You are on page 1of 5

NorlizaOmar|UiTMPuncakAlam

AIS615 -TUTORIAL QUESTIONS


Chapter 8 & 9

Part A: Multiple Choice Questions

Choose the best answer.

1. A cybercriminal altered a company's voicemail greeting to falsely announce that they are
giving away free products. Customers are instructed to dial a different phone number to
claim their gifts.
What is the specific type of cybercrime that the hacker in this scenario is engaged in?

A) Phreaking.
B) Hacking.
C) Diddling.
D) Phishing.

2. Taking control of someone's computer without their awareness and using it for
unauthorized activities is commonly referred to as:

A) Spamming.
B) Posing.
C) Hacking.
D) Hijacking.

3. The term for sending an unsolicited message to a large group of individuals


simultaneously

A) hacking.
B) spamming.
C) posing.
D) hijacking.

4. Unauthorized access, modification, or use of an electronic device or some element of a


computer system is known as

A) hacking.
B) spamming.
C) posing.
D) hijacking.

5. Which of the following is an activity that is not typically employed as a method of identity
theft?

A) Scavenging
B) Phishing
C) Shoulder surfing
D) Phreaking

6. What is the term for using a small device with storage capacity (iPod, Flash drive) to
download unauthorized data from a computer?

A) masquerading.
B) bluebugging.
C) podslurping.
NorlizaOmar|UiTMPuncakAlam

D) eavesdropping.
7. Shaz, a high school student, was relentlessly targeted by her classmate Alex, who
engaged in cyber-bullying through a variety of online means. Alex sent hurtful messages
containing offensive language and false rumors about Shaz through Twitter and TikTok. He
also created fake social media profiles impersonating Shaz to tarnish her reputation. The
relentless online harassment left Shaz feeling anxious and depressed.
This is an example of:-

A) pharming.
B) cyber-bullying.
C) hacking.
D) vishing.

8. Lailer maintains an online brokerage account. In early March, Lailer received an email
from the firm explaining that there had been a computer error and asking Lailer to call a
phone number to verify their customer information. When Lailer called the number, a
recording asked for the code from the email, their account number, and their social security
number. After providing this information, they were told they would be connected with a
customer service representative, but the call was abruptly terminated. Upon reaching out to
the brokerage company, Lailer was informed that they had not sent the email. Lailer was a
victim of:

A) Bluesnarfing.
B) Vishing.
C) Skimming.
D) Typosquatting.

9. Premila decided to do some Deepavali shopping online. She visited Amazon.com, found a
perfect gift for her daughter, and placed his order. It was only later when she realised that the
website's URL she had used to place the order was actually Amazom.com and not
Amazon.com. Kheng Jin was a victim of:

A) Posing.
B) Bluesnarfing
C) Typosquatting.
D) Vishing.

10. On a Friday evening, you use a bar's ATM to withdraw RM200 from your bank account.
However, as you complete your withdrawal, your card gets jammed in the ATM machine.
The person waiting in line behind you offers to help and suggests re-entering your PIN
number. Despite doing so, your card remains stuck. You leave the bar to call your bank and
report the incident. However, after you left, the person who offered assistance removed a
sleeve he inserted in the ATM to jam your card. He now has your ATM card and PIN number.
You have just fallen victim to a ________ fraud.

A) spoofing
B) Lebanese looping
C) phishing
D) pharming
NorlizaOmar|UiTMPuncakAlam

11. Scandutch, a telemarketing firm operating in Shah Alam, has been facing a high turnover
rate among its employees. Recently, the information technology manager discovered that an
unknown employee had used a Bluetooth-enabled mobile phone to access the firm's
database and copied a list of customers from the past three years along with their credit card
information. Scandutch was a victim of:

A) Bluesnarfing.
B) Podslurping.
C) Vishing.
D) Bluetoothing.

Part B: Structured Questions

Question 1

Ryan was working at Bidara Klasik & Associates, an architecture firm for the past five years.
As time goes by, he became increasingly dissatisfied due to a lack of recognition for his
innovative designs and contributions to projects. Frustrated and feeling undervalued, he
decided to leave the company and accepted a position at a competing architecture firm in a
nearby city. Not long after the departure, Bidara Klasik noticed similarities between their
unique architectural designs and those being showcased by the rival firm. A comprehensive
investigation revealed that their former employee, Ryan still has access to the firm's design
database, and he had been consistently accessing and referencing the company's
proprietary architectural plans and concepts.

Required:

a. Briefly explain the type of fraudulent activity that occurred in this case within the context of
an architecture firm.
(2 marks)

b. What might have motivated Ryan to engage in such fraudulent behaviour? Offer your
reasoning.
(3 marks)

c. Identify two factors that contributed to the occurrence of this specific type of fraudulent
activity within the architecture firm.
(2 marks)
NorlizaOmar|UiTMPuncakAlam

Question 2

In a bustling auto parts supply store, the finance team has noticed some troubling financial
discrepancies. Customers who have been diligent about paying their bills on time have
started to question their account statements. Some customers report that their payments
have not been properly credited, while others notice strange inconsistencies in their
outstanding balances.

Upon further investigation, it becomes apparent that an employee in the accounts receivable
department has been manipulating payment records. This employee has been intercepting
customer payments and using a complex scheme to cover their tracks. Payments from one
customer are used to offset the accounts of others, creating a cycle that conceals the fraud.

Required:

a. What type of fraud is being committed, and could you explain the opportunities that have
allowed this fraudulent activity to occur within the accounts receivable department?
(3 marks)

Question 3

Sarimah is a cunning individual, strategically manipulates multiple bank accounts across


Selangor. She deposits a check of RM25,000 from ArmsBank into her account at Muafakat
Bank, exploiting the delay in the transaction clearance to access the same amount for seven
days. After two days, she withdraws the money from Muafakat Bank, then deposits another
RM25,000 cheque from MyBank into ArmsBank, ensuring she has funds available in
MyBank for another seven working days. Before the clearance period ends, she withdraws
the money from ArmsBank and swiftly deposits a RM25,000 cheque from Bank CICD into
MyBank, perpetuating her embezzlement scheme.

Required:

Identify the embezzlement scheme employed by Sarimah and propose measures that could
be implemented to make it challenging for individuals to successfully conceal such
fraudulent activities.
(3 marks)
NorlizaOmar|UiTMPuncakAlam

-The End-

You might also like