Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The most efficient way to conceal asset misappropriation is to

(Multiple Choice)
4.8/5
(27)

Describe some of the most frequent fraudulent financial reporting schemes.

(Essay)
4.7/5
(36)

Which of the following is an example of processor fraud?

(Multiple Choice)
4.8/5
(34)

Which of the following is not a management characteristic that increases pressure to commit fraudulent financial reporting?

(Multiple Choice)
4.8/5
(39)

Which of the following is least likely to result in computer fraud?

(Multiple Choice)
4.8/5
(34)

Researchers found significant differences between white-collar criminals and the public.

(True/False)
4.7/5
(33)

A power outage is an example of a(n)________ threat.

(Multiple Choice)
4.9/5
(43)

Which of the following is an example of input fraud?

(Multiple Choice)
4.7/5
(38)

Which of the following is the best way to hide theft of assets?

(Multiple Choice)
4.9/5
(37)

Why do many computer fraud cases go unreported and unprosecuted?

(Multiple Choice)
4.8/5
(36)

Which of the following is not a way to reduce fraud losses?

(Multiple Choice)
4.8/5
(30)

At Facebook,an automated system for verifying configuration value errors backfired,causing every single client to try to fix accurate data it perceived as invalid.Since the fix involved querying a cluster of databases,that cluster was quickly overwhelmed by hundreds of thousands of queries a second.The resultant crash took the Facebook system offline for two-and-a-half hours.

(True/False)
5.0/5
(38)

Which of the following is an example of output fraud?

(Multiple Choice)
4.8/5
(33)

What was the first known cyber-attack intended to harm a real-world physical target?

(Multiple Choice)
4.9/5
(36)

Describe at least four ways a company can make fraud less likely to occur.

(Essay)
4.8/5
(38)

Downloading a master list of customers and selling it to a competitor is an example of

(Multiple Choice)
4.9/5
(39)

What is the primary difference between fraud and errors in financial statement reporting?

(Multiple Choice)
4.8/5
(43)

A disgruntled employee in Australia hacked into a sewage system,causing a quarter of a million gallons of raw sewage to flood a hotel and a park.

(True/False)
4.8/5
(41)

Which of the following is not one of the components of the fraud triangle?

(Multiple Choice)
4.9/5
(31)

Perhaps the most striking fact about natural disasters in relation to AIS controls is that

(Multiple Choice)
4.8/5
(27)
Showing 21 - 40 of 83
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)