Chapter 03 True/False Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Lockout systems disconnect telephone connections if users fail to provide a correct password in a set number of tries.

True

Many types of cybercrime have other, more common names such as "vandalism" or "embezzlement.

True

No one really knows how much is lost each year as the result of cybercrime.

True

One conclusion that we can draw about cybercrime is that it is growing.

True

Watching for tell-tale signs may help detect computer crime.

True

A "strong password" is a password that lasts a long time.

False

According to a KPMG survey, companies that stress the importance of business ethics tend to get about the same results as companies that do not stress its importance.

False

According to the chapter, a computer virus is an example of a type of cybercrime called "denial of service.

False

Cybercrime is another name for computer fraud.

False

Experts suggest that policies on computer abuse are ineffective, and therefore should not be used to help educate employees about computer abuse.

False

Fortunately, thwarting most forms of cybercrime does not require the support of top management.

False

In the United States, trafficking in passwords is immoral, but not illegal.

False

It is generally accepted that hackers are motivated only by greed.

False

Most computer abuse that we have caught so far has been because of good accounting controls.

False

Most computer criminals are individuals of questionable background, little education, and no morals.

False

Most computer criminals we have been fortunate enough to catch have had long, criminal backgrounds.

False

The largest known cybercrime of record is the TRW Company Credit Data Case.

False

There were less than 200 documented cases of cybercrime at the time the textbook was written.

False

Today's accountants have no responsibility for designing or implementing control procedures that protect AISs from cybercrime and fraud.

False

We believe that most cybercrime is not discovered.

True

When organizations discover a cybercrime, the cost of auditing and investigating the loss often exceeds the actual monetary loss.

True

Worm programs are viruses that insert themselves into computer systems and disrupt operations or files.

True

Dial-back systems help control unauthorized access to computer systems.

True

Forensic accountants are to accounting as detectives are to criminal justice.

True

One reason why computer crime is important to AISs is because, according to a Computer Security Institute survey, the average cost of a computer-abuse incident is about $500,000.

True

The TRW Company Credit Data Case is an example of "valuable information" cybercrime.

True

The U. S. Congress passed the first federal computer crime law in 1986 making it illegal to alter or destroy federal information.

True

The absence of good statistics on cybercrime is partially explained by the fact that a large proportion of the cybercrime committed in private organizations is handled as an internal matter and thus is never publicly divulged.

True

There is no complete, generally accepted definition of cybercrime presently available.

True

A computer virus may lie dormant in a system until software is copied and run on non licensed machines.

True

A conflict exists between providing bona fide AIS users easy access to computer resources and security objectives.

True

A paradoxical matter in the TRW Case was that the prosecution had trouble acquiring testimonies because the buyers as well as the sellers of the credit information were in technical violation of the law.

True

According to a recent CSI survey, the most common problem encountered by the respondents is viruses.

True

Automated accounting information systems are a particularly important potential target of cybercrime

True


Set pelajaran terkait

Quantitative Analysis-WTAMU-1st-Midterm

View Set

NTRS410 Physical aspects of food preparation

View Set

Operations Management Final Exam

View Set

380 EXAM 3 ATI INFECTION STUDY GUIDE

View Set

Chapter 41: Disorders of Endocrine Control of Growth and Metabolism - MLQ

View Set

Chapter 3: Health, Wellness, and Health Disparities

View Set

LearningCurve Module 13. Developmental Issues, Prenatal Development, and the Newborn

View Set

Chapter 52: Introduction to the Reproductive System

View Set

Ch 58: Professional Roles and Leadership

View Set