Chapter 3 MCQ Flashcards
According to the chapter, which of these statements is most accurate?
a) Almost all cybercrime is committed for personal gain
b) Very little cybercrime is committed for personal gain
c) Most cybercrime is just as easily described as “embezzlement”
d) We actually know very little about cybercrime
D
According to the chapter, which of these statements is most accurate?
a) Most cybercrime is performed as retaliation against employers
b) Very little cybercrime is committed for personal gain
c) Some cybercrime is performed simply to meet a challenge
d) We catch most computer abusers with good accounting controls
C
Which of these would be an example of “denial-of-service” computer abuse?
a) Computer virus
b) Salami technique
c) Trojan horse computer program
d) Embezzlement using computerized data
e) none of these
E
Which of these terms describes a computer program that remains dormant until triggered by some specific circumstance or date?
a) Trojan horse program
b) DDoS program
c) Logic bomb
d) Dial back system
C
Much of what has been termed cybercrime has merely involved the computer but probably would be more accurately classified as other types of crimes. A notable exception to this involves:
a) Raiding dormant bank accounts
b) Inventory misappropriation
c) Embezzlement
d) Theft of computer time
D
The process of changing data before, during, or after they are entered into a computer system is called:
a) Data diddling
b) Salami techinique
c) Logic bombs
d)Social engineering
A
This term describes the technique of stealing small amounts of money from a large number of accounts over time.
a) Salami technique
b) Buffet system
c) Baloney method
d) Dialing for dollars
A
This best explains why we have incomplete information on cybercrime.
a) Most companies handle abuse as an internal matter
b) Most newspapers no longer have any interest in reporting cybercrime
c) Documentation of abuses is usually poor
d) We believe that most cybercrime is not caught
D
At present, we think that cybercrime is:
a) Falling
b) Random
c) Rising
d) Flat
C
All of these are reasons why we think that cybercrime is rising except:1)
a) Some Internet web sites now instruct users how to perform certain types ofcomputer abuse
b) More people now know how to use computers
c) Computer usage continues to grow
d) all of these are reasons
D
According to the chapter, which of these statements is most accurate?
a) Today, most computers are safe from computer abuse
b) Today, very few computers are completely safe from computer abuse
c) Today, “hacking” is no longer possible
d) Today, all of these statements are accurate
B
The TRW Credit Data Case is an example of:
a) The round-off trick
b) An outsider ripping off a corporate computer
c) Valuable information computer crime
d) none of the above
C
The TRW Case is notable because:
a) The amount of dollars involved was so large
b) No one got caught
c) The real victims were TRW customers
d) A routine audit was responsible for detecting the fraud
C
Which of these is an acronym for computer crime legislation?
a) ACL
b) BART
c) CFAA
d) DDoS
C
Hacking involves:
a) Stealing carbons of credit cards
b) Destroying computer hardware
c) Gaining illegal entry to computer files from remote locations
d) Inserting a logic bomb in a computer program
C
A computer virus is:
a) A disease that computer programmers are very susceptible to
b) A small processing routine that the user accidentally introduces into the system
c) A misnomer, since unlike biological viruses, computer viruses cannot reproduce themselves
d) Harmless
B