Exam 5: Computer Fraud
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
The most efficient way to conceal asset misappropriation is to
(Multiple Choice)
4.8/5
(27)
Describe some of the most frequent fraudulent financial reporting schemes.
(Essay)
4.7/5
(36)
Which of the following is not a management characteristic that increases pressure to commit fraudulent financial reporting?
(Multiple Choice)
4.8/5
(39)
Which of the following is least likely to result in computer fraud?
(Multiple Choice)
4.8/5
(34)
Researchers found significant differences between white-collar criminals and the public.
(True/False)
4.7/5
(33)
Which of the following is the best way to hide theft of assets?
(Multiple Choice)
4.9/5
(37)
Why do many computer fraud cases go unreported and unprosecuted?
(Multiple Choice)
4.8/5
(36)
Which of the following is not a way to reduce fraud losses?
(Multiple Choice)
4.8/5
(30)
At Facebook,an automated system for verifying configuration value errors backfired,causing every single client to try to fix accurate data it perceived as invalid.Since the fix involved querying a cluster of databases,that cluster was quickly overwhelmed by hundreds of thousands of queries a second.The resultant crash took the Facebook system offline for two-and-a-half hours.
(True/False)
5.0/5
(38)
What was the first known cyber-attack intended to harm a real-world physical target?
(Multiple Choice)
4.9/5
(36)
Describe at least four ways a company can make fraud less likely to occur.
(Essay)
4.8/5
(38)
Downloading a master list of customers and selling it to a competitor is an example of
(Multiple Choice)
4.9/5
(39)
What is the primary difference between fraud and errors in financial statement reporting?
(Multiple Choice)
4.8/5
(43)
A disgruntled employee in Australia hacked into a sewage system,causing a quarter of a million gallons of raw sewage to flood a hotel and a park.
(True/False)
4.8/5
(41)
Which of the following is not one of the components of the fraud triangle?
(Multiple Choice)
4.9/5
(31)
Perhaps the most striking fact about natural disasters in relation to AIS controls is that
(Multiple Choice)
4.8/5
(27)
Showing 21 - 40 of 83
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)