Exam 5: Computer Fraud
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
On Tuesday morning,Chen Lee,Chief Information Officer at American Trading Corporation (ATC),got some bad news.The hard drive use to store system data backups was lost while it was being transported to an offsite storage location.Chen called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
B
What are some of the distinguishing characteristics of fraud perpetrators?
Free
(Essay)
4.8/5
(43)
Correct Answer:
Some distinguishing characteristics of fraud perpetrators are: they tend to spend their illegal income to support their lifestyle; once they begin it becomes harder to stop and they become bolder as each incident happens; once they start to rely on the ill-gotten gains,they become more greedy and sometimes careless and overconfident.In the case of computer criminals,they are often young and have substantial computer knowledge.About two-thirds are men and likely to be an employee of the firm from which they steal.Many are unhappy or disgruntled with their employer because they feel unappreciated and underpaid.Most have no previous criminal record.
Which of the following is not an example of one of the basic types of fraud?
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
A
In many cases of fraud,the ________ takes more time and effort than the ________.
(Multiple Choice)
4.7/5
(41)
What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting?
(Essay)
4.8/5
(46)
Which of the following is least likely to result in computer fraud?
(Multiple Choice)
4.8/5
(31)
Perhaps the most striking fact about natural disasters in relation to AIS controls is that
(Multiple Choice)
4.9/5
(30)
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as
(Multiple Choice)
4.9/5
(42)
Downloading a master list of customers and selling it to a competitor is an example of
(Multiple Choice)
4.9/5
(35)
A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection.
Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.
(Essay)
4.8/5
(31)
Identify the opportunity below that could enable an employee to commit fraud.
(Multiple Choice)
4.8/5
(39)
Identify the threat below that is not one of the four types of threats faced by accounting information systems.
(Multiple Choice)
4.9/5
(29)
All of the following are required for an act to be legally classified as fraudulent except
(Multiple Choice)
4.9/5
(40)
Which of the following is the best way to hide theft of assets?
(Multiple Choice)
4.9/5
(34)
What is the most prevalent opportunity within most companies to commit fraud?
(Multiple Choice)
4.7/5
(40)
This component of the fraud triangle explains how perpetrators justify their (illegal)behavior.
(Multiple Choice)
4.8/5
(30)
Which of the following is not a way to make fraud less likely to occur?
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)