a.
System-motivatedb.
Greed-motivatedc.
Technology-motivatedd.
Situation-motivatedSystem-motivated and technology-motivated actions are suitable for a career criminal, not for a white-collar criminal. Greed-motivated is the underlying and lower-level need for all criminals whether it is white-collar, blue-collar, or career criminals, but situation-motivated is a higher-level need suitable to the white-collar criminals.
56. Which of the following is a key to a successful computer crime?
a.
System complexityb.
System usersc.
Human skillsd.
System predictability57. Computer crimes can be minimized with which of the following situations?
a.
Static controls and variable featuresb.
Dynamic controls and variable featuresc.
Static controls and static featuresd.
Dynamic controls and static features58. Which of the following should be subject to confidentiality controls?
a.
Copyrightsb.
Patentsc.
Trade secretsd.
Trademarks59. A person threatening another person through electronic mail is related to which of the following computer-security incident types?
a.
Denial-of-serviceb.
Malicious codec.
Unauthorized accessd.
Inappropriate usageA denial-of-service (DoS) attack prevents or impairs the authorized use of networks, systems, or applications by exhausting resources. Malicious code includes a virus, worm, Trojan horse, or other code-based malicious entity that infects a host. Unauthorized access is where a person gains logical or physical access without permission to a network, operating system, application system, data, or device.
60. A compliance auditor’s working papers should:
a.
Provide the principal support for the auditor’s reportb.
Not contain critical comments about information security managementc.
Not contain IT management’s comments and concernsd.
Be considered a substitute for computer system logs and reports61. Which of the following produces the best results when data is recent; although, it is less comprehensive in identifying infected hosts?
a.
Forensic identificationb.
Active identificationc.
Manual identificationd.
Multiple identification62. Which of the following is preferred when other methods are insufficient in identifying infected hosts?
a.
Forensic identificationb.
Active identificationc.
Manual identification