Exam 5: Computer Fraud and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the most prevalent opportunity within most companies to commit fraud?

(Multiple Choice)
4.8/5
(37)

Which AIS threat below would be classified an unintentional act?

(Multiple Choice)
4.8/5
(33)

How can a system be protected from viruses?

(Essay)
4.8/5
(37)

Reasons for committing a fraud include living beyond one's means,having heavy debts,or unusually high bills.Such a motivator for committing a fraud is commonly known as a

(Multiple Choice)
4.9/5
(39)

Intentional or reckless conduct that results in materially misleading financial statements is called

(Multiple Choice)
4.8/5
(34)

One computer fraud technique is known as data diddling.What is it?

(Multiple Choice)
4.9/5
(34)

Characteristics connected with fraud include pressures,opportunities,and rationalizations.Of these characteristics,which one often stems from a lack of internal controls within an organization?

(Multiple Choice)
4.8/5
(41)

Which situation below makes it easy for someone to commit a fraud?

(Multiple Choice)
4.8/5
(30)

Discuss antivirus software programs.

(Essay)
4.9/5
(37)

What are the three common things that happen in a fraud?

(Essay)
4.9/5
(26)

Which of the following is not a method of identify theft

(Multiple Choice)
4.8/5
(31)

One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as

(Multiple Choice)
4.9/5
(35)

What is the difference between a worm and a virus?

(Essay)
4.7/5
(27)

Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called

(Multiple Choice)
4.8/5
(26)

Spyware is

(Multiple Choice)
4.7/5
(42)

Telefarm Industries is a telemarketing firm that operates in the Midwest.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used an unsecured computer to access the firm's database and copy a list of customers from the past three years that included credit card information.Telefarm was a victim of

(Multiple Choice)
4.9/5
(40)

Which AIS threat below would be classified as a natural or political disaster?

(Multiple Choice)
4.9/5
(34)

Which method of fraud is physical in its nature rather than electronic?

(Multiple Choice)
4.8/5
(37)

How can funds be stolen in payroll fraud?

(Multiple Choice)
4.9/5
(32)

Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with

(Multiple Choice)
4.9/5
(33)
Showing 41 - 60 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)