Classic Classic Quiz Crime - 3 by Kdjmorton Kdjmorton 1 played - 12 yrs ago Business Communication and Technology Senior Syllabus 2008 - Queensland Australia Topic 4 -Managing workplace information QUIZ 10 QUESTIONS expert Australia 1 Hacking attacks have very little to do with technology and more to do with the _____________ of the employees operating the systems. PersonalitySecurity awarnessVunerabilitiesWeaknessIntelligence 2 Intentional employee crime is committed by disgruntled employees and can occur _________ and _________ they have left the organization. Now , afterBefore, afterInside, outsideNow, thenAfter, before 3 The penalty for laundering money as a money _______, if convicted can be up to 20 years imprisonment. CriminalFoolHorseMuleLaunderer 4 A _____________ program installs a malicious back-door software program onto the computer. VirusMalwareWormPharmingTrojan-horse 5 Hackers use different ____________ of scam emails to steal information. GroupsCategoriesKindsClassTypes 6 Scam emails include : Malware, fishing, vishing, pharmingMalware, phishing, vishing, farmingMalware, phishing, vishing, pharmingMalware, phishing, fishing, farmingMole recruitment 7 Which phrase belongs to a phishing email scam : Dear valued customerYour account has been vertifiedDo not reply to this emailContact the bank for further assistanceYou have reacheds your credit limit 8 Viruses affect computers by : Causing systems to crash and locking users out of systemCausing systems to crash and data lossDeleting files and locking users out of systemCorrupting hard drives and locking users out of systemCausing data loss and locking users out of system 9 The latest trend for hackers is to use bot-net armies which : Identify and take over vunerable PC, then wait in ambush modeThey send out low volumes of spam emails for phishing scamsThey are rented out as a spy networkIdentify and take over vunerable PC, then send out spam emails for phishing scamsThey deliver a singular threat 10 There are four steps to mule recruitment, which one of these is NOT one of them : Initial communication is via spam email and online chattingMule transfers money out of personal account less commision into overseas bank accountMule transfers money out of personal account into overseas bank accountFraudster convinces mule to work for themMule recieves money into personal account A mistake in this Quiz ? Contact the author Commentaires Sources Sourceswww.wix.com/kdjmorton/securityofsystems