Exam 5: Computer Fraud
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
(Multiple Choice)
4.7/5
(39)
Downloading a master list of customers and selling it to a competitor is an example of
(Multiple Choice)
4.9/5
(30)
Which of the following is not a way to make fraud less likely to occur?
(Multiple Choice)
4.7/5
(45)
Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that
(Multiple Choice)
4.8/5
(41)
Which of the following is not a management characteristic that increases pressure to commit fraudulent financial reporting?
(Multiple Choice)
4.8/5
(28)
Which of the following is a financial pressure that could cause an employee to commit fraud?
(Multiple Choice)
4.8/5
(35)
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as
(Multiple Choice)
4.7/5
(37)
Which of the following is not a way to reduce fraud losses?
(Multiple Choice)
4.8/5
(42)
What was the first known cyber-attack intended to harm a real-world physical target?
(Multiple Choice)
4.8/5
(43)
Perhaps the most striking fact about natural disasters in relation to AIS controls is that
(Multiple Choice)
4.8/5
(30)
All of the following are required for an act to be legally classified as fraudulent except
(Multiple Choice)
4.8/5
(42)
A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection.
Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.
(Essay)
4.8/5
(45)
A disgruntled employee in Australia hacked into a sewage system,causing a quarter of a million gallons of raw sewage to flood a hotel and a park.
(True/False)
4.9/5
(42)
The simplest and most common way to commit a computer fraud is to
(Multiple Choice)
4.8/5
(35)
Which of the following is least likely to result in computer fraud?
(Multiple Choice)
4.9/5
(49)
________ is a simple,yet effective,method for catching or preventing many types of employee fraud.
(Multiple Choice)
4.8/5
(42)
Showing 21 - 40 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)