Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Terrorists are an example of a(n)________ threat.

(Multiple Choice)
4.9/5
(32)

What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting?

(Essay)
4.8/5
(41)

Which of the following is not a way to reduce fraud losses?

(Multiple Choice)
4.9/5
(35)

Which of the following is not a management characteristic that increases pressure to commit fraudulent financial reporting?

(Multiple Choice)
4.8/5
(46)

A 16 year old hacker was able to access the systems of U.S.Missile Command and accidently launched a small nuclear missile,which fortunately,failed to detonate.

(True/False)
4.8/5
(30)

Identify the opportunity below that could enable an employee to commit fraud.

(Multiple Choice)
4.7/5
(35)

At the beginning of this chapter,you were presented with a situation regarding Jason Scott.Jason is an internal auditor for Northwest Industries,a forest products company.On March 31,he reviewed his completed tax return and noticed that the federal income tax withholding on his final paycheck was $5 more than the amount indicated on his W-2 form.He used the W-2 amount to complete his tax return and made a note to ask the payroll department what happened to the other $5.The next day,Jason was swamped,and he dismissed the $5 difference as immaterial.On April 16,a coworker grumbled that the company had taken $5 more from his check than he was given credit for on his W-2.When Jason realized he was not the only one with the $5 discrepancy,he investigated and found that all 1,500 employees had the same $5 discrepancy.He also discovered that the W-2 of Don Hawkins,the payroll programmer,had thousands of dollars more in withholdings reported to the Internal Revenue Service (IRS)than had been withheld from his paycheck. Identify the type of fraud scheme may have happened as described.Describe controls you would implement to address the fraud risk,and label each control as preventive or detective.

(Essay)
4.9/5
(33)

Describe four ways companies can reduce losses from fraud.

(Essay)
4.7/5
(42)

What was the first known cyber-attack intended to harm a real-world physical target?

(Multiple Choice)
4.9/5
(31)

Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?

(Multiple Choice)
4.9/5
(33)

Which situation below makes it easy for someone to commit a fraud?

(Multiple Choice)
4.9/5
(37)

Misappropriation of assets is a fraudulent act that involves

(Multiple Choice)
4.7/5
(34)

The day after Christmas,Jane Olson,Chief Information Officer at American Trading Corporation (ATC),received some bad news.The hard drive use to store the company's system data backups was lost while it was being transported to an offsite storage location.Jane called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?

(Multiple Choice)
4.7/5
(32)

Why do fraudulent acts often go unreported and are therefore not prosecuted?

(Essay)
4.8/5
(37)

Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?

(Multiple Choice)
4.8/5
(35)

Which of the following is not one of the components of the fraud triangle?

(Multiple Choice)
4.9/5
(35)

Insiders are frequently the ones who commit fraud because

(Multiple Choice)
4.8/5
(37)

What is the primary difference between fraud and errors in financial statement reporting?

(Multiple Choice)
4.7/5
(43)

Which characteristic of the fraud triangle often stems from the belief that "the rules do not apply to me" within an organization?

(Multiple Choice)
4.9/5
(28)

Which of the following is an example of output fraud?

(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 83
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)