CHAPTER 6 Computer Fraud and Abuse Techniques Flashcards
- A set of instructions to increase a programmer’s pay rate by 10% is hidden inside an
authorized program. It changes and updates the payroll file. What is this computer fraud
technique called?
a. virus
b. worm
c. trap door
d. Trojan horse
d. Trojan horse (Correct. Placing unauthorized computer instructions, such as fraudulently
increasing an employee’s pay, in an authorized and properly functioning program
is an example of a Trojan horse.)
- Which computer fraud technique involves a set of instructions hidden inside a calendar
utility that copies itself each time the utility is enabled until memory is filled and the system
crashes?
a. logic bomb
b. trap door
c. virus
d. Trojan horse
c. virus (Correct. A virus damages a system using a segment of executable code that attaches
itself to software, replicates itself, and spreads to other systems or files.)
- Interest calculations are truncated at two decimal places, and the excess decimals are put
into an account the perpetrator controls. What is this fraud called?
a. typosquatting
b. URL hijacking
c. chipping
d. round-down fraud
d. round-down fraud (Correct.)
- A perpetrator attacks phone systems to obtain free phone line access or uses telephone
lines to transmit viruses and to access, steal, and destroy data. What is this computer fraud
technique called?
a. phishing
b. phreaking
c. pharming
d. vishing
b. phreaking (Correct.)
- Fraud perpetrators threaten to harm a company if it does not pay a specified amount of
money. What is this fraud technique called?
a. cyber-terrorism
b. blackmailing
c. cyber-extortion
d. scareware
c. cyber-extortion (Correct.)
- Techniques used to obtain confidential information, often by tricking people, are referred to as what?
a. pretexting
b. posing
c. social engineering
d. identity theft
c. social engineering (Correct.)
- What type of software secretly collects personal information about users and sends it to
someone else without the user’s permission?
a. rootkit
b. torpedo software
c. spyware
d. malware
c. spyware (Correct.)
8. What is the name of the computer attack which captures data from information items as it travels over networks? a. packet sniffers b. item sniffers c. malware d. adware
a. packet sniffers [Correct. Programs that capture data from information packets as they
travel over the Internet or company networks.]
- Which type of computer attack steals contact lists, images and other data using Bluetooth?
a. Bluebugging
b. Bluesnarfing
c. Buffer overflow
d. Carding
b. Bluesnarfing [Correct. Stealing (snarfing) contact lists, images, and other data using
flaws in Bluetooth applications.]
- Someone redirects a website’s traffic to a bogus website, usually to gain access to personal
and confidential information. What is this computer fraud technique called?
a. vishing
b. phishing
c. pharming
d. phreaking
c. pharming (Correct.)