Exam 5: Computer Fraud
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
Researchers found significant differences between white-collar criminals and the public.
Free
(True/False)
4.7/5
(42)
Correct Answer:
False
Which of the following is an example of input fraud?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
Downloading a master list of customers and selling it to a competitor is an example of
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
A disgruntled employee in Australia hacked into a sewage system,causing a quarter of a million gallons of raw sewage to flood a hotel and a park.
(True/False)
4.8/5
(40)
"Cooking the books" is typically accomplished by all the following except
(Multiple Choice)
4.9/5
(36)
Why is computer fraud often much more difficult to detect than other types of fraud?
(Multiple Choice)
4.9/5
(32)
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
(Multiple Choice)
4.8/5
(29)
Which of the following will not reduce the likelihood of an occurrence of fraud?
(Multiple Choice)
4.7/5
(34)
Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?
(Multiple Choice)
4.7/5
(36)
Systems that do not meet company need is an example of a(n)________ threat.
(Multiple Choice)
4.8/5
(39)
Which of the following is not a way to make fraud less likely to occur?
(Multiple Choice)
4.9/5
(48)
Why is computer fraud often more difficult to detect than other types of fraud?
(Multiple Choice)
4.9/5
(35)
Which of the following is not an example of one of the basic types of fraud?
(Multiple Choice)
4.8/5
(35)
What agency did the United States create to use cyber weapons and to defend against cyber attacks?
(Multiple Choice)
4.9/5
(36)
A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection.
Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.
(Essay)
4.9/5
(37)
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as
(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 83
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)