Exam 5: Computer Fraud and Security
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
What is the most prevalent opportunity within most companies to commit fraud?
(Multiple Choice)
4.8/5
(37)
Which AIS threat below would be classified an unintentional act?
(Multiple Choice)
4.8/5
(33)
Reasons for committing a fraud include living beyond one's means,having heavy debts,or unusually high bills.Such a motivator for committing a fraud is commonly known as a
(Multiple Choice)
4.9/5
(39)
Intentional or reckless conduct that results in materially misleading financial statements is called
(Multiple Choice)
4.8/5
(34)
One computer fraud technique is known as data diddling.What is it?
(Multiple Choice)
4.9/5
(34)
Characteristics connected with fraud include pressures,opportunities,and rationalizations.Of these characteristics,which one often stems from a lack of internal controls within an organization?
(Multiple Choice)
4.8/5
(41)
Which situation below makes it easy for someone to commit a fraud?
(Multiple Choice)
4.8/5
(30)
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as
(Multiple Choice)
4.9/5
(35)
Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
(Multiple Choice)
4.8/5
(26)
Telefarm Industries is a telemarketing firm that operates in the Midwest.The turnover rate among employees is quite high.Recently,the information technology manager discovered that an unknown employee had used an unsecured computer to access the firm's database and copy a list of customers from the past three years that included credit card information.Telefarm was a victim of
(Multiple Choice)
4.9/5
(40)
Which AIS threat below would be classified as a natural or political disaster?
(Multiple Choice)
4.9/5
(34)
Which method of fraud is physical in its nature rather than electronic?
(Multiple Choice)
4.8/5
(37)
Mo Chauncey was arrested in Emporia,Kansas,on February 29,2008,for running an online business that specialized in buying and reselling stolen credit card information.Mo was charged with
(Multiple Choice)
4.9/5
(33)
Showing 41 - 60 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)