a. System-motivated
b. Greed-motivated
c. Technology-motivated
d. Situation-motivated
System-motivated and technology-motivated actions are suitable for a career criminal, not for a white-collar criminal. Greed-motivated is the underlying and lower-level need for all criminals whether it is white-collar, blue-collar, or career criminals, but situation-motivated is a higher-level need suitable to the white-collar criminals.
56. Which of the following is a key to a successful computer crime?
a. System complexity
b. System users
c. Human skills
d. System predictability
57. Computer crimes can be minimized with which of the following situations?
a. Static controls and variable features
b. Dynamic controls and variable features
c. Static controls and static features
d. Dynamic controls and static features
58. Which of the following should be subject to confidentiality controls?
a. Copyrights
b. Patents
c. Trade secrets
d. Trademarks
59. A person threatening another person through electronic mail is related to which of the following computer-security incident types?
a. Denial-of-service
b. Malicious code
c. Unauthorized access
d. Inappropriate usage
A denial-of-service (DoS) attack prevents or impairs the authorized use of networks, systems, or applications by exhausting resources. Malicious code includes a virus, worm, Trojan horse, or other code-based malicious entity that infects a host. Unauthorized access is where a person gains logical or physical access without permission to a network, operating system, application system, data, or device.
60. A compliance auditor’s working papers should:
a. Provide the principal support for the auditor’s report
b. Not contain critical comments about information security management
c. Not contain IT management’s comments and concerns
d. Be considered a substitute for computer system logs and reports
61. Which of the following produces the best results when data is recent; although, it is less comprehensive in identifying infected hosts?
a. Forensic identification
b. Active identification
c. Manual identification
d. Multiple identification
62. Which of the following is preferred when other methods are insufficient in identifying infected hosts?
a. Forensic identification
b. Active identification
c. Manual identification