Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The fraud that requires the least computer knowledge or skill involves

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

A

Lauren wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months' rent up front.Lauren approaches a good friend,Jamie,to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business.After a lengthy discussion,Jamie agrees to invest.Eight months later,Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation.In order for Jamie to sue Lauren for fraud,all the following must be true except

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

Describe four ways companies can reduce losses from fraud.

Free
(Essay)
4.8/5
(33)
Correct Answer:
Verified

Maintain adequate insurance.Keep a current backup copy of all program and data files in a secure off-site location.Develop a contingency plan for fraud occurrences and other disasters that might occur.Use special software designed to monitor system activity and help companies recover from frauds and malicious actions.

A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection. Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.

(Essay)
4.8/5
(45)

Which of the following is an example of data fraud?

(Multiple Choice)
4.8/5
(44)

Which of the following fraudulent acts generally takes most time and effort?

(Multiple Choice)
4.9/5
(38)

How does the U.S.Justice Department define computer fraud?

(Multiple Choice)
5.0/5
(43)

A 16 year old hacker was able to access the systems of U.S.Missile Command and accidently launched a small nuclear missile,which fortunately,failed to detonate.

(True/False)
4.8/5
(40)

What is the most prevalent opportunity within most companies to commit fraud?

(Multiple Choice)
4.8/5
(28)

This component of the fraud triangle explains the incentive or motivation for someone to commit fraud.

(Multiple Choice)
4.8/5
(40)

Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?

(Multiple Choice)
4.9/5
(36)

What are some of the distinguishing characteristics of fraud perpetrators?

(Essay)
4.7/5
(40)

Lapping is best described as the process of

(Multiple Choice)
5.0/5
(30)

The two most common types of fraud impacting financial statements are

(Multiple Choice)
5.0/5
(33)

Why is computer fraud often much more difficult to detect than other types of fraud?

(Multiple Choice)
4.9/5
(39)

Which of the following is a financial pressure that could cause an employee to commit fraud?

(Multiple Choice)
4.7/5
(47)

Sabotage is an example of a(n)________ threat.

(Multiple Choice)
4.8/5
(40)

Misappropriation of assets is a fraudulent act that involves

(Multiple Choice)
4.9/5
(41)

Describe two kinds of fraud.

(Essay)
4.8/5
(41)

Why is computer fraud often more difficult to detect than other types of fraud?

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 83
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)