Test.
Questions With Complete Solutions.
In thwarting cybercrime, which of the following is true?
Select one:
a. Many IT managers do not think cybercrime is very important
b. Most cybercrime happens because of a absence of controls, not a failure
of controls
c. It is not important to enlist the support of top management
d. Cybercrime mostly means controlling computer hardware
Correct Ans ~ b. Most cybercrime happens because of a absence of controls,
not a failure of controls
Acts such as dumpster diving, phishing, and smishing are all conducted to
Select one:
a. Conduct a denial of service attack
b. Disrupt computer services
c. Perform identify theft
d. Get food
Correct Ans ~ c. Perform identify theft
As it relates to the Conceptual Framework for Financial Reporting, the
Qualitative Characteristic of Relevance addresses
Select one:
a. Predictive Value, Completeness, Neutrality
b. Predictive Value, Timely information, Materiality
c. Completeness, Confirmatory Value, Predictive Value
d. Materiality, Predictive Value, Confirmatory Value
Correct Ans ~ d. Materiality, Predictive Value, Confirmatory Value
One of the most effective deterrents to prevent/discourage computer
hacking is
Select one:
a. none of the above
b. The USA Patriot Act of 2001
c. The Cyber Security Act of 1987
d. User education, that is, making potential hackers aware of the ethical
issues involved in this sort of behavior
Correct Ans ~ d. User education, that is, making potential hackers aware of
the ethical issues involved in this sort of behavior
,Probably the most important federal legislation governing activities involving
computers is
Select one:
a. Federal Privacy Act of 1974
b. Computer Fraud and Abuse Act of 1986
c. Cyber Security Act of 1987
d. CAN-SPAM Act of 2003
Correct Ans ~ b. Computer Fraud and Abuse Act of 1986
Which of the following is true?
Select one:
a. Computer crime only refers to manipulating a computer to dishonestly
obtain money, property, or some other advantage of value
b. Only the AICPA has drafted an ethical code of conduct
c. ACM society is an acronym meaning "association of corporate managers"
d. ethical use of computers means realizing that the availability of a system
does not convey its unrestricted use
Correct Ans ~ d. ethical use of computers means realizing that the
availability of a system does not convey its unrestricted use
The letter "p" in the acronym http stands for:
Select one:
A. Page
B. Parity
C. Protocol
D. Provider
Correct Ans ~ C. Protocol
Malware is
Select one:
a. Only affect the boot-sector of a computer system
b. A term for many types of damaging software
c. Will never affect the boot-sector of a computer system
d. A term for a specific type of damaging software
Correct Ans ~ b. A term for many types of damaging software
The process by which a financial transaction is recorded so that its flow
through the system can be followed is called
Select one:
a. An audit trail
b. Concatenation
c. Financial shadowing
d. Managerial trace technique
Correct Ans ~ a. An audit trail
, Tricking users into providing personal information such as a social security
number on a web site is an example of
Select one:
a. Spoofing
b. Phishing
c. Proxy serving
d. Spamming
Correct Ans ~ b. Phishing
As it relates to the Conceptual Framework for Financial Reporting, the
Assumptions include
Select one:
a. Measurement, Economic Entity, Going Concern, Monetary Unit
b. Periodicity, Going Concern, Monetary Unity, Economic Entity
c. Full Disclosure, Measurement, Economic Entity, Going Concern
d. Periodicity, Going Concern, Full Disclosure, Economic Entity
Correct Ans ~ b. Periodicity, Going Concern, Monetary Unity, Economic
Entity
In the context of our learning, SAR is an acronym standing for
Select one:
a. Standardized Accounting Reporting
b. Systematic Account Register
c. Suspicious Activity Reporting
d. Structured Analog Reporting
Correct Ans ~ c. Suspicious Activity Reporting
Which of the following does not destroy data but merely replicates itself
repeatedly until the user runs out of internal memory or disk space?
Select one:
a. Salami technique
b. Computer virus
c. Java applet
d. Worm program
Correct Ans ~ d. Worm program
One form of access security is determining authentic users by "who they
are." Which of the following is an example of such authentication?
Select one:
A. Requesting that the user provide his or her mother's maiden name
B. Biometric tests such as retina scans
C. Requiring the user to show a valid driver's license
D. Verifying a password
Correct Ans ~ B. Biometric tests such as retina scans
The term "smishing" means