Exam 6: Computer Fraud and Abuse Techniques
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called
(Multiple Choice)
4.8/5
(38)
A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
(Multiple Choice)
4.8/5
(38)
Ashley Baker has been the webmaster for Berryhill Finance only ten days when Berryhill's website was flooded with access attempts.Ashley shut down the site and only opened it to Web addresses which she specifically identified as legitimate.As a result,many of Berryhill's customers were unable to obtain loans,causing Berryhill to lose a significant amount of business.Berryhill Finance suffered from a
(Multiple Choice)
4.8/5
(37)
A back door into a system that bypasses normal system controls is called a
(Multiple Choice)
4.8/5
(36)
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
(Multiple Choice)
4.9/5
(37)
LOLer was chatting online with l33ter."I can't believe how lame some people are! :)I can get into any system by checking out the company website to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." LOLer is a ________,and the fraud he is describing is ________.
(Multiple Choice)
4.8/5
(39)
________ consists of the unauthorized copying of company data.
(Multiple Choice)
4.7/5
(35)
The unauthorized use of special program that bypass regular system controls to perform illegal acts is called
(Multiple Choice)
5.0/5
(33)
During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of
(Multiple Choice)
4.9/5
(36)
Which method of fraud is physical in its nature rather than electronic?
(Multiple Choice)
4.9/5
(45)
Changing data before or during entry into a computer system to delete,alter,add,or incorrectly update data is called a
(Multiple Choice)
4.7/5
(27)
Secretly changing an already open browser tab using JavaScript is called
(Multiple Choice)
4.9/5
(32)
Showing 81 - 96 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)