Exam 5: Computer Fraud and Security
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
The US Justice Department defines computer fraud as
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
B
What techniques are used to conceal theft by fraud?
Free
(Essay)
4.9/5
(35)
Correct Answer:
Some techniques used to conceal theft by fraud are charging stolen assets to an expense account,lapping or misapplying cash payments from customers and stealing part of the receipts,kiting or creating fictitious bank balances by shuttling monies between bank accounts,and playing the bank float,then stealing some of the cash.
The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called __________.
(Multiple Choice)
4.9/5
(35)
Which of the factors listed below is not a common factor for fraud?
(Multiple Choice)
4.8/5
(36)
Developers of computer systems often include a user name and password that is hidden in the system,just in case they need to get into the system and correct problems in the future.This is referred to as a
(Multiple Choice)
4.8/5
(39)
Which type of antivirus program is most effective in spotting an infection soon after it starts?
(Multiple Choice)
4.8/5
(37)
Computers that are part of a botnet and are controlled by a bot herder are referred to as
(Multiple Choice)
4.9/5
(32)
Computer fraud can be analyzed using the traditional data processing model.According to this model,the simplest and most common fraud is __________ fraud.
(Multiple Choice)
4.9/5
(34)
There are four distinct types of threats to an AIS: 1)software errors and equipment malfunctions; 2)unintentional acts; 3)intentional acts; and 4)__________.
(Multiple Choice)
4.9/5
(31)
Which of the following motivators would be a good indication of financial pressure that would contribute to employee fraud?
(Multiple Choice)
4.9/5
(30)
The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called
(Multiple Choice)
4.7/5
(33)
The call to tech support was fairly routine.A first-time computer user had purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly than it had at first.Had he been accessing the Internet? Yes.Had he installed any "free" software? Yes.The problem is likely to be a(an)
(Multiple Choice)
4.7/5
(32)
Fraud is any and all means a person uses to gain an unfair advantage over another person.Current and former employees of an organization are much more likely to perpetrate fraud than external parties.The act by a person or group of persons resulting in materially misleading financial statements is called a(n)
(Multiple Choice)
4.9/5
(38)
Jiao Jan had been the Web master for Folding Squid Technologies for only three months when the Web site was inundated with access attempts.The only solution was to shut down the site and then selectively open it to access from certain Web addresses.FST suffered significant losses during the period.The company had been the victim of a(an)
(Multiple Choice)
4.7/5
(26)
On Monday morning,Janet Pillsner,Chief Information Officer at International Securities Corporation (ISC),got some bad news.A tape used to store system data backups was lost while it was being transported to an offsite storage location.She called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?
(Multiple Choice)
4.7/5
(37)
Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that
(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)