ACC 564 Course Great Wisdom / tutorialrank.com ACC 564 Course Great Wisdom / tutorialrank.com | Page 29
www.tutorialrank.com
ACC 564 Week 5 Quiz 2
Question 1
Illegally obtaining and using confidential information about a
person for economic gain is known as
Question 2
The deceptive method by which a perpetrator gains access to
the system by pretending to be an authorized user is called
Question 3
Developers of computer systems often include a user name
and password that is hidden in the system, just in case they need to get
into the system and correct problems in the future. This is referred to
as a
Question 4
A fraud technique that allows a perpetrator to bypass normal
system controls and enter a secured system is called
Question 5
When a computer criminal gains access to a system by
searching records or the trash of the target company, this is referred to
as
Question 6
Generally in a risk assessment process, the first step is to