Ch 12 Computer Fraud and Abuse Techniques Flashcards
) \_\_\_\_\_\_\_\_ consists of the unauthorized copying of company data. A) Phishing B) Masquerading C) Data leakage D) Eavesdropping
C) Data leakage
) Individuals who use telephone lines to commit fraud and other illegal acts are typically called A) phreakers. B) crackers. C) phishers. D) hackers.
A) phreakers.
What is a denial of service attack?
A) A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider’s e-mail server.
B) A denial of service attack occurs when an e-mail message is sent through a re-mailer, who removes the message headers making the message anonymous, then resends the message to selected addresses.
C) A denial of service attack occurs when a cracker enters a system through an idle modem, captures the PC attached to the modem, and then gains access to the network to which it is connected.
D) A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more Usenet newsgroups LISTSERV lists.
A) A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider’s e-mail server.
Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as A) hacking. B) sniffing. C) phreaking. D) hijacking.
D) hijacking.
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called A) superzapping. B) data leakage. C) hacking. D) piggybacking.
D) piggybacking.
Which of the following is not a method of identity theft? A) scavenging B) phishing C) shoulder surfing D) phreaking
D) phreaking
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called A) cracking. B) masquerading. C) hacking. D) superzapping.
B) masquerading.
The unauthorized access to, or use of, a computer system is known as A) hacking. B) hijacking. C) phreaking. D) sniffing.
A) hacking.
A fraud technique that slices off tiny amounts from many projects is called the \_\_\_\_\_\_\_\_ technique. A) Trojan horse B) round down C) salami D) trap door
C) salami
Data diddling is
A) gaining unauthorized access to and use of computer systems, usually by means of a personal computer and a telecommunications network.
B) unauthorized copying of company data such as computer files.
C) unauthorized access to a system by the perpetrator pretending to be an authorized user.
D) changing data before, during, or after it is entered into the system in order to delete, alter, or add key system data.
D) changing data before, during, or after it is entered into the system in order to delete, alter, or add key system data.
In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as A) phreakers. B) hackers. C) hijackers. D) superzappers.
A) phreakers.
During a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of A) kiting. B) data diddling. C) data leakage. D) phreaking.
B) data diddling.
) LOLer was chatting online with l33ter. "I can't believe how lame some people are! :) I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password." LOLer is a \_\_\_\_\_\_\_\_, and the fraud he is describing is \_\_\_\_\_\_\_\_. A) hacker; social engineering B) phreaker; dumpster diving C) hacker; password cracking D) phreaker; the salami technique
C) hacker; password cracking
After graduating from college with a communications degree, Rado Ionesco experienced some difficulty in finding full-time employment. He free-lanced during the summer as a writer and then started a blog in the fall. Shortly thereafter he was contacted by SitePromoter Incorporated, who offered to pay him to promote their clients in his blog. He set up several more blogs for this purpose and is now generating a reasonable level of income. He is engaged in A) splogging. B) Bluesnarfing. C) vishing. D) typosquatting.
A) splogging.
Computers that are part of a botnet and are controlled by a bot herder are referred to as A) posers. B) zombies. C) botsquats. D) evil twins.
B) zombies.
Wassim Masood has been the webmaster for Woori Finance only ten days when Woori's website was flooded with access attempts. Wassim shut down the site and only opened it to Web addresses which he specifically identified as legitimate. As a result, many of Woori's customers were unable to obtain loans, causing Woori to lose a significant amount of business. Woori Finance suffered from a A) denial-of-service attack. B) zero-day attack. C) malware attack. D) cyber-extortion attack.
A) denial-of-service attack.
Wassim Masood has been the webmaster for Woori Finance only ten days when he received an e-mail that threatened to shut down Woori's website unless Wassim wired payment to an account in South America. Wassim was concerned that Woori Finance would suffer huge losses if its website went down, so he wired money to the appropriate account. The author of the e-mail successfully committed A) a denial-of-service attack. B) Internet terrorism. C) hacking. D) cyber-extortion.
D) cyber-extortion.
Wassim Masood works in the information technology department of TMV. On Monday morning, he arrived at work, scanned his identity card, and entered his code. At that moment, a lady in a delivery uniform came up behind Wassim with a bunch of boxes. Although Wassim held the door for the delivery lade, he later wondered if the delivery lady was engaged in A) pretexting. B) piggybacking. C) posing. D) spoofing.
B) piggybacking.
) Zeus is an example of a A) virus. B) worm. C) Trojan horse. D) war dialing.
C) Trojan horse.
Recall that students used Facebook and VKontakte to identify Russian money laundering mules. What fraud case did these students help foil? A) Zeus B) Trident Breach C) Nigerian Banking D) InfraGard
B) Trident Breach