Exam 5: Computer Fraud and Security
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?
(Multiple Choice)
4.7/5
(33)
A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a
(Multiple Choice)
4.9/5
(45)
Computer fraud has been categorized into several different classifications.The classification of computer fraud where the perpetrator causes a company to pay for ordered goods,or to pay for goods never ordered is called
(Multiple Choice)
4.9/5
(38)
During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of
(Multiple Choice)
4.7/5
(41)
Computer fraud is often much more difficult to detect than other types of fraud because
(Multiple Choice)
4.9/5
(36)
Chiller451 was chatting online with 3L3tCowboy."I can't believe how lame some people are! :)I can get into any system by checking out the company web site to see how user names are defined and who is on the employee directory.Then,all it takes is brute force to find the password." Chiller451 is a __________ and the method he is describing is ___________.
(Multiple Choice)
4.7/5
(42)
Why do fraudulent acts often go unreported and are therefore not prosecuted?
(Essay)
4.7/5
(38)
A fraud technique that allows the hacker to bypass normal system controls and enter a secured system is called
(Multiple Choice)
4.9/5
(36)
Stealing a master list of customers and selling it to a competitor is an example of
(Multiple Choice)
4.9/5
(42)
There are three characteristics associated with most fraud.The characteristic that often takes more time and effort and leaves behind more evidence than other types of fraud is called
(Multiple Choice)
4.8/5
(42)
A __________ is similar to a __________,except that it is a program rather than a code segment hidden in a host program.
(Multiple Choice)
4.8/5
(38)
Wally Hewitt is an accountant with a large accounting firm.The firm has a very strict policy of requiring all users to change their passwords every sixty days.In early March,Wally received an email from the firm that explained that there had been an error updating his password and that provided a link to a Web site with instructions for re-entering his password.Something about the email made Wally suspicious,so he called the firm's information technology department and found that the email was fictitious.The email was an example of
(Multiple Choice)
4.8/5
(38)
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
(Multiple Choice)
4.8/5
(40)
Gaining control of someone else's computer to carry out illicit activities without the user's knowledge
(Multiple Choice)
4.9/5
(41)
In the 1960's,techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls.The people who use these methods are referred to as
(Multiple Choice)
4.8/5
(42)
Showing 61 - 80 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)