Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that

(Multiple Choice)
4.8/5
(35)

SAS No.99 requires that auditors

(Multiple Choice)
4.7/5
(34)

The simplest and most common way to commit a computer fraud is to

(Multiple Choice)
4.8/5
(33)

Which of the following is not an example of one of the basic types of fraud?

(Multiple Choice)
4.7/5
(35)

In many cases of fraud,the ________ takes more time and effort than the ________.

(Multiple Choice)
4.9/5
(34)

Which situation below makes it easy for someone to commit a fraud?

(Multiple Choice)
4.8/5
(49)

Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?

(Multiple Choice)
4.8/5
(40)

Fraud perpetrators are often referred to as

(Multiple Choice)
4.9/5
(39)

Which of the following is the greatest risk to information systems and causes the greatest dollar losses?

(Multiple Choice)
4.9/5
(39)

What characteristics must be presented for an act to be considered fraudulent? Give an example to support your answer.

(Essay)
4.8/5
(37)

Fraud perpetrators do not typically

(Multiple Choice)
4.8/5
(39)

Systems that do not meet company need is an example of a(n)________ threat.

(Multiple Choice)
4.7/5
(40)

Which type of threat poses the greatest risk to information systems?

(Multiple Choice)
4.8/5
(35)

Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?

(Multiple Choice)
4.7/5
(42)

Insiders are frequently the ones who commit fraud because

(Multiple Choice)
4.8/5
(33)

What agency did the United States create to use cyber weapons and to defend against cyber attacks?

(Multiple Choice)
4.9/5
(28)

Excessive heat is an example of a(n)________ threat.

(Multiple Choice)
4.9/5
(44)

Undetected data transmission errors are an example of a(n)________ threat.

(Multiple Choice)
4.8/5
(34)

Most frauds are detected by

(Multiple Choice)
4.9/5
(35)

Intentional or reckless conduct that results in materially misleading financial statements is called

(Multiple Choice)
4.8/5
(46)
Showing 61 - 80 of 83
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)