Академический Документы
Профессиональный Документы
Культура Документы
Total Marks: 100 Time Allowed: 1 Hour 40 Mins (i.e. 100 mins)
GENERAL INSTRUCTIONS
(1×100)
4 Which of the following refers to a business platform, involving a business entity and
consumers?
A. Business-to-consumer (B2C)
B. Business-to-business (B2B)
C. Consumer-to-business (C2B)
D. Consumer-to-consumer (C2C)
5 ____________________ is a generic term which refers to all the legal and regulator aspects of
Internet and the World Wide Web
A. Cyber Law
B. Cyber Dyne
C. Cyber Café
D. Electronic Law
7 Which among the following are the three payroll fraud schemes
i) Ghost employees ii) Temporary employees
iii) Falsified overtime iv) Commission
A. i , ii & iii
B. i , iii & iv
C. ii , iii & iv
D. i , ii & iv
10 Which Standard on Auditing among the following describes the importance of red
flags:
A. SA 240
B. SA 210
C. SA 250
D. SA 260
11 Weak internal controls in an organization will affect which of the following elements
of fraud?
A. Motive
B. Opportunity
C. Rationalization
D. None of the above
12 The most popular software forensic tools include all of the following except:
A. Forensics Autopsy
B. QUICKEN
C. Forensics Toolkit
D. SMART
19 Three conditions are necessary for a fraud to occur. These three conditions are:
A. need, dissatisfaction, and challenge
B. pressure, opportunity, and rationalization
C. no separation of duties, need, and no independent performance checks
D. challenge, motivation, and failure to enforce internal controls
20 Which section of IT Act covers most of the common crimes arising out of “Unauthorised
Access”
A. Section 66
B. Section 67
C. Section 73
D. Section 74
21 The imaginary location where the word of the parties meets in conversation is referred
to as ________________.
A. Cyberspace
B. Space
C. Cyberdyne
D. Cybernet
22 Which of the following is not a method for stealing sales and receivables but a way of
using skimmed money
A. lon term skimming
B. short term skimming
C. Understated sales
D. Unrecorded sales
34 Hashing, filtering and file header analysis make up which function of digital forensics
tools?
A. Validation and Verification
B. Acquisition
C. Extraction
D. Reconstruction
40 If a company wishes to improve detection methods, they should do all of the following
except:
A. use forensic accountants
B. conduct frequent audits
C. encrypt data
D. all of the above improve detection of fraud
41 In order for an act to be legally considered fraud it must be all of the following except:
A. A material fact
B. An injury or loss suffered by the victim
C. A false statement
D. No intend to deceive
42 According to the opportunity part of the fraud triangle, a person may do all of the
following acts except:
A. Convert the theft or misrepresentation for personal gain
B. Control the fraud
C. Commit the fraud
D. Conceal the fraud
43 The World‟s first computer-specific statute was enacted in 1970, by the German state,
in the form of a ___________________ .
A. Data Protection Act.
B. Cyber Law
C. Copy right
D. Patent right.
46 Jackson is a receiving clerk at a warehouse. His job is to count the number of units in
incoming shipments, record the figures in receiving reports, and forward copies of the
reports to the accounts payable department. One day, Jackson received a box of 20
laptop computers at the warehouse. His wife's computer just broke, so he stole one of
the computers from the box. To conceal his scheme, Jackson sent a receiving report to
accounts payable that 20 computers arrived, but he only recorded 19 on the copy of the
receiving report used for the inventory records. What type of scheme did Jackson
commit?
A. An asset transfer scheme
B. A purchasing and receiving scheme
C. A non-cash larceny scheme
D. None of the above
48 . On recent Windows installations, the standard location for storing critical system files
is ________.
A. C:/Program Files/
B. C:/System/
C. C:/Important/
D. C:/Windows/
51 . What is a “Hacktivist”?
A) Politically motivated hacker
B) Denial of service attacker
C) A proponent of Napster
D) A person engaging in an intentional act involving a computer in which
the person may have gained at the victim’s expense
52 . Which of the following individuals developed one of the first systems to define
computer crimes in 1976?
A) David Carter
B) Donn Parker
C) Jay Nelson
D) Robert Taylor
54 Employee life style changes (expensive car, jewelry) will come under which component
of Fraud Triangle?
A. Opportunity
B. Pressure
C. Rationality
D. Can’t Say
55 Employee’s significant personal debt & credit problems will come under which
component of Fraud Triangle?
A. Opportunity
B. Pressure
C. Rationality
D. Can’t Say
56 Employee’s behavioral changes (alcohol, gambling) will come under which component
of Fraud Triangle?
A. Opportunity
B. Pressure
C. Rationality
D. Can’t Say
57 Acquisition to ISO standard 27037, which of the following is an important factor in data
acquisition?
A. The DEFR’s Competency
B. The DEFR’s skills in using the command lines
C. Use of validated tools
D. Condition at the acquisition setting
59 ___ is the set of instructions compiled into a program that performs a particular task.
A. Software
B. Hardware
C. OS
D. None of the above
63 Which of the following pressures are classified as Management Characteristics that can
lead to financial statement fraud?
A. High management and/or employee turnover
B. Declining industry
C. New regulatory requirements that impair financial stability or
profitability
D. Intense pressure to meet or exceed earnings expectations
65 Overstating revenues and understating liabilities and expenses typifies which of the
following fraud schemes?
A. Unconcealed larceny
B. Purchase and sales Skimming
C. Fraudulent statements
D. Schemes
66 Which of the following is issued online for use over the Internet and is stored in an
electronic device such as a chip card or computer memory?
A. Hard Cash
B. Business Card
C. E-Cash
D. E- Card
67 With a view to facilitate ___________________, it is proposed to provide for the use and
acceptance of electronic records and digital signatures in the Govt. Offices and its
agencies.
A. Electronic Governance
B. Paper Governance.
C. Oral Testimony.
D. Mechanical Governance.
68 Data, record or data generated image or sound stored, received or sent in an electronic
form or micro film or computer generated micro fiche as per the [Sec., 2(t) of I.T. Act,
2000] means ______________________
A. Electronic Document.
B. Electronic Record
C. Hard Record
D. Hard Document.
A. Warehouse personal
B. Purchasing agents
C. Purchasing supervisor
D. A sales representative
70 Which of the following fraudulent entries is most likely to be made to conceal the theft
of an asset?
72 Using metadata, forensics investigators can ________. (Select the three that apply)
A. search for files that were created at a specific time
B. filter files that do not contain evidence
C. filter files by size
D. search for file names that match patterns
73 On Linux and UNIX, the /home directory structure is the standard location for storing
________.
A. user installed applications
B. data specific to users
C. critical system files
D. temporarily deleted data
76 11. Which of the following is a computer crime that deprives the legitimate owner of a
tangible asset?
A. Hacking
B. Money laundering
C. Manipulating the price of a stock
D. Salami slice
77 12. Which of the following is not a similarity between real-world stalking and cyber
stalking?
A) Most victims are women.
B) Most stalkers are men.
C) The stalker and victim are near to each other.
D) Stalkers are generally motivated by the desire to control the victim.
78 High Employee turnover especially in areas vulnerable to fraud will come under which
component of Fraud Triangle?
A. Opportunity
B. Pressure
C. Rationality
D. Can’t Say
79 Refusal to take sick leave by employees will come under which component of Fraud
Triangle?
A. Opportunity
B. Pressure
C. Rationality
D. Can’t Say
80 Lack of segregation of duties in vulnerable area will come under which component of
Fraud Triangle?
A. Opportunity
B. Pressure
C. Rationality
D. Can’t Say
81 The type of forensics that involves examining malicious software
a) Software forensics
b) Hardware forensics
c) Network forensics
d) Digital forensics
82 FTK's Known File Filter (KFF) can be used for which of the following purposes?
I. Filter known program files from view
II. Calculate hash values of known files to evidence files.
III. Filter out evidence that doesn't relate to your investigation.
Options :
A. I and ii
B. Ii and iii
C. I and iii
D. All of above
83 Many password recovery tools have a feature for generating potential password lists
for a(n) ____ attack.
A. Password Dictionary
B. Brute Force Attack
C. Key Logger Attack
89 A system of checks and balances between management and all other interested parties
with the aim of producing an effective, efficient, and law-abiding corporation is known
as:
A. Corporate governance
B. Code of conduct
C. Transparency
D. Culture of compliance
90 The _________________ provides for authentication of a document by means of digital
signatures under Article 7.
A. E-Commerce
B. Model Law
C. E-Law
D. Dynamic Law.
91 According the IT act 2000, _______________ means a person who is intended by the
originator to receive the electronic record but does not include any intermediary.
A. “Address”
B. “Affixing Digital Signature”
C. “Computer Resource”
D. "Data"
92 Section 301 of the SOX requires that the auditor should report directly to ______.
A. Management
B. Government
C. Audit committee
D. Stakeholders/ Owners/Investors
93 Data is organized as files mostly because ________. (Choose the best answer)
A. computers cannot store very large files
B. it is easier for the computer to store many smaller chunks of data than it is to
store one large chunk of data
C. it is easier for people to store many smaller chunks of data than it is to store
one large chunk of data
D. people need to store their data with labels to make retrieval easier
94 13. Which of the following crimes may be facilitated by the use of a computer?
A. Loan-sharking
B. Drug rings
C. Prostitution rings
D. All of the above
95 Weakness in internal control environment will lead which kind of fraud-
A. Employee Red Flag
B. Management Red Flag
C. General Red Flag
D. None of above
98 Which two of the following answers do NOT describe the responsibility of the
memory manager?
A. Selecting which process to run
B. Allocating memory to processes
C. Swapping memory from RAM to Disk
D. Formatting newly allocated memory
100 Which of the following crimes is done using a computer as the instrument?
A) Computer manipulation
B) Money laundering
C) Data alteration
D) Theft of services