A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) intentional acts (computer crimes)
Correct Answer
verified
Multiple Choice
A) few differences exist between white-collar criminals and the general public.
B) white-collar criminals eventually become violent criminals.
C) most white-collar criminals invest their illegal income rather than spend it.
D) most white-collar criminals are older and not technologically proficient.
Correct Answer
verified
Multiple Choice
A) While straightening the store at the end of the day,a shoe store employee finds and keeps an expensive pair of sunglasses left by a customer.
B) An executive devised and implemented a plan to accelerate revenue recognition on a long-term contract,which will allow the company to forestall filing for bankruptcy.The executive does not own any stock,stock options or grants,and will not receive a bonus or perk because of the overstated revenue.
C) A purchasing agent places a large order at higher-than-normal unit prices with a vendor that gave the agent tickets to several football games.
D) A salesperson approves a large sales discount on an order from a company owned partially by the salesperson's sister.
Correct Answer
verified
Multiple Choice
A) Revenge against the company
B) Intent to repay "borrowed" funds in the future
C) Sense of entitlement as compensation for receiving a lower than average raise
D) Belief that the company won't suffer because an insurance company will reimburse losses
Correct Answer
verified
Multiple Choice
A) kiting
B) laundering
C) lapping
D) bogus expense
Correct Answer
verified
Multiple Choice
A) bad actors.
B) blue-collar criminals.
C) white-collar criminals.
D) outlaws.
Correct Answer
verified
Multiple Choice
A) Software errors and equipment malfunctions
B) Unintentional acts
C) Intentional acts (computer crimes)
D) Natural and political disasters
Correct Answer
verified
Multiple Choice
A) alter computer input.
B) alter computer output.
C) modify the processing.
D) corrupt the database.
Correct Answer
verified
Multiple Choice
A) concealment;theft
B) theft;concealment
C) conversion;theft
D) conversion;concealment
Correct Answer
verified
Multiple Choice
A) financial fraud.
B) misstatement fraud.
C) fraudulent financial reporting.
D) audit failure fraud.
Correct Answer
verified
Multiple Choice
A) Human errors and omissions
B) Physical threats such as natural disasters
C) Dishonest employees
D) Computer crime
Correct Answer
verified
Multiple Choice
A) plan audits based on an analysis of fraud risk.
B) detect all material fraud.
C) alert the Securities and Exchange Commission of any fraud detected.
D) take all of the above actions.
Correct Answer
verified
Multiple Choice
A) U) S.Cyber Command
B) Department of Network Security
C) Department of Cyber Defense
D) Department of Technology Strategy
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) they are more dishonest than outsiders.
B) they need money more than outsiders.
C) they are less likely to get caught than outsiders.
D) they know more about the system and its weaknesses than outsiders.
Correct Answer
verified
Multiple Choice
A) external auditors.
B) hotline tip.
C) internal auditors.
D) forensic accountants.
Correct Answer
verified
Multiple Choice
A) Placing excessive trust in key employees.
B) Inadequate staffing within the organization.
C) Unclear company policies.
D) All of the above situations make it easy for someone to commit a fraud.
Correct Answer
verified
Multiple Choice
A) attempt to return or pay back stolen amounts soon after the initial theft,but find they are unable to make full restitution.
B) use trickery or lies to gain the confidence and trust of others at the organization they defraud.
C) become bolder and more greedy the longer the theft remains undetected.
D) begin to rely on stolen amounts as part of their income.
Correct Answer
verified
Multiple Choice
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) intentional acts (computer crimes)
Correct Answer
verified
Multiple Choice
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) intentional acts (computer crimes)
Correct Answer
verified
Showing 61 - 80 of 83
Related Exams