Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
A part of a program that remains idle until a specified date or event activates it to cause havoc is called a
(Multiple Choice)
4.8/5
(32)
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
(Multiple Choice)
4.8/5
(39)
Using special software to bypass system controls and perform illegal acts is called
(Multiple Choice)
4.9/5
(48)
Maureen Boyd was arrested in Kansas City for running an online business that specialized in buying and reselling stolen credit card information.Maureen was charged with
(Multiple Choice)
4.9/5
(41)
A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
(Multiple Choice)
4.8/5
(38)
The unauthorized access to,or use of,a computer system is known as
(Multiple Choice)
4.9/5
(39)
A wireless network with the same name as another wireless access point is referred to as
(Multiple Choice)
4.8/5
(45)
Recall that students used Facebook and VKontakte to identify Russian money laundering mules.What fraud case did these students help foil?
(Multiple Choice)
4.8/5
(35)
Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down Berryhill's website unless Ashley wired payment to an overseas account.Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down,so she wired money to the appropriate account.The author of the e-mail successfully committed
(Multiple Choice)
4.9/5
(44)
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
(Multiple Choice)
4.8/5
(28)
Acting under false pretenses to gain confidential information is called
(Multiple Choice)
4.7/5
(39)
Terrorists often use ________ because it is an effective way to transmit information and receive orders.
(Multiple Choice)
4.9/5
(30)
Individuals who create new viruses,spyware,and Trojan horses that are used to infect computers are referred to as
(Multiple Choice)
4.9/5
(35)
Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
(Multiple Choice)
4.9/5
(41)
Showing 81 - 96 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)