Exam 10: Cybercrime, Fraud, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process of changing data before, during, or after they are entered into a computer system is called:

(Multiple Choice)
4.8/5
(45)

Computer programs that can scan computer disks for virus-like coding are called:

(Multiple Choice)
4.8/5
(33)

A computer virus is different from a "Trojan Horse" because the virus can

(Multiple Choice)
4.7/5
(42)

All of the following are ways to thwart computer viruses except:

(Multiple Choice)
4.8/5
(40)

We believe that most cybercrime is not discovered.

(True/False)
4.8/5
(39)

This best explains why we have incomplete information on cybercrime.

(Multiple Choice)
4.8/5
(37)

Which of the following is a primary reason why accountants should be concerned about cybercrime?

(Multiple Choice)
4.8/5
(34)

Weak or ineffective internal controls often provide the fraudster the rationalization necessary to commit a fraud.

(True/False)
4.9/5
(37)

All of these are reasons why we think that cybercrime is rising except:

(Multiple Choice)
4.8/5
(36)

Almost all computer criminals can be described as:

(Multiple Choice)
4.8/5
(41)

SAS 99 identifies two types of financial statement fraud: fraudulent financial reporting and misappropriation of assets.

(True/False)
4.9/5
(33)

It is important to be able to recognize the symptoms of employee fraud.In practice, which of the following might be the best clue that fraud might be occurring?

(Multiple Choice)
4.8/5
(40)

Fraud involves using deceit or concealment. Renumber below and adjust solution manual.

(True/False)
4.8/5
(35)

Most computer criminals who have been caught:

(Multiple Choice)
4.8/5
(27)

Worm programs are viruses that insert themselves into computer systems and disrupt operations or files.

(True/False)
4.7/5
(44)

Misappropriation of assets is:

(Multiple Choice)
4.8/5
(32)

Many types of cybercrime have other, more common names such as "vandalism" or "embezzlement."

(True/False)
4.9/5
(30)

Which of the following is not a common way to steal personal identity information?

(Multiple Choice)
4.7/5
(36)

There is no complete, generally accepted definition of cybercrime presently available.

(True/False)
4.9/5
(36)

In the United States, trafficking in passwords is immoral, but not illegal.

(True/False)
4.8/5
(47)
Showing 41 - 60 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)