft
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is an important reason why accountants should be concerned about computer crime and abuse?

A)They might lose their job if they don't detect computer crime or abuse in their organization
B)They might lose their professional credibility and license if computer crime or abuse continues for a long time in their organization and they do not detect it
C)They are responsible for designing, implementing, and monitoring the control procedures for AISs
D)all of the above are equally important
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following is not a common way to steal personal identity information?

A)Altering computer records
B)Using key logging software
C)Dumpster diving
D)Phishing
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following does not destroy data but merely replicates itself repeatedly until the user runs out of internal memory or disk space?

A)Computer virus
B)Worm program
C)Java applet
D)Salami technique
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 83 flashcards in this deck.