Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

On Tuesday morning,Chen Lee,Chief Information Officer at American Trading Corporation (ATC),got some bad news.The hard drive use to store system data backups was lost while it was being transported to an offsite storage location.Chen called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

B

What are some of the distinguishing characteristics of fraud perpetrators?

Free
(Essay)
4.8/5
(43)
Correct Answer:
Verified

Some distinguishing characteristics of fraud perpetrators are: they tend to spend their illegal income to support their lifestyle; once they begin it becomes harder to stop and they become bolder as each incident happens; once they start to rely on the ill-gotten gains,they become more greedy and sometimes careless and overconfident.In the case of computer criminals,they are often young and have substantial computer knowledge.About two-thirds are men and likely to be an employee of the firm from which they steal.Many are unhappy or disgruntled with their employer because they feel unappreciated and underpaid.Most have no previous criminal record.

Which of the following is not an example of one of the basic types of fraud?

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

A

In many cases of fraud,the ________ takes more time and effort than the ________.

(Multiple Choice)
4.7/5
(41)

What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting?

(Essay)
4.8/5
(46)

Which of the following is least likely to result in computer fraud?

(Multiple Choice)
4.8/5
(31)

Which of the following is not a way to reduce fraud losses?

(Multiple Choice)
4.9/5
(45)

Perhaps the most striking fact about natural disasters in relation to AIS controls is that

(Multiple Choice)
4.9/5
(30)

One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as

(Multiple Choice)
4.9/5
(42)

Downloading a master list of customers and selling it to a competitor is an example of

(Multiple Choice)
4.9/5
(35)

A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection. Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.

(Essay)
4.8/5
(31)

Describe four ways companies can reduce losses from fraud.

(Essay)
4.8/5
(35)

Logic errors are an example of which type of threat?

(Multiple Choice)
4.7/5
(37)

Identify the opportunity below that could enable an employee to commit fraud.

(Multiple Choice)
4.8/5
(39)

Identify the threat below that is not one of the four types of threats faced by accounting information systems.

(Multiple Choice)
4.9/5
(29)

All of the following are required for an act to be legally classified as fraudulent except

(Multiple Choice)
4.9/5
(40)

Which of the following is the best way to hide theft of assets?

(Multiple Choice)
4.9/5
(34)

What is the most prevalent opportunity within most companies to commit fraud?

(Multiple Choice)
4.7/5
(40)

This component of the fraud triangle explains how perpetrators justify their (illegal)behavior.

(Multiple Choice)
4.8/5
(30)

Which of the following is not a way to make fraud less likely to occur?

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)