Exam 5: Computer Fraud
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
The fraud that requires the least computer knowledge or skill involves
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
A
Lauren wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months' rent up front.Lauren approaches a good friend,Jamie,to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business.After a lengthy discussion,Jamie agrees to invest.Eight months later,Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation.In order for Jamie to sue Lauren for fraud,all the following must be true except
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
Describe four ways companies can reduce losses from fraud.
Free
(Essay)
4.8/5
(33)
Correct Answer:
Maintain adequate insurance.Keep a current backup copy of all program and data files in a secure off-site location.Develop a contingency plan for fraud occurrences and other disasters that might occur.Use special software designed to monitor system activity and help companies recover from frauds and malicious actions.
A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection.
Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.
(Essay)
4.8/5
(45)
Which of the following fraudulent acts generally takes most time and effort?
(Multiple Choice)
4.9/5
(38)
A 16 year old hacker was able to access the systems of U.S.Missile Command and accidently launched a small nuclear missile,which fortunately,failed to detonate.
(True/False)
4.8/5
(40)
What is the most prevalent opportunity within most companies to commit fraud?
(Multiple Choice)
4.8/5
(28)
This component of the fraud triangle explains the incentive or motivation for someone to commit fraud.
(Multiple Choice)
4.8/5
(40)
Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?
(Multiple Choice)
4.9/5
(36)
What are some of the distinguishing characteristics of fraud perpetrators?
(Essay)
4.7/5
(40)
The two most common types of fraud impacting financial statements are
(Multiple Choice)
5.0/5
(33)
Why is computer fraud often much more difficult to detect than other types of fraud?
(Multiple Choice)
4.9/5
(39)
Which of the following is a financial pressure that could cause an employee to commit fraud?
(Multiple Choice)
4.7/5
(47)
Misappropriation of assets is a fraudulent act that involves
(Multiple Choice)
4.9/5
(41)
Why is computer fraud often more difficult to detect than other types of fraud?
(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 83
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)