Multiple Choice
A(n) ____ is a computer abuse technique where unauthorized instructions are inserted into a program to systematically steal very small amounts, usually by rounding to the nearest cent in financial transactions.
A) worm
B) salami slicing
C) logic bomb
D) Trojan horse
Correct Answer:

Verified
Correct Answer:
Verified
Q77: COSO's _ is a process that assesses
Q78: The ERM framework is comprised of eight
Q79: _ are business process objectives that an
Q80: A control that involves reprocessing transactions that
Q81: According to the 2011 PricewaterhouseCoopers (PwC) Global
Q83: A manager of a manufacturing plant alters
Q84: Strong antifraud controls include:<br>A) segregation of duties<br>B)
Q85: Controls that stop problems from occurring are
Q86: Events that could have a negative impact
Q87: A(n) _ control plan is designed to