Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why do many fraud cases go unreported and unprosecuted?

(Multiple Choice)
4.9/5
(27)

Which of the following is the greatest risk to information systems and causes the greatest dollar losses?

(Multiple Choice)
4.7/5
(39)

Downloading a master list of customers and selling it to a competitor is an example of

(Multiple Choice)
4.9/5
(30)

Which of the following is not a way to make fraud less likely to occur?

(Multiple Choice)
4.7/5
(45)

Perpetrators do not typically

(Multiple Choice)
4.9/5
(42)

Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that

(Multiple Choice)
4.8/5
(41)

Which of the following is not a management characteristic that increases pressure to commit fraudulent financial reporting?

(Multiple Choice)
4.8/5
(28)

Which of the following is a financial pressure that could cause an employee to commit fraud?

(Multiple Choice)
4.8/5
(35)

One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as

(Multiple Choice)
4.7/5
(37)

Explain the impact of SAS No.99 on auditors' responsibilities.

(Essay)
4.9/5
(39)

Which of the following is not a way to reduce fraud losses?

(Multiple Choice)
4.8/5
(42)

What was the first known cyber-attack intended to harm a real-world physical target?

(Multiple Choice)
4.8/5
(43)

Perhaps the most striking fact about natural disasters in relation to AIS controls is that

(Multiple Choice)
4.8/5
(30)

All of the following are required for an act to be legally classified as fraudulent except

(Multiple Choice)
4.8/5
(42)

A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection. Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.

(Essay)
4.8/5
(45)

A disgruntled employee in Australia hacked into a sewage system,causing a quarter of a million gallons of raw sewage to flood a hotel and a park.

(True/False)
4.9/5
(42)

The simplest and most common way to commit a computer fraud is to

(Multiple Choice)
4.8/5
(35)

Which of the following is least likely to result in computer fraud?

(Multiple Choice)
4.9/5
(49)

________ is a simple,yet effective,method for catching or preventing many types of employee fraud.

(Multiple Choice)
4.8/5
(42)

Describe two kinds of fraud.

(Essay)
4.8/5
(29)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)