Exam 5: Computer Fraud and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In many cases of fraud,the __________ takes more time and effort than the __________ is worth.

(Multiple Choice)
4.7/5
(32)

How does a company make fraud less likely to occur?

(Essay)
4.9/5
(40)

A set of unauthorized computer instructions in an otherwise properly functioning program

(Multiple Choice)
4.8/5
(32)

A majority of fraud perpetrators are

(Multiple Choice)
4.9/5
(29)

A simple method for catching or preventing many types of employee fraud is to

(Multiple Choice)
4.8/5
(34)

Why is computer fraud on the rise?

(Essay)
4.8/5
(47)

Christmas shopping online is a popular pastime.Jim Chan decided to give it a try.He linked to amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the Web site's URL was actually amazom.com.Jim was a victim of

(Multiple Choice)
4.7/5
(34)

Why is computer fraud often more difficult to detect than other types of fraud?

(Multiple Choice)
4.8/5
(35)

Most fraud perpetrators are insiders because

(Multiple Choice)
4.8/5
(43)

Computer fraud perpetrators have developed many methods to commit their acts.One way is to modify programs during systems development allowing access into the system that bypasses normal system controls.This is known as

(Multiple Choice)
4.8/5
(29)

It was late on a Friday afternoon when Troy Willicott got a call at the help desk for Taggitt Finances.A man with an edge of panic clearly discernible in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as Chet Frazier from the Accounting Department.He told Troy that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Troy know that Taggitt's new password policy,that required that passwords must be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems.Consequently,Troy provided the password,listened as it was read back to him,and was profusely thanked before ending the call.The caller was not Chet Frazier,and Troy Willicott was a victim of

(Multiple Choice)
4.7/5
(35)

The Treadway Commission studied 450 lawsuits against auditors and found that

(Multiple Choice)
4.8/5
(41)

Jiao Jan had been the Web master for Folding Squid Technologies for only three months when he received an anonymous email that threatened to inundate the company Web site with access attempts unless a payment was wired to an account in Eastern Europe.Jiao was concerned that FST would suffer significant losses if the threat was genuine.The author of the email was engaged in

(Multiple Choice)
4.9/5
(30)

When a computer criminal gains access to a system by searching records or the trash of the target company,this is referred to as

(Multiple Choice)
4.9/5
(26)

In a __________ scheme,customer receipts are stolen and then subsequent payments by other customers are misapplied to cover the theft of the original receipts.

(Multiple Choice)
4.9/5
(40)
Showing 81 - 95 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)