Exam 5: Computer Fraud and Security
Exam 1: Accounting Information Systems83 Questions
Exam 2: Overview of Business Processes105 Questions
Exam 3: Systems Development and Documentation Techniques99 Questions
Exam 4: Relational Databases90 Questions
Exam 5: Computer Fraud and Security95 Questions
Exam 6: Control and Accounting Information Systems87 Questions
Exam 7: Infromation System Controls for Systems Reliability82 Questions
Exam 8: Auditing Computer-Based Information Systems77 Questions
Exam 9: Auditing Computer-Based Informtion Systems94 Questions
Exam 10: The Revenue Cycle: Sales an Cash Collections94 Questions
Exam 11: The Expenditure Cycle: Purchasing and Cash Disbursements89 Questions
Exam 12: The Production Cycle87 Questions
Exam 13: The Human Resources Managementpayroll Cycle93 Questions
Exam 14: General Ledger and Reporting System81 Questions
Exam 15: Data Modeling and Database Design80 Questions
Exam 16: Implementing an Rea Model in a Relational Database77 Questions
Exam 17: Special Topics in Rea Modeling77 Questions
Exam 18: Introduction to Systems Development and Systems Analysis94 Questions
Exam 19: Ais Development Strategies95 Questions
Exam 20: Systems Design, Implementation and Operation86 Questions
Select questions type
In many cases of fraud,the __________ takes more time and effort than the __________ is worth.
(Multiple Choice)
4.7/5
(32)
A set of unauthorized computer instructions in an otherwise properly functioning program
(Multiple Choice)
4.8/5
(32)
A simple method for catching or preventing many types of employee fraud is to
(Multiple Choice)
4.8/5
(34)
Christmas shopping online is a popular pastime.Jim Chan decided to give it a try.He linked to amazon.com,found a perfect gift for his daughter,registered,and placed his order.It was only later that he noticed that the Web site's URL was actually amazom.com.Jim was a victim of
(Multiple Choice)
4.7/5
(34)
Why is computer fraud often more difficult to detect than other types of fraud?
(Multiple Choice)
4.8/5
(35)
Computer fraud perpetrators have developed many methods to commit their acts.One way is to modify programs during systems development allowing access into the system that bypasses normal system controls.This is known as
(Multiple Choice)
4.8/5
(29)
It was late on a Friday afternoon when Troy Willicott got a call at the help desk for Taggitt Finances.A man with an edge of panic clearly discernible in his voice was on the phone."I'm really in a bind and I sure hope that you can help me." He identified himself as Chet Frazier from the Accounting Department.He told Troy that he had to work on a report that was due on Monday morning and that he had forgotten to bring a written copy of his new password home with him.Troy know that Taggitt's new password policy,that required that passwords must be at least fifteen characters long,must contain letters and numbers,and must be changed every sixty days,had created problems.Consequently,Troy provided the password,listened as it was read back to him,and was profusely thanked before ending the call.The caller was not Chet Frazier,and Troy Willicott was a victim of
(Multiple Choice)
4.7/5
(35)
The Treadway Commission studied 450 lawsuits against auditors and found that
(Multiple Choice)
4.8/5
(41)
Jiao Jan had been the Web master for Folding Squid Technologies for only three months when he received an anonymous email that threatened to inundate the company Web site with access attempts unless a payment was wired to an account in Eastern Europe.Jiao was concerned that FST would suffer significant losses if the threat was genuine.The author of the email was engaged in
(Multiple Choice)
4.9/5
(30)
When a computer criminal gains access to a system by searching records or the trash of the target company,this is referred to as
(Multiple Choice)
4.9/5
(26)
In a __________ scheme,customer receipts are stolen and then subsequent payments by other customers are misapplied to cover the theft of the original receipts.
(Multiple Choice)
4.9/5
(40)
Showing 81 - 95 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)