Acc574 Forensics Accounting Week 5 : Cybercrime - Homework ES

Acc574 Forensics Accounting
Week 5 : Cybercrime - Homework ES

1. (TCO E) What are the dates found on an electronic file? (Points : 2)
Deletion date
Expiration date
Modified date
Cached date

2. (TCO E) Forensic digital investigative skills include all of the following except: (Points : 2)
Reading time stamps.

3. (TCO E) Actually "deleting" data from a hard drive means: (Points : 2)
Clicking on the file containing the data and then clicking on the delete key.
Using a commercial software program to delete all the data.
Melting the plastic disk in the hard drive.
Physically damaging the plastic disk in the hard drive.

4. (TCO E) For forensic accountants, it is important to understand the Internet's protocols so that they: (Points : 2)
Can write code to collect courtroom evidence.
Can hire a professional to handle the problem.
Understand electronic courtroom procedures.
Understand the nature of a cyber attack.
All of the above.

5. (TCO E) Message integrity in the OSI Model used in TCP/IP is performed by the: (Points : 2)
Data link layer.
Transportation layer.
Network layer.
Application layer.
None of the above.

6. (TCO E) The time information found in an e-mail header is based on: (Points : 2)
Eastern Standard Time.
Greenwich Mean Time.
International Time Standard.
Internet Mean Time.
None of the above.

7. (TCO E) Currently, which of the following would be the most difficult to identify through an Internet search? (Points : 2)
An individual social security number
The path of a packet over the Internet
The birth date for a person
The individual who sent an e-mail message through two remailers

8. (TCO E) Hacking a website requires initial access. In what order would the following steps be taken to gain access to a website?
1.) Compile the exploit.
2.) Download the exploit.
3.) Run a web bug against the web site.
4.) Stealth scan.
5.) Go to a hacker site. (Points : 2)
1, 2, 3, 4, and 5
3, 4, 5, 2, and 1
4, 5, 2, 1, and 3
5, 2, 1, 4, and 3

9. (TCO E) Which of the following activities is most likely to be a cybercrime? (Points : 2)
Stealing my electronic impulse
Having a virtual presence in someone's Web server
Accessing the mail port on someone's Web server
Using a bot to check a website for price information
None of the above

10. (TCO E) When a cybercriminal uses hundreds of linked zombie computers to carry out a fraud, the linked computers are called a: (Points : 2)
Zombie line.
Bot herd.
Powered by