Chapter 03 True/False Questions
Lockout systems disconnect telephone connections if users fail to provide a correct password in a set number of tries.
True
Many types of cybercrime have other, more common names such as "vandalism" or "embezzlement.
True
No one really knows how much is lost each year as the result of cybercrime.
True
One conclusion that we can draw about cybercrime is that it is growing.
True
Watching for tell-tale signs may help detect computer crime.
True
A "strong password" is a password that lasts a long time.
False
According to a KPMG survey, companies that stress the importance of business ethics tend to get about the same results as companies that do not stress its importance.
False
According to the chapter, a computer virus is an example of a type of cybercrime called "denial of service.
False
Cybercrime is another name for computer fraud.
False
Experts suggest that policies on computer abuse are ineffective, and therefore should not be used to help educate employees about computer abuse.
False
Fortunately, thwarting most forms of cybercrime does not require the support of top management.
False
In the United States, trafficking in passwords is immoral, but not illegal.
False
It is generally accepted that hackers are motivated only by greed.
False
Most computer abuse that we have caught so far has been because of good accounting controls.
False
Most computer criminals are individuals of questionable background, little education, and no morals.
False
Most computer criminals we have been fortunate enough to catch have had long, criminal backgrounds.
False
The largest known cybercrime of record is the TRW Company Credit Data Case.
False
There were less than 200 documented cases of cybercrime at the time the textbook was written.
False
Today's accountants have no responsibility for designing or implementing control procedures that protect AISs from cybercrime and fraud.
False
We believe that most cybercrime is not discovered.
True
When organizations discover a cybercrime, the cost of auditing and investigating the loss often exceeds the actual monetary loss.
True
Worm programs are viruses that insert themselves into computer systems and disrupt operations or files.
True
Dial-back systems help control unauthorized access to computer systems.
True
Forensic accountants are to accounting as detectives are to criminal justice.
True
One reason why computer crime is important to AISs is because, according to a Computer Security Institute survey, the average cost of a computer-abuse incident is about $500,000.
True
The TRW Company Credit Data Case is an example of "valuable information" cybercrime.
True
The U. S. Congress passed the first federal computer crime law in 1986 making it illegal to alter or destroy federal information.
True
The absence of good statistics on cybercrime is partially explained by the fact that a large proportion of the cybercrime committed in private organizations is handled as an internal matter and thus is never publicly divulged.
True
There is no complete, generally accepted definition of cybercrime presently available.
True
A computer virus may lie dormant in a system until software is copied and run on non licensed machines.
True
A conflict exists between providing bona fide AIS users easy access to computer resources and security objectives.
True
A paradoxical matter in the TRW Case was that the prosecution had trouble acquiring testimonies because the buyers as well as the sellers of the credit information were in technical violation of the law.
True
According to a recent CSI survey, the most common problem encountered by the respondents is viruses.
True
Automated accounting information systems are a particularly important potential target of cybercrime
True