COMPUTER FRAUD AND ABUSE TECHNIQUES EXAM QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS. CHAPTER 6
6 views 0 purchase
Course
Computer Science
Institution
Computer Science
Address Resolution Protocol (ARP) Spoofing - Answers Sending fake ARP messages to an Ethernet LAN. ARP is a computer networking protocol for determining a network host's hardware address when only its IP or network address is known.
Adware - Answers Spyware that collects and forwards data to adver...
COMPUTER FRAUD AND ABUSE TECHNIQUES EXAM QUESTIONS AND ANSWERS WITH COMPLETE
SOLUTIONS. CHAPTER 6
Address Resolution Protocol (ARP) Spoofing - Answers Sending fake ARP messages to an Ethernet LAN.
ARP is a computer networking protocol for determining a network host's hardware address when only
its IP or network address is known.
Adware - Answers Spyware that collects and forwards data to advertising companies or causes banner
ads to pop-up as the Internet is surfed.
Bluebugging - Answers Taking control of a phone to make calls, send text messages, listen to calls or
read text messages.
Bluesnarfing - Answers Stealing contact lists, images, and other data using Bluetooth.
Botnet, bot herders - Answers A network of hijacked computers. Bot herders use the hijacked
computers, called zombies, in a variety of attacks.
Buffer Overflow Attack - Answers Inputting so much data that the input buffer overflows.
Caller ID Spoofing - Answers Displaying an incorrect number on the recipient's caller ID display to hide
the identity of the caller.
Chipping - Answers Planting a chip that records transaction data in a legitimate credit card reader.
Click Fraud - Answers Manipulating the number of times an ad is clicked on to inflate advertising bills.
Cross-Site Scripting (XSS) Attack - Answers Exploits web page security vulnerabilities to bypass browser
security mechanisms and create a malicious link that injects unwanted code into a website.
Cyber-Bullying - Answers Using computer technology to harm another person.
Cyber-Extortion - Answers Requiring a company to pay money to keep an extortionist from harming a
computer or a person.
Data Diddling - Answers Changing data before or during entry into a computer system to delete, alter,
add or incorrectly update data.
Data Leakage - Answers Unauthorized copying of company data.
Denial-Of-Service Attack - Answers An attack designed to make computer resources unavailable to its
users. For example, so many e-mail messages that the Internet service provider's e-mail server is
overloaded and shuts down.
Dictionary Attack - Answers Using software to guess company addresses, send employees blank e-mails,
and add unreturned messages to spammer e-mail lists.
, DNS Spoofing - Answers Sniffing the ID of a Domain Name System (server that converts a website name
to an IP address) request ad replying before the real DNS server.
Eavesdropping - Answers Listening to private voice or data transmissions.
Economic Espionage - Answers The theft of information, trade secrets, and intellectual property.
E-Mail Spoofing - Answers Making a sender address and other parts of an e-mail header appear as
though the e-mail originated from a different source.
E-Mail Threats - Answers Sending a threatening message asking recipients to do something that makes it
possible to defraud them.
Evil Twin - Answers A wireless network with the same name as another wireless access point. Users
unknowingly connect to the evil twin; hackers monitor the traffic looking for useful information.
Hacking - Answers Unauthorized access, modification, or use of an electronic device or some element of
a computer.
Hijacking - Answers Gaining control of someone else's computer for illicit activities.
Identity Theft - Answers Assuming someone's identity by illegally obtaining confidential information such
as Social Security number.
Internet Auction Fraud - Answers Using an internet auction site to commit fraud.
Internet Misinformation - Answers Using the Internet to spread false or misleading information.
Internet Terrorism - Answers Using the Internet to disrupt communications and e-commerce.
Internet Pump-and-Dump Fraud - Answers Using the Internet to pump up the price of a stock and then
sell it.
IP Address Spoofing - Answers Creating IP packets with a forged IP address to hide the sender's identity
or to impersonate another computer system.
Keylogger - Answers Using spyware to record a user's keystrokes.
Lebanese Looping - Answers Inserting a sleeve into an ATM so that it will not eject the victim's card,
pretending to help the victim as a means of obtaining his PIN, and using the card and PIN to drain the
account.
MAC Address - Answers A Media Access Control address is a hardware address that uniquely identifies
each node on a network.
Malware - Answers Software that is used to do harm.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TutorJosh. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.29. You're not tied to anything after your purchase.