Filters
Question type

Study Flashcards

Excessive heat is an example of a(n) ________ threat.


A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) intentional acts (computer crimes)

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that


A) few differences exist between white-collar criminals and the general public.
B) white-collar criminals eventually become violent criminals.
C) most white-collar criminals invest their illegal income rather than spend it.
D) most white-collar criminals are older and not technologically proficient.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not an example of one of the basic types of fraud?


A) While straightening the store at the end of the day,a shoe store employee finds and keeps an expensive pair of sunglasses left by a customer.
B) An executive devised and implemented a plan to accelerate revenue recognition on a long-term contract,which will allow the company to forestall filing for bankruptcy.The executive does not own any stock,stock options or grants,and will not receive a bonus or perk because of the overstated revenue.
C) A purchasing agent places a large order at higher-than-normal unit prices with a vendor that gave the agent tickets to several football games.
D) A salesperson approves a large sales discount on an order from a company owned partially by the salesperson's sister.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?


A) Revenge against the company
B) Intent to repay "borrowed" funds in the future
C) Sense of entitlement as compensation for receiving a lower than average raise
D) Belief that the company won't suffer because an insurance company will reimburse losses

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?


A) kiting
B) laundering
C) lapping
D) bogus expense

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Fraud perpetrators are often referred to as


A) bad actors.
B) blue-collar criminals.
C) white-collar criminals.
D) outlaws.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which type of threat poses the greatest risk to information systems?


A) Software errors and equipment malfunctions
B) Unintentional acts
C) Intentional acts (computer crimes)
D) Natural and political disasters

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

The simplest and most common way to commit a computer fraud is to


A) alter computer input.
B) alter computer output.
C) modify the processing.
D) corrupt the database.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

In many cases of fraud,the ________ takes more time and effort than the ________.


A) concealment;theft
B) theft;concealment
C) conversion;theft
D) conversion;concealment

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Intentional or reckless conduct that results in materially misleading financial statements is called


A) financial fraud.
B) misstatement fraud.
C) fraudulent financial reporting.
D) audit failure fraud.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is the greatest risk to information systems and causes the greatest dollar losses?


A) Human errors and omissions
B) Physical threats such as natural disasters
C) Dishonest employees
D) Computer crime

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

SAS No.99 requires that auditors


A) plan audits based on an analysis of fraud risk.
B) detect all material fraud.
C) alert the Securities and Exchange Commission of any fraud detected.
D) take all of the above actions.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What agency did the United States create to use cyber weapons and to defend against cyber attacks?


A) U) S.Cyber Command
B) Department of Network Security
C) Department of Cyber Defense
D) Department of Technology Strategy

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

What characteristics must be presented for an act to be considered fraudulent? Give an example to support your answer.

Correct Answer

verifed

verified

A false statement,representation,or disc...

View Answer

Insiders are frequently the ones who commit fraud because


A) they are more dishonest than outsiders.
B) they need money more than outsiders.
C) they are less likely to get caught than outsiders.
D) they know more about the system and its weaknesses than outsiders.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Most frauds are detected by


A) external auditors.
B) hotline tip.
C) internal auditors.
D) forensic accountants.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which situation below makes it easy for someone to commit a fraud?


A) Placing excessive trust in key employees.
B) Inadequate staffing within the organization.
C) Unclear company policies.
D) All of the above situations make it easy for someone to commit a fraud.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Fraud perpetrators do not typically


A) attempt to return or pay back stolen amounts soon after the initial theft,but find they are unable to make full restitution.
B) use trickery or lies to gain the confidence and trust of others at the organization they defraud.
C) become bolder and more greedy the longer the theft remains undetected.
D) begin to rely on stolen amounts as part of their income.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Systems that do not meet company need is an example of a(n) ________ threat.


A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) intentional acts (computer crimes)

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Undetected data transmission errors are an example of a(n) ________ threat.


A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) intentional acts (computer crimes)

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 61 - 80 of 83

Related Exams

Show Answer