Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are some of the distinguishing characteristics of fraud perpetrators?

Free
(Essay)
4.9/5
(38)
Correct Answer:
Verified

Some distinguishing characteristics of fraud perpetrators are: they tend to spend their illegal income to support their lifestyle; once they begin it becomes harder to stop and they become bolder as each incident happens; once they start to rely on the ill-gotten gains,they become more greedy and sometimes careless and overconfident.In the case of computer criminals,they are often young and have substantial computer knowledge.About two-thirds are men and likely to be an employee of the firm from which they steal.Many are unhappy or disgruntled with their employer because they feel unappreciated and underpaid.Most have no previous criminal record.

Which of the following is not a way to improve fraud detection?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

D

Which situation below makes it easy for someone to commit a fraud?

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

D

Which of the following fraudulent acts generally takes most time and effort?

(Multiple Choice)
4.8/5
(49)

Why is computer fraud often much more difficult to detect than other types of fraud?

(Multiple Choice)
4.9/5
(36)

Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?

(Multiple Choice)
4.7/5
(38)

Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?

(Multiple Choice)
4.8/5
(36)

Why is computer fraud often more difficult to detect than other types of fraud?

(Multiple Choice)
5.0/5
(39)

Describe at least four ways a company can make fraud less likely to occur.

(Essay)
4.8/5
(32)

In many cases of fraud,the ________ takes more time and effort than the ________.

(Multiple Choice)
4.9/5
(36)

SAS No.99 requires that auditors

(Multiple Choice)
4.7/5
(43)

Most frauds are detected by

(Multiple Choice)
4.8/5
(30)

The fraud that requires the least computer knowledge or skill involves

(Multiple Choice)
4.8/5
(34)

How does the U.S.Justice Department define computer fraud?

(Multiple Choice)
4.8/5
(37)

Insiders are frequently the ones who commit fraud because

(Multiple Choice)
4.9/5
(38)

"Cooking the books" is typically accomplished by all the following except

(Multiple Choice)
4.8/5
(35)

Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?

(Multiple Choice)
4.8/5
(28)

Which of the following is not an example of one of the basic types of fraud?

(Multiple Choice)
4.9/5
(41)

Excessive heat is an example of a(n)________ threat.

(Multiple Choice)
4.9/5
(41)

A power outage is an example of a(n)________ threat.

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)