Exam 5: Computer Fraud
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
Which of the following is the best way to hide theft of assets?
(Multiple Choice)
4.9/5
(37)
What agency did the United States create to use cyber weapons and to defend against cyber attacks?
(Multiple Choice)
4.9/5
(33)
This component of the fraud triangle explains how perpetrators justify their (illegal)behavior.
(Multiple Choice)
4.9/5
(36)
Intentional or reckless conduct that results in materially misleading financial statements is called
(Multiple Choice)
4.7/5
(33)
What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting?
(Essay)
4.8/5
(34)
Identify the opportunity below that could enable an employee to commit fraud.
(Multiple Choice)
4.8/5
(34)
What is the most prevalent opportunity within most companies to commit fraud?
(Multiple Choice)
4.7/5
(37)
Which of the following will not reduce the likelihood of an occurrence of fraud?
(Multiple Choice)
4.9/5
(40)
Why do fraudulent acts often go unreported and are therefore not prosecuted?
(Essay)
4.9/5
(38)
Misappropriation of assets is a fraudulent act that involves
(Multiple Choice)
4.8/5
(38)
The most efficient way to conceal asset misappropriation is to
(Multiple Choice)
4.9/5
(44)
On Tuesday morning,Chen Lee,Chief Information Officer at American Trading Corporation (ATC),got some bad news.The hard drive use to store system data backups was lost while it was being transported to an offsite storage location.Chen called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?
(Multiple Choice)
4.8/5
(39)
A 16 year old hacker was able to access the systems of U.S.Missile Command and accidently launched a small nuclear missile,which fortunately,failed to detonate.
(True/False)
4.9/5
(36)
Seble wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months'' rent up front.Seble approaches a good friend,Zhou,to discuss the possibility of Zhou investing funds and becoming a 25% partner in the business.After a lengthy discussion Zhou agrees to invest.Eight months later,Zhou and Seble have a major argument.In order for Zhou to sue Seble for fraud,all the following must be true except
(Multiple Choice)
4.9/5
(36)
Identify the threat below that is not one of the four types of threats faced by accounting information systems.
(Multiple Choice)
4.9/5
(27)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)