Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 10MCQ
To determine
Identify the option which is true about the Sniffer software.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Sniffer software isa. used by malicious Web sites to sniff data from cookies stored on the user’s hard drive. b. used by network administrators to analyze net- work traffic. c. used by bus topology intranets to sniff for carriers before transmitting a message to avoid data collisions. d. an illegal program downloaded from the Web to sniff passwords from the encrypted data of Internet customers. e. illegal software for decoding encrypted messages transmitted over a shared intranet channel.
A message that is contrived to appear to be coming from a trusted or authorized source is calleda. a denial of service attack.b. digital signature forging.c. Internet protocol spoofing.d. URL masquerading.e. a SYN-ACK packet.
Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer.
Which of the following statements is (are) true?
a. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data
b. The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud
c. The biggest cause of data breaches is organized by hacker groups.
d. Losses from the theft of physical assets are much greater than those from the electronic theft of data
e. In the absence of controls, it is not hard for a dishonest employee to steal data.
Chapter 12 Solutions
Accounting Information Systems
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 21RQCh. 12 - Prob. 22RQCh. 12 - Prob. 23RQCh. 12 - Prob. 1DQCh. 12 - Prob. 2DQCh. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 8DQCh. 12 - Prob. 9DQCh. 12 - Prob. 10DQCh. 12 - Prob. 11DQCh. 12 - What is a digital envelope?Ch. 12 - Prob. 13DQCh. 12 - Prob. 14DQCh. 12 - Prob. 15DQCh. 12 - Prob. 16DQCh. 12 - Prob. 17DQCh. 12 - Prob. 18DQCh. 12 - Prob. 19DQCh. 12 - Prob. 1MCQCh. 12 - Prob. 2MCQCh. 12 - Prob. 3MCQCh. 12 - Prob. 4MCQCh. 12 - Prob. 5MCQCh. 12 - Prob. 6MCQCh. 12 - Prob. 7MCQCh. 12 - A system of computers that connects the internal...Ch. 12 - Prob. 9MCQCh. 12 - Prob. 10MCQCh. 12 - Prob. 1PCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6PCh. 12 - VIRTUALIZATION Virtualization technology is...Ch. 12 - Prob. 8P
Knowledge Booster
Similar questions
- Which of the following is not a way to prevent your computer from being attacked by ransomware? A. making sure your antivirus security programs are up to date B. opening all attachments from emails from unknown senders C. using secure (password protected) networks and backing up your files regularly D. not using open Wi-Fi (nonpassword, nonencrypted) in public locationsarrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (c) A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.arrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forward
- Which ways do malicious parties use side-channel type attacks to trick users into believing a certificate is issued by a trusted CA, but isn’t?arrow_forward1.A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks. 2.A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program, 3.A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data. 4.A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator. 5.A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant…arrow_forwardWhich of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully capturesarrow_forward
- A program that attaches to another legitimate program but does NOT replicate itself is called a a. virus.b. worm.c. Trojan horse.d. logic bomb.arrow_forwardEncryption a. avoids the need for separation of duties. b. creates firewalls to protect data. c. cannot be broken by hackers. d. rearranges messages by a special process.arrow_forwardSTUDY QUESTIONS Why is human behavior considered one of the biggest potential threats to operating system integrity? What are the issues that need to be considered before implementing keystroke monitoring? Describe the three ways on how an audit trail can be used to support security objectives. Explain how poorly designed audit trail logs can actually be dysfunctional. Why would a systems programmer create a back door if he or she has access to the program in his or her day-to-day tasks? PROBLEMS Problem 1: Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) can be used to help detect this type of fraud? Problem 2: In 2002, Mr. Rollerball started Mighty Mouse,…arrow_forward
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (e)A company’s programming staff wrote custom code for the shopping cart feature on its website. The code contained a vulnerability that could be exploited when the customer typed in the ship-to address.arrow_forwardWhich of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegePkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L