quiz 5 - 1. 05070

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
1. 05-070   Wally Hewitt maintains an online brokerage account. In early March, Wally received an email from the firm that  explained that there had been a computer error and that provided a phone number so that Wally could verify his  customer information. When he called, a recording asked that he enter the code from the email, his account  number, and his social security number. After he did so, he was told that he would be connected with a  customer service representative, but the connection was terminated. He contacted the brokerage company and  was informed that they had not sent the email. Wally was a victim of    Student Response Value Correct Answer Feedback A. Bluesnarfing. 0%       B. splogging.      C.  vishing.      D.  typosquatting.       Score: 0/4    2. 05-073   Jiao Jan had been the Web master for Folding Squid Technologies for only three months when the Web site  was inundated with access attempts. The only solution was to shut down the site and then selectively open it to  access from certain Web addresses. FST suffered significant losses during the period. The company had been  the victim of a(an)   
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Score: 4/4    3. 05-038   One computer fraud technique is known as data diddling. What is it?    Score: 4/4    4. 05-019   There are three characteristics associated with most fraud. The characteristic that often takes more time and  effort and leaves behind more evidence than other types of fraud is called    Score: 0/4   
Background image of page 2
5. 05-059   Which type of antivirus program is most effective in spotting an infection soon after it starts?    Score: 4/4    6. 05-086   What is a computer fraud?  Student Response: Sample Correct Answer General Feedback: Score:   7. 05-014   Researchers have compared the psychological and demographic characteristics of white-collar criminals,  violent criminals, and the general public. They found that   
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Score: 4/4    8. 05-061   On Monday morning, Janet Pillsner, Chief Information Officer at International Securities Corporation (ISC), got  some bad news. A tape used to store system data backups was lost while it was being transported to an offsite  storage location. She called a meeting of her technical staff to discuss the implications of the loss. Which of the  following is most likely to relieve her concerns over the potential cost of the loss?    Score: 4/4    9. 05-081
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/24/2011 for the course COB acct taught by Professor Smith during the Spring '09 term at California Coast University.

Page1 / 49

quiz 5 - 1. 05070

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online