Chapter 6 – ‘Computer Fraud and Abuse Techniques’ Flashcards
1
Q
- A set of instructions to increase a programmer’s pay rate by 10% is
hidden inside an authorized program. It changes and updates the payroll
file. What is this computer fraud technique called?
a. virus
b. worm
c. trap door
d. Trojan horse (
A
d. Trojan horse (Correct. Placing unauthorized computer instructions, such as
fraudulently increasing an employee’s pay, in an authorized and properly
functioning program is an example of a Trojan horse.)
2
Q
- Which computer fraud technique involves a set of instructions hidden
inside a calendar utility that copies itself each time the utility is enabled
until memory is filled and the system crashes?
a. logic bomb
b. trap door
c. virus
d. Trojan horse
A
c. virus (Correct. A virus damages a system using a segment of executable
code that attaches itself to software, replicates itself, and spreads to other
systems or files.)
3
Q
- Interest calculations are truncated at two decimal places, and the excess
decimals are put into an account the perpetrator controls. What is this
fraud called?
a. typosquatting
b. URL hijacking
c. chipping
d. round-down fraud
A
d. round-down fraud (Correct.)
4
Q
- A perpetrator attacks phone systems to obtain free phone line access or
uses telephone lines to transmit viruses and to access, steal, and destroy
data. What is this computer fraud technique called?
a. phishing
b. phreaking
c. pharming
d. vishing
A
b. phreaking (Correct.)
5
Q
- Fraud perpetrators threaten to harm a company if it does not pay a
specified amount of money. What is this fraud technique called?
a. cyber-terrorism
b. blackmailing
c. cyber-extortion
d. scareware
A
c. cyber-extortion (Correct)
6
Q
6. Techniques used to obtain confidential information, often by tricking people, are referred to as what? a. pretexting b. posing c. social engineering d. identity theft
A
c. social engineering (correct)
7
Q
- What type of software secretly collects personal information about
users and sends it to someone else without the user’s permission?
a. rootkit
b. torpedo software
c. spyware
d. malware
A
c. spyware (correct)
8
Q
- What type of software conceals processes, files, network connections,
memory addresses, systems utility programs, and system data from the
operating system and other programs?
a. rootkit
b. spyware
c. malware
d. adware
A
a. rootkit (Correct.)
9
Q
- Which type of computer attack takes place between the time a software
vulnerability is discovered and the time software developers release a
software patch that fixes the problem?
a. posing
b. zero-day attack
c. evil twin
d. software piracy
A
b. zero-day attack (Correct.)
10
Q
- Someone redirects a website’s traffic to a bogus website, usually to
gain access to personal and confidential information. What is this
computer fraud technique called?
a. vishing
b. phishing
c. pharming
d. phreaking
A
c. pharming (Correct.)