Exam 12: Business Ethics, Fraud, and Fraud Detection
Exam 1: Auditing and Internal Control100 Questions
Exam 2: Auditing IT Governance Controls91 Questions
Exam 3: Auditing Operating Systems and Networks105 Questions
Exam 4: Auditing Database Systems100 Questions
Exam 5: Systems Development and Program Change Activities94 Questions
Exam 6: Transaction Processing and Financial Reporting Systems Overview98 Questions
Exam 7: Computer Assisted Audit Tools and Techniques82 Questions
Exam 8: Data Structures and Caatts for Data Extraction81 Questions
Exam 9: Auditing the Revenue Cycle97 Questions
Exam 10: Auditing the Expenditure Cycle100 Questions
Exam 11: Enterprise Resource Planning Systems90 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection84 Questions
Select questions type
Skimming involves stealing cash from an organization after it is recorded on the organization's books and records
(True/False)
4.9/5
(43)
What are the risk factors that relate to fraudulent financial reporting? What types of common schemes should auditors look for?
(Essay)
4.7/5
(29)
Para computer ethics is the exposure to stories and reports found in the popular media regarding the good or bad ramifications of computer technology.
(True/False)
4.9/5
(36)
Computer fraud can take on many forms, including each of the following except
(Multiple Choice)
4.8/5
(28)
What fraud scheme is similar to the "borrowing from Peter to pay Paul" scheme?
(Multiple Choice)
4.8/5
(44)
The trend toward distributed data processing increases the exposure to fraud from remote locations.
(True/False)
5.0/5
(34)
Situational pressure includes personal or job related stresses that could coerce an individual to act dishonestly.
(True/False)
4.9/5
(43)
How does the auditor's judgements about the risk of material misstatements affect the audit?
(Essay)
4.9/5
(38)
Cash larceny involves stealing cash from an organization before it is recorded on the organization's books and records.
(True/False)
4.8/5
(45)
What are some conclusions to be drawn from the ACFE fraud study regarding losses from fraud?
(Essay)
4.9/5
(31)
The most common access point for perpetrating computer fraud is at the data collection stage.
(True/False)
4.9/5
(34)
Give two examples of employee fraud and explain how the theft might occur.
(Essay)
4.8/5
(33)
Which ethical principle states that the benefit from a decision must outweigh the risks, and that there is no alternative decision that provides the same or greater benefit with less risk?
(Multiple Choice)
4.9/5
(42)
Why are the computer ethics issues of privacy, security, and property ownership of interest to accountants?
(Essay)
4.8/5
(44)
The fraud triangle represents a geographic area in Southeast Asia where international fraud is prevalent.
(True/False)
4.9/5
(39)
Showing 61 - 80 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)