Multiple Choice
Computer fraud can take on many forms, including each of the following except
A) theft or illegal use of computer-readable information
B) theft, misuse, or misappropriation of computer equipment
C) theft, misuse, or misappropriation of assets by altering computer-readable records and files
D) theft, misuse, or misappropriation of printer supplies
Correct Answer:

Verified
Correct Answer:
Verified
Q4: The database administrator should be separated from
Q33: Describe the components of a disaster recovery
Q53: Discuss the key features of Section 302
Q86: What are commodity IT assets?
Q89: Application controls apply to a wide range
Q92: The most common access point for perpetrating
Q96: Tests of controls include<br>A)confirming accounts receivable<br>B)counting inventory<br>C)completing
Q99: All of the following are components of
Q115: Name three types of program fraud.
Q124: What primary IT functions must be separated