Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Researchers found significant differences between white-collar criminals and the public.

Free
(True/False)
4.7/5
(42)
Correct Answer:
Verified

False

Which of the following is an example of input fraud?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

Downloading a master list of customers and selling it to a competitor is an example of

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

A disgruntled employee in Australia hacked into a sewage system,causing a quarter of a million gallons of raw sewage to flood a hotel and a park.

(True/False)
4.8/5
(40)

"Cooking the books" is typically accomplished by all the following except

(Multiple Choice)
4.9/5
(36)

Why is computer fraud often much more difficult to detect than other types of fraud?

(Multiple Choice)
4.9/5
(32)

Which of the following is the greatest risk to information systems and causes the greatest dollar losses?

(Multiple Choice)
4.8/5
(29)

Lapping is best described as the process of

(Multiple Choice)
4.9/5
(40)

Which of the following will not reduce the likelihood of an occurrence of fraud?

(Multiple Choice)
4.7/5
(34)

Excessive heat is an example of a(n)________ threat.

(Multiple Choice)
4.9/5
(37)

Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?

(Multiple Choice)
4.7/5
(36)

Systems that do not meet company need is an example of a(n)________ threat.

(Multiple Choice)
4.8/5
(39)

Which of the following is not a way to make fraud less likely to occur?

(Multiple Choice)
4.9/5
(48)

Why is computer fraud often more difficult to detect than other types of fraud?

(Multiple Choice)
4.9/5
(35)

Which of the following is not an example of one of the basic types of fraud?

(Multiple Choice)
4.8/5
(35)

How does the U.S.Justice Department define computer fraud?

(Multiple Choice)
4.8/5
(39)

What agency did the United States create to use cyber weapons and to defend against cyber attacks?

(Multiple Choice)
4.9/5
(36)

A power outage is an example of a(n)________ threat.

(Multiple Choice)
4.8/5
(35)

A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection. Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.

(Essay)
4.9/5
(37)

One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as

(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 83
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)