QUESTION 1 : All of the following are correct statements about identity theft EXCEPT: Identity thieves often engage in pretexting by impersonating the victim’s bank. Solicitations for pre-approved credit cards are especially valuable to identity thieves. The type of malware Read More …
Month: August 2022
THEFT OF DATA AND INTELLECTUAL PROPERTY PAST PAPERS WITH ANSWERS
QUESTION 1 : Shredding sensitive documents with a cross-cut shredder, sending and receiving mail at a secure site, and employing a perimeter security system at the office are all measures aimed to do which of the following? Prevent misappropriation of Read More …
KCSE Past Paper 1 Chemistry 2015
CHEMISTRY Paper 1 (THEORY) 1 (a) Give the name of the first member of the alkene homologous series. (1 mark) (b) Describe a chemical test that can be used to distinguish butanol from butanoic acid. (2 marks) 2 (a) Name Read More …
COMPUTER AND INTERNET FRAUD PAST PAPERS WITH ANSWERS
QUESTION 1 : Which of the following is an information security goal that an e-commerce system should endeavor to meet for its users and asset holders? Exactness Access authority Non-repudiation Systems reliability Non-repudiation is an information security goal that an Read More …
CONSUMER FRAUD PAST PAPERS WITH ANSWERS
QUESTION 1 : Real estate scams are easily recognized, as there is almost always an element of time pressure or “now-or-never” pitch from the perpetrator. True False Real estate scams are easily recognized. There is almost always an element of Read More …
CASH RECEIPT SCHEMES PAST PAPERS WITH ANSWERS
QUESTION 1 : Which of the following is an example of an off-book fraud? Cash larceny Skimming Ghost employee schemes Billing schemes Skimming is the removal of cash from a victim entity prior to its entry in an accounting system. Read More …
