AIS Ch 11 In Class Quiz
_________ was eventually arrested for computer hacking. a) Robert Tappan Morris Jr. b) Bernard Madoff c) Kenneth Lay d) Barak Obama
a) Robert Tappan Morris Jr.
__________ describes the technique of stealing small amounts of money from a large number of accounts over time. a) Salami technique b) Buffet system c) Baloney method d) Dialing for dollars
a) Salami technique
One of the most effective deterrents to prevent/discourage computer hacking is: a) User education, that is, making potential hackers aware of the ethical issues involved in this sort of behavior b) The USA Patriot Act of 2001 c) The Computer Security Act of 1987 d) none of the above
a) User education, that is, making potential hackers aware of the ethical issues involved in this sort of behavior
One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is the intent to illegally obtain information or tangible property through the use of computers. Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system? a) Salami technique b) Data diddling c) Shoulder surfing d) Trojan horse program
b) Data diddling
Most computer criminals who have been caught: a) Have inferior educational backgrounds b) Have superior educational backgrounds c) Work for organized crime d) Are ill suited to their jobs
b) Have superior educational backgrounds
Which of the following best describes computer abuse? a) It's manipulating a computer or computer data to dishonestly obtain money, property, or some other advantage of value, or cause significant loss b) It's when someone who is not authorized uses or gains access to a computer for purposes contrary to the wishes of the computer's owner c) It's when someone steals money from several computer accounts d) none of the above
b) It's when someone who is not authorized uses or gains access to a computer for purposes contrary to the wishes of the computer's owner
In the context of thwarting computer abuse, which of the following is true? a) It is not important to enlist the support of top management b) Many IT managers do not think computer abuse is very important c) Computer crime mostly means controlling computer hardware d) Most computer crime happens because of a failure of controls, not an absence of controls
b) Many IT managers do not think computer abuse is very important
Which of the following statements is true? a) Most states lack specific computer crime laws b) Most computer crime laws define their terms c) All computer crime laws have only felony provisions d) none of the above statements is true
b) Most computer crime laws define their terms
A "logic bomb" is a computer program that: a) Rewrites the instructions of a particular computer program b) Remains dormant until an event triggers it c) Contains an error in it d) "Blows away" (impresses) the boss when he or she sees it
b) Remains dormant until an event triggers it
According to the chapter, which of these statements is most accurate? a) Today, most computers are safe from computer abuse b) Today, very few computers are completely safe from computer abuse c) Today, "hacking" is no longer possible d) Today, all of these statements are accurate
b) Today, very few computers are completely safe from computer abuse
Which of the following does not destroy data but merely replicates itself repeatedly until the user runs out of internal memory or disk space? a) Computer virus b) Worm program c) Java applet d) Salami technique
b) Worm program
A computer virus is: a) a disease that computer programmers are very susceptible to b) a small processing routine that the user accidentally introduces into the system c) a misnomer, since unlike biological viruses, computer viruses cannot reproduce themselves d) harmless
b) a small processing routine that the user accidentally introduces into the system
A "logic bomb" is a computer program that: a) rewrites the instructions of a particular computer program b) remains dormant until an event triggers it c) contains an error in it d) "blows away" (impresses) the boss when he or she sees it
b) remains dormant until an event triggers it
An example of a conflict-of-interest situation is: a) Not working for a new company in a job similar to your last job b) Not talking to outsiders about general business concerns c) A decision where personal and corporate goals conflict d) Refusing to use a new computer if your colleagues are not provided similar systems
c) A decision where personal and corporate goals conflict
Thwarting computer abuse can be enhanced by all of the following except: a) Enlisting top-management support b) Increasing employee awareness and education c) Allowing only 10% of employees access to computers d) Using strong passwords
c) Allowing only 10% of employees access to computers
It is important to be able to recognize the symptoms of employee fraud. In practice, which of the following might be the best clue that fraud might be occurring? a) Accounting irregularities b) Internal control procedures that managers feel are inadequate c) Anomalies that, together, seem unreasonable d) Trial balances that almost always contain errors
c) Anomalies that, together, seem unreasonable
Which of these is an acronym for computer crime legislation? a) ACL b) BART c) CFAA d) DDoS
c) CFAA
Probably the most important federal legislation governing activities involving computers is: a) CAN-SPAM Act of 2003 b) Federal Privacy Act of 1974 c) Computer Fraud and Abuse Act of 1986 d) Computer Security Act of 1987
c) Computer Fraud and Abuse Act of 1986
Hacking involves: a) Stealing carbons of credit cards b) Destroying computer hardware c) Gaining illegal entry to computer files from remote locations d) Inserting a logic bomb in a computer program
c) Gaining illegal entry to computer files from remote locations
A forensic accountant is an accountant who: a) Performs autopsies on dead accountants b) Tries to explain why some accounts become inactive c) Investigates suspected fraud d) Performs court-approved accounting tasks for bankrupt companies
c) Investigates suspected fraud
Which of these terms describes a computer program that remains dormant until triggered by some specific circumstance or date? a) Trojan horse program b) DDoS program c) Logic bomb d) Dial back system
c) Logic bomb
All of the following are ways to thwart computer viruses except: a) Acquiring a vaccine or anti-virus program b) Avoiding downloading computer games from questionable sources c) Opening suspicious emails and attachments d) Buying shrink-wrapped software from reputable sources
c) Opening suspicious emails and attachments
Some firms and governmental organizations use ethical hackers to help find any vulnerabilities that could be exploited by a malicious hacker. Which of the following is also used to refer to ethical hacking? a) Denial of service b) Intrusion service c) Penetration testing d) Executable testing
c) Penetration testing
A computer virus is different from a "Trojan Horse" because the virus can a) Corrupt data b) Alter programming instructions c) Replicate itself d) Erase executable files
c) Replicate itself
According to the chapter, which of these statements is most accurate? a) Most computer abuses are performed as retaliation against employers b) Very little computer crime is committed for personal gain c) Some computer abuses are performed simply to meet a challenge d) We catch most computer abusers with good accounting controls
c) Some computer abuses are performed simply to meet a challenge
The TRW Case is notable because: a) The amount of dollars involved was so large b) No one got caught c) The real victims were TRW customers d) A routine audit was responsible for detecting the fraud
c) The real victims were TRW customers
Which of the following is a primary reason why accountants should be concerned about computer crime and abuse? a) They might lose their job if they don't detect computer crime or abuse in their organization b) They might lose their professional credibility and license if computer crime or abuse continues for a long time in their organization and they do not detect it c) They are responsible for designing, implementing, and monitoring the control procedures for AISs d) all of the above are equally important
c) They are responsible for designing, implementing, and monitoring the control procedures for AISs
The TRW Credit Data Case is an example of: a) The round-off trick b) An outsider ripping off a corporate computer c) Valuable information computer crime d) none of the above
c) Valuable information computer crime
At present, we think that computer crime is: a) falling b) random c) rising d) flat
c) rising
Accounting "ethics" means: a) Whatever the corporate manual says it means b) Acting responsibly as long as no dollars are involved c) Only being honest; everything else is up for grabs d) Acting responsibly, no matter what
d) Acting responsibly, no matter what
Some of the most informative reports of computer abuses are found in which of the following periodicals? a) Dr. Virus b) Hacking Today c) Parade of Perpetrators d) Computerworld
d) Computerworld
Which of the following is true? a) Only the AICPA has drafted an ethical code of conduct b) Computer crime only refers to manipulating a computer to dishonestly obtain money, property, or some other advantage of value c) ACM society is an acronym meaning "association of corporate managers" d) Ethical use of computers means realizing that the availability of a system does not convey its unrestricted use
d) Ethical use of computers means realizing that the availability of a system does not convey its unrestricted use
Much of what has been termed computer crime has merely involved the computer but probably would be more accurately classified as other types of crimes. A notable exception to this involves: a) Raiding dormant bank accounts b) Inventory misappropriation c) Embezzlement d) Theft of computer time
d) Theft of computer time
According to the chapter, which of these statements is most accurate? a) Almost all computer crime is committed for personal gain b) Very little computer crime is committed for personal gain c) Most computer crime is just as easily described as "embezzlement" d) We actually know very little about computer abuse
d) We actually know very little about computer abuse
Which of the following best explains why we have incomplete information on computer crime? a) Most companies handle abuse as an internal matter b) Most newspapers no longer have any interest in reporting computer crime c) Documentation of abuses is usually poor d) We believe that most computer crime is not caught
d) We believe that most computer crime is not caught
All of these are reasons why we think that computer crime is rising except: a) Some Internet web sites now instruct users how to perform certain types of computer abuse b) More people now know how to use computers c) Computer usage continues to grow d) all of these are reasons
d) all of these are reasons
Almost all computer criminals can be described as: a) professional criminals b) technical hackers possessing strong computer skills c) white collar professional criminals d) amateurs who describe themselves as relatively honest
d) amateurs who describe themselves as relatively honest
Acts such as dumpster diving, phishing, and smishing are all conducted to: a) conduct a denial of service attack b) disrupt computer services c) get food d) perform identity theft
d) perform identity theft
Which of the following best explains why we have incomplete information on computer crime? a) most companies handle abuse as an internal matter b) most newspapers no longer have any interest in reporting computer crime c) documentation of abuses is usually poor d) we believe that most computer crime is not caught
d) we believe that most computer crime is not caught
Which of these would be an example of "denial-of-service" computer abuse? a) Social engineering b) Salami technique c) Trojan horse computer program d) Embezzlement using computerized data e) none of these
e) none of these
Most computer abuse that we have caught so far has been because of good accounting controls. True or False
False
We believe that most computer crimes are not discovered. True or False
True
When organizations discover a computer crime, the cost of auditing and investigating the loss often exceeds the actual monetary loss. True or False
True
Worm programs are viruses that insert themselves into computer systems and disrupt operations or files. True or False
True
Which of the following is not a common way to steal personal identity information? a) Altering computer records b) Using key logging software c) Dumpster diving d) Phishing
a) Altering computer records
Computer programs that can scan computer disks for virus-like coding are called: a) Antivirus software b) Virus software c) Detection software d) Friendly applets
a) Antivirus software
A small computer program that is stored on a web server and designed to run in conjunction with browser software is called a(n): a) Applet b) Logic bomb c) Worm d) Boot sector
a) Applet
The term "smishing" means: a) Conducting identify theft by using text messages on cell phones b) Attempting to appear unnoticeable for an illegal act c) Stealing small amounts of monies from several computer accounts d) Masquerading as a corporate manager in order to obtain useful information
a) Conducting identify theft by using text messages on cell phones
The process of changing data before, during, or after they are entered into a computer system is called: a) Data diddling b) Salami technique c) Logic bombs d) Social engineering
a) Data diddling