Chapter 6 – ‘Computer Fraud and Abuse Techniques’ Flashcards

1
Q
  1. A set of instructions to increase a programmer’s pay rate by 10% is
    hidden inside an authorized program. It changes and updates the payroll
    file. What is this computer fraud technique called?  
    a. virus
    b. worm
    c. trap door
    d. Trojan horse (
A

d. Trojan horse (Correct. Placing unauthorized computer instructions, such as
fraudulently increasing an employee’s pay, in an authorized and properly
functioning program is an example of a Trojan horse.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which computer fraud technique involves a set of instructions hidden
    inside a calendar utility that copies itself each time the utility is enabled
    until memory is filled and the system crashes?
    a. logic bomb
    b. trap door
    c. virus
    d. Trojan horse
A

c. virus (Correct. A virus damages a system using a segment of executable
code that attaches itself to software, replicates itself, and spreads to other
systems or files.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Interest calculations are truncated at two decimal places, and the excess
    decimals are put into an account the perpetrator controls. What is this
    fraud called?  
    a. typosquatting
    b. URL hijacking
    c. chipping
    d. round-down fraud
A

d. round-down fraud (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A perpetrator attacks phone systems to obtain free phone line access or
    uses telephone lines to transmit viruses and to access, steal, and destroy
    data. What is this computer fraud technique called? 
    a. phishing
    b. phreaking
    c. pharming
    d. vishing
A

b. phreaking (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Fraud perpetrators threaten to harm a company if it does not pay a
    specified amount of money. What is this fraud technique called?
    a. cyber-terrorism
    b. blackmailing  
    c. cyber-extortion
    d. scareware
A

c. cyber-extortion (Correct)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
6. Techniques used to obtain confidential information, often by tricking
people, are referred to as what?
a. pretexting 
b. posing 
c. social engineering 
d. identity theft
A

c. social engineering (correct)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What type of software secretly collects personal information about
    users and sends it to someone else without the user’s permission?
    a. rootkit
    b. torpedo software
    c. spyware
    d. malware
A

c. spyware (correct)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What type of software conceals processes, files, network connections,
    memory addresses, systems utility programs, and system data from the
    operating system and other programs?
    a. rootkit  
    b. spyware
    c. malware
    d. adware
A

a. rootkit (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which type of computer attack takes place between the time a software
    vulnerability is discovered and the time software developers release a
    software patch that fixes the problem?  
    a. posing
    b. zero-day attack
    c. evil twin
    d. software piracy
A

b. zero-day attack (Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Someone redirects a website’s traffic to a bogus website, usually to
    gain access to personal and confidential information. What is this
    computer fraud technique called?
    a. vishing
    b. phishing
    c. pharming
    d. phreaking
A

c. pharming (Correct.) 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly