ACC 564 Quiz 2 Week 5

 

Top of Class

Top of Class

Get An A+ Paper

Get An A+ Paper

Get Started

Get Started

ACC 564  Quiz 2 Week 5

 

1) ACC 564 Quiz 2 Week 5.Wally Hewitt maintains an online brokerage account. In early March, Wally received an email from the firm that explained that there had been a computer error and that provided a phone number so that Wally could verify his customer information. When he called, a recording asked that he enter the code from the email, his account number, and his social security number. After he did so, he was told that he would be connected with a customer service representative, but the connection was terminated. He contacted the brokerage company and was informed that they had not sent the email. Wally was a victim of

  1. A) Bluesnarfing.
  2. B) splogging.
  3. C) vishing.
  4. D) typosquatting.

 

2) When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as

  1. A) data diddling.
  2. B) dumpster diving.
  3. C) eavesdropping.
  4. D) piggybacking.

 

3) Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by

  1. A) scavenging.
  2. B) skimming.
  3. C) Internet auction fraud.
  4. D) cyber extortion.

 

4) A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a

  1. A) trap door.
  2. B) data diddle.
  3. C) logic bomb.
  4. D) virus.

 

5) The unauthorized copying of company data is known as

  1. A) data leakage.
  2. B) eavesdropping.
  3. C) masquerading.
  4. D) phishing.

 

6) Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called

  1. A) hackers.
  2. B) crackers.
  3. C) phreakers.
  4. D) jerks.

 

7) What is a denial of service attack?

  1. A) A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider’s e-mail server.
  2. B) A denial of service attack occurs when an e-mail message is sent through a re-mailer, who removes the message headers making the message anonymous, then resends the message to selected addresses.
  3. C) A denial of service attack occurs when a cracker enters a system through an idle modem, captures the PC attached to the modem, and then gains access to the network to which it is connected.
  4. D) A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more Usenet newsgroups LISTSERV lists.

 

ACC 564  Quiz 2 Week 5

8) Gaining control of someone else’s computer to carry out illicit activities without the owner’s knowledge is known as

  1. A) hacking.
  2. B) hijacking.
  3. C) phreaking.
  4. D) sniffings.

 

9) Illegally obtaining and using confidential information about a person for economic gain is known as

  1. A) eavesdropping.
  2. B) identity theft.
  3. C) packet sniffing.
  4. D) piggybacking.

 

10) Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

  1. A) superzapping.
  2. B) data leakage.
  3. C) hacking.
  4. D) piggybacking.

 

11) Which of the following is not a method of identify theft?

  1. A) Scavenging
  2. B) Phishing
  3. C) Shoulder surfing
  4. D) Phreaking

So on…….

ACC 564  Quiz 2 Week 5

Order 100% plagiarism free essay now

Share this

Tags: , , , ,

Freebies

 
error: Content is protected !!