Deck 5: Computer Fraud
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/83
العب
ملء الشاشة (f)
Deck 5: Computer Fraud
1
A power outage is an example of a(n)________ threat.
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
B
2
Fraud perpetrators are often referred to as
A)bad actors.
B)blue-collar criminals.
C)white-collar criminals.
D)outlaws.
A)bad actors.
B)blue-collar criminals.
C)white-collar criminals.
D)outlaws.
C
3
A disgruntled employee in Australia hacked into a sewage system,causing a quarter of a million gallons of raw sewage to flood a hotel and a park.
True
4
Sabotage is an example of a(n)________ threat.
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
5
Perhaps the most striking fact about natural disasters in relation to AIS controls is that
A)many companies in one location can be seriously affected at one time by a disaster.
B)losses are absolutely unpreventable.
C)there are a large number of major disasters every year.
D)disaster planning has largely been ignored in the literature.
A)many companies in one location can be seriously affected at one time by a disaster.
B)losses are absolutely unpreventable.
C)there are a large number of major disasters every year.
D)disaster planning has largely been ignored in the literature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
6
A 16 year old hacker was able to access the systems of U.S.Missile Command and accidently launched a small nuclear missile,which fortunately,failed to detonate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
7
What agency did the United States create to use cyber weapons and to defend against cyber attacks?
A)U.S. Cyber Command
B)Department of Network Security
C)Department of Cyber Defense
D)Department of Technology Strategy
A)U.S. Cyber Command
B)Department of Network Security
C)Department of Cyber Defense
D)Department of Technology Strategy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
8
"Cooking the books" is typically accomplished by all the following except
A)overstating inventory.
B)accelerating recognition of revenue.
C)inflating accounts payable.
D)delaying recording of expenses.
A)overstating inventory.
B)accelerating recognition of revenue.
C)inflating accounts payable.
D)delaying recording of expenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
9
Lauren wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months' rent up front.Lauren approaches a good friend,Jamie,to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business.After a lengthy discussion,Jamie agrees to invest.Eight months later,Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation.In order for Jamie to sue Lauren for fraud,all the following must be true except
A)Jamie's decision to invest was primarily based on Lauren's assertion that she had prior floral retail experience.
B)Jamie has suffered a substantial loss in her investment because of Lauren's deception.
C)Jamie trusted and relied on Lauren's representation of the business financial operation.
D)Jamie found Lauren dishonest because she does not always reconcile the business cash account on a timely basis.
A)Jamie's decision to invest was primarily based on Lauren's assertion that she had prior floral retail experience.
B)Jamie has suffered a substantial loss in her investment because of Lauren's deception.
C)Jamie trusted and relied on Lauren's representation of the business financial operation.
D)Jamie found Lauren dishonest because she does not always reconcile the business cash account on a timely basis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
10
The activist hacker group called Anonymous played Santa Claus one Christmas,indicating they were "granting wishes to people who are less fortunate than most." They were inundated with requests for iPads,iPhones,pizzas,and hundreds of other things.They hacked into banks and sent over $1 million worth of virtual credit cards to people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
11
Undetected data transmission errors are an example of a(n)________ threat.
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
12
Terrorists are an example of a(n)________ threat.
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
13
Systems that do not meet company need is an example of a(n)________ threat.
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
14
What characteristics must be presented for an act to be considered fraudulent? Give an example to support your answer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
A)Human errors and omissions
B)Physical threats such as natural disasters
C)Dishonest employees
D)Computer crime
A)Human errors and omissions
B)Physical threats such as natural disasters
C)Dishonest employees
D)Computer crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
16
Excessive heat is an example of a(n)________ threat.
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
A)natural and political disasters
B)software errors and equipment malfunctions
C)unintentional acts
D)intentional acts (computer crimes)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
17
At Facebook,an automated system for verifying configuration value errors backfired,causing every single client to try to fix accurate data it perceived as invalid.Since the fix involved querying a cluster of databases,that cluster was quickly overwhelmed by hundreds of thousands of queries a second.The resultant crash took the Facebook system offline for two-and-a-half hours.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
18
Identify the threat below that is not one of the four types of threats faced by accounting information systems.
A)Natural and political disasters
B)Software errors and equipment malfunctions
C)Unintentional acts
D)System design inefficiency
A)Natural and political disasters
B)Software errors and equipment malfunctions
C)Unintentional acts
D)System design inefficiency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which type of threat poses the greatest risk to information systems?
A)Software errors and equipment malfunctions
B)Unintentional acts
C)Intentional acts (computer crimes)
D)Natural and political disasters
A)Software errors and equipment malfunctions
B)Unintentional acts
C)Intentional acts (computer crimes)
D)Natural and political disasters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
20
What was the first known cyber-attack intended to harm a real-world physical target?
A)Sasser
B)Stuxnet
C)Michelangelo
D)Doomsday
A)Sasser
B)Stuxnet
C)Michelangelo
D)Doomsday
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is the primary difference between fraud and errors in financial statement reporting?
A)The level of management involved
B)The intent to deceive
C)The materiality of the misstatement
D)The type of transaction effected
A)The level of management involved
B)The intent to deceive
C)The materiality of the misstatement
D)The type of transaction effected
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
22
Most fraud perpetrators have previous criminal record; they were dishonest and disrespected members of their community.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is not a management characteristic that increases pressure to commit fraudulent financial reporting?
A)Close relationship with the current audit engagement partner and manager
B)Pay for performance incentives based on short-term performance measures
C)High management and employee turnover
D)Highly optimistic earnings projections
A)Close relationship with the current audit engagement partner and manager
B)Pay for performance incentives based on short-term performance measures
C)High management and employee turnover
D)Highly optimistic earnings projections
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
24
Lapping is best described as the process of
A)applying cash receipts to a different customer's account in an attempt to conceal previous thefts of cash receipts.
B)inflating bank balances by transferring money among different bank accounts.
C)stealing small amounts of cash, many times over a period of time.
D)increasing expenses to conceal that an asset was stolen.
A)applying cash receipts to a different customer's account in an attempt to conceal previous thefts of cash receipts.
B)inflating bank balances by transferring money among different bank accounts.
C)stealing small amounts of cash, many times over a period of time.
D)increasing expenses to conceal that an asset was stolen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
25
The two most common types of fraud impacting financial statements are
A)corruption and fraudulent financial reporting.
B)misappropriation of assets and embezzlement.
C)fraudulent financial reporting and e-commerce fraud.
D)fraudulent financial reporting and misappropriation of assets.
A)corruption and fraudulent financial reporting.
B)misappropriation of assets and embezzlement.
C)fraudulent financial reporting and e-commerce fraud.
D)fraudulent financial reporting and misappropriation of assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
26
Insiders are frequently the ones who commit fraud because
A)they are more dishonest than outsiders.
B)they need money more than outsiders.
C)they are less likely to get caught than outsiders.
D)they know more about the system and its weaknesses than outsiders.
A)they are more dishonest than outsiders.
B)they need money more than outsiders.
C)they are less likely to get caught than outsiders.
D)they know more about the system and its weaknesses than outsiders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
27
Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that
A)few differences exist between white-collar criminals and the general public.
B)white-collar criminals eventually become violent criminals.
C)most white-collar criminals invest their illegal income rather than spend it.
D)most white-collar criminals are older and not technologically proficient.
A)few differences exist between white-collar criminals and the general public.
B)white-collar criminals eventually become violent criminals.
C)most white-collar criminals invest their illegal income rather than spend it.
D)most white-collar criminals are older and not technologically proficient.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
28
Asset misappropriation is ________ likely than fraudulent financial reporting.The amounts involved in asset misappropriation are much ________ than fraudulent financial reporting.
A)less; more
B)less; less
C)more; less
D)more, more
A)less; more
B)less; less
C)more; less
D)more, more
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
29
Explain the impact of SAS No.99 on auditors' responsibilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
30
Misappropriation of assets is a fraudulent act that involves
A)dishonest conduct by those in power.
B)misrepresenting facts to promote an investment.
C)using computer technology to perpetrate a crime.
D)theft of company property.
A)dishonest conduct by those in power.
B)misrepresenting facts to promote an investment.
C)using computer technology to perpetrate a crime.
D)theft of company property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is not an example of one of the basic types of fraud?
A)While straightening the store at the end of the day, a shoe store employee finds and keeps an expensive pair of sunglasses left by a customer.
B)An executive devised and implemented a plan to accelerate revenue recognition on a long-term contract, which will allow the company to forestall filing for bankruptcy. The executive does not own any stock, stock options or grants, and will not receive a bonus or perk because of the overstated revenue.
C)A purchasing agent places a large order at higher-than-normal unit prices with a vendor that gave the agent tickets to several football games.
D)A salesperson approves a large sales discount on an order from a company owned partially by the salesperson's sister.
A)While straightening the store at the end of the day, a shoe store employee finds and keeps an expensive pair of sunglasses left by a customer.
B)An executive devised and implemented a plan to accelerate revenue recognition on a long-term contract, which will allow the company to forestall filing for bankruptcy. The executive does not own any stock, stock options or grants, and will not receive a bonus or perk because of the overstated revenue.
C)A purchasing agent places a large order at higher-than-normal unit prices with a vendor that gave the agent tickets to several football games.
D)A salesperson approves a large sales discount on an order from a company owned partially by the salesperson's sister.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe two kinds of fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
33
Describe some of the most frequent fraudulent financial reporting schemes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
34
Fraud perpetrators do not typically
A)attempt to return or pay back stolen amounts soon after the initial theft, but find they are unable to make full restitution.
B)use trickery or lies to gain the confidence and trust of others at the organization they defraud.
C)become bolder and more greedy the longer the theft remains undetected.
D)begin to rely on stolen amounts as part of their income.
A)attempt to return or pay back stolen amounts soon after the initial theft, but find they are unable to make full restitution.
B)use trickery or lies to gain the confidence and trust of others at the organization they defraud.
C)become bolder and more greedy the longer the theft remains undetected.
D)begin to rely on stolen amounts as part of their income.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
35
Describe ways that the Treadway Commission has recommended to reduce fraudulent financial reporting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?
A)Revenge against the company
B)Intent to repay "borrowed" funds in the future
C)Sense of entitlement as compensation for receiving a lower than average raise
D)Belief that the company won't suffer because an insurance company will reimburse losses
A)Revenge against the company
B)Intent to repay "borrowed" funds in the future
C)Sense of entitlement as compensation for receiving a lower than average raise
D)Belief that the company won't suffer because an insurance company will reimburse losses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is not an example of misappropriation of assets?
A)A warehouse employee takes home two units of electronic entertainment inventory each week without authorization.
B)The chief financial officer of the company falsely adds $20 million to the accounts receivable and revenue accounts.
C)The president of the company utilizes the organization's cash to add a floor to her 15,000 square foot house.
D)The treasurer of the company makes an unauthorized wire transfer from the organization's bank to a personal account in Grand Cayman.
A)A warehouse employee takes home two units of electronic entertainment inventory each week without authorization.
B)The chief financial officer of the company falsely adds $20 million to the accounts receivable and revenue accounts.
C)The president of the company utilizes the organization's cash to add a floor to her 15,000 square foot house.
D)The treasurer of the company makes an unauthorized wire transfer from the organization's bank to a personal account in Grand Cayman.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
38
Researchers found significant differences between white-collar criminals and the public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
39
Intentional or reckless conduct that results in materially misleading financial statements is called
A)financial fraud.
B)misstatement fraud.
C)fraudulent financial reporting.
D)audit failure fraud.
A)financial fraud.
B)misstatement fraud.
C)fraudulent financial reporting.
D)audit failure fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
40
SAS No.99 requires that auditors
A)plan audits based on an analysis of fraud risk.
B)detect all material fraud.
C)alert the Securities and Exchange Commission of any fraud detected.
D)take all of the above actions.
A)plan audits based on an analysis of fraud risk.
B)detect all material fraud.
C)alert the Securities and Exchange Commission of any fraud detected.
D)take all of the above actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
41
How does the U.S.Justice Department define computer fraud?
A)As any crime in which a computer is used.
B)As any act in which cash is stolen using a computer.
C)As an illegal act in which a computer is an integral part of the crime.
D)As an illegal act in which knowledge of computer technology is essential.
A)As any crime in which a computer is used.
B)As any act in which cash is stolen using a computer.
C)As an illegal act in which a computer is an integral part of the crime.
D)As an illegal act in which knowledge of computer technology is essential.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
42
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as
A)lapping.
B)misappropriation of assets.
C)kiting.
D)concealment.
A)lapping.
B)misappropriation of assets.
C)kiting.
D)concealment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
43
Why is computer fraud often more difficult to detect than other types of fraud?
A)Rarely is cash stolen in computer fraud.
B)The fraud may leave little or no evidence it ever happened.
C)Computers provide more opportunities for fraud.
D)Computer fraud perpetrators are just more clever than other types of criminals.
A)Rarely is cash stolen in computer fraud.
B)The fraud may leave little or no evidence it ever happened.
C)Computers provide more opportunities for fraud.
D)Computer fraud perpetrators are just more clever than other types of criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
44
The most efficient way to conceal asset misappropriation is to
A)understate a stolen inventory item an asset account.
B)charge a stolen inventory item to an expense account.
C)not talk about the theft with anyone in the company.
D)record fictitious payments to vendors.
A)understate a stolen inventory item an asset account.
B)charge a stolen inventory item to an expense account.
C)not talk about the theft with anyone in the company.
D)record fictitious payments to vendors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following fraudulent acts generally takes most time and effort?
A)Lapping accounts receivable.
B)Selling stolen inventory to get cash.
C)Stealing inventory from the warehouse.
D)Creating false journal entries to overstate revenue.
A)Lapping accounts receivable.
B)Selling stolen inventory to get cash.
C)Stealing inventory from the warehouse.
D)Creating false journal entries to overstate revenue.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which situation below makes it easy for someone to commit a fraud?
A)Placing excessive trust in key employees.
B)Inadequate staffing within the organization.
C)Unclear company policies.
D)All of the above situations make it easy for someone to commit a fraud.
A)Placing excessive trust in key employees.
B)Inadequate staffing within the organization.
C)Unclear company policies.
D)All of the above situations make it easy for someone to commit a fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following is the best way to hide theft of assets?
A)Only steal an immaterial amount of assets.
B)Conversion of stolen assets into cash.
C)Stealing cash from customer A and then using customer B's balance to pay customer A's accounts receivable.
D)Charging the stolen asset to an expense account.
A)Only steal an immaterial amount of assets.
B)Conversion of stolen assets into cash.
C)Stealing cash from customer A and then using customer B's balance to pay customer A's accounts receivable.
D)Charging the stolen asset to an expense account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is least likely to result in computer fraud?
A)Releasing data to unauthorized users.
B)Allowing computer users to test software upgrades.
C)Allowing computer operators full access to the computer room.
D)Storing backup tapes in a location where they can be quickly accessed.
A)Releasing data to unauthorized users.
B)Allowing computer users to test software upgrades.
C)Allowing computer operators full access to the computer room.
D)Storing backup tapes in a location where they can be quickly accessed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?
A)kiting
B)laundering
C)lapping
D)bogus expense
A)kiting
B)laundering
C)lapping
D)bogus expense
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is not one of the components of the fraud triangle?
A)Incentive
B)Rationalization
C)Susceptibility
D)Opportunity
A)Incentive
B)Rationalization
C)Susceptibility
D)Opportunity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?
A)Pressure
B)Opportunity
C)Rationalization
D)Concealment
A)Pressure
B)Opportunity
C)Rationalization
D)Concealment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which characteristic of the fraud triangle often stems from the belief that "the rules do not apply to me" within an organization?
A)Pressure
B)Opportunity
C)Rationalization
D)Concealment
A)Pressure
B)Opportunity
C)Rationalization
D)Concealment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
53
What are some of the distinguishing characteristics of fraud perpetrators?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is a financial pressure that could cause an employee to commit fraud?
A)A feeling of not being valued.
B)Having a grumbling and drug addiction.
C)Having a close association with suppliers and customers.
D)Having an anger management issue.
A)A feeling of not being valued.
B)Having a grumbling and drug addiction.
C)Having a close association with suppliers and customers.
D)Having an anger management issue.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
55
What is the most prevalent opportunity within most companies to commit fraud?
A)Lack of internal controls designed by management.
B)Failure by management to enforce the internal controls.
C)Weaknesses in the design of internal controls.
D)Management's belief that most employees would not commit fraud.
A)Lack of internal controls designed by management.
B)Failure by management to enforce the internal controls.
C)Weaknesses in the design of internal controls.
D)Management's belief that most employees would not commit fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
56
In many cases of fraud,the ________ takes more time and effort than the ________.
A)concealment; theft
B)theft; concealment
C)conversion; theft
D)conversion; concealment
A)concealment; theft
B)theft; concealment
C)conversion; theft
D)conversion; concealment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
57
Identify the opportunity below that could enable an employee to commit fraud.
A)An employee's spouse loses her job.
B)The company does not have a clear policies and procedures for the employee to follow.
C)The employee is experiencing financial hardship.
D)An employee is upset that he was passed over for a promotion.
A)An employee's spouse loses her job.
B)The company does not have a clear policies and procedures for the employee to follow.
C)The employee is experiencing financial hardship.
D)An employee is upset that he was passed over for a promotion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
58
Computer systems are particularly vulnerable to computer fraud because
A)perpetrators can steal, destroy, or alter massive amount of data in very little time, often leaving little evidence.
B)computer fraud can be much more difficult to detect than other types of fraud.
C)computer programs need to be modified illegally only once for them to operate improperly for as long as they are in use.
D)all of the above.
A)perpetrators can steal, destroy, or alter massive amount of data in very little time, often leaving little evidence.
B)computer fraud can be much more difficult to detect than other types of fraud.
C)computer programs need to be modified illegally only once for them to operate improperly for as long as they are in use.
D)all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
59
This component of the fraud triangle explains the incentive or motivation for someone to commit fraud.
A)Pressure
B)Rationalization
C)Concealment
D)Opportunity
A)Pressure
B)Rationalization
C)Concealment
D)Opportunity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
60
Why is computer fraud often much more difficult to detect than other types of fraud?
A)Because fraud can be committed in only seconds, leaving little-to-no evidence.
B)Because most perpetrators do not spend their illegal income immediately, concealing key evidence.
C)Because most computer criminals are older and more cunning than perpetrators of other types of fraud.
D)Because perpetrators usually only steal immaterial amounts of money at a time, requiring a long period of time to pass before discovery
A)Because fraud can be committed in only seconds, leaving little-to-no evidence.
B)Because most perpetrators do not spend their illegal income immediately, concealing key evidence.
C)Because most computer criminals are older and more cunning than perpetrators of other types of fraud.
D)Because perpetrators usually only steal immaterial amounts of money at a time, requiring a long period of time to pass before discovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
61
The simplest and most common way to commit a computer fraud is to
A)alter computer input.
B)alter computer output.
C)modify the processing.
D)corrupt the database.
A)alter computer input.
B)alter computer output.
C)modify the processing.
D)corrupt the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
62
Discuss the reasons for the rapid increase of computer fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
63
Describe at least four ways a company can make fraud less likely to occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
64
Why do fraudulent acts often go unreported and are therefore not prosecuted?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
65
Downloading a master list of customers and selling it to a competitor is an example of
A)data fraud.
B)output theft.
C)download fraud.
D)fraudulent financial reporting.
A)data fraud.
B)output theft.
C)download fraud.
D)fraudulent financial reporting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
66
Explain the various computer fraud classifications using the data processing model.Provide an example for each computer fraud classification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following is an example of data fraud?
A)A man used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.
B)Two accountants without the appropriate access rights hacked into Cisco''s stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.
C)The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities.
D)A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.
A)A man used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.
B)Two accountants without the appropriate access rights hacked into Cisco''s stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.
C)The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities.
D)A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
68
Which of the following is an example of processor fraud?
A)A man used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.
B)Two accountants without the appropriate access rights hacked into Cisco's stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.
C)The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities.
D)A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.
A)A man used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.
B)Two accountants without the appropriate access rights hacked into Cisco's stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.
C)The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities.
D)A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
69
Why do many computer fraud cases go unreported and unprosecuted?
A)Many companies believe the adverse publicity would result in copycat fraud and a loss of customer confidence, which could cost more than the fraud itself.
B)It is difficult to calculate total losses when information is stolen, websites are defaced, and viruses shut down entire computer systems.
C)Because of lack of funding and skilled staff, law enforcement investigates only 1 in 15 computer crimes.
D)All of the above
A)Many companies believe the adverse publicity would result in copycat fraud and a loss of customer confidence, which could cost more than the fraud itself.
B)It is difficult to calculate total losses when information is stolen, websites are defaced, and viruses shut down entire computer systems.
C)Because of lack of funding and skilled staff, law enforcement investigates only 1 in 15 computer crimes.
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
70
Describe four ways companies can reduce losses from fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which of the following is an example of output fraud?
A)A man used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.
B)Two accountants without the appropriate access rights hacked into Cisco''s stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.
C)The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities.
D)A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.
A)A man used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.
B)Two accountants without the appropriate access rights hacked into Cisco''s stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.
C)The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities.
D)A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
72
________ is a simple,yet effective,method for catching or preventing many types of employee fraud.
A)Requiring all employees to take annual vacations
B)Monitoring all employees computer usage activities
C)Requiring all employees to take a fraud prevention awareness course
D)Explaining that fraud is illegal and will be severely punished to employees
A)Requiring all employees to take annual vacations
B)Monitoring all employees computer usage activities
C)Requiring all employees to take a fraud prevention awareness course
D)Explaining that fraud is illegal and will be severely punished to employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following is an example of input fraud?
A)A man used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.
B)Two accountants without the appropriate access rights hacked into Cisco''s stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.
C)The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities.
D)A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.
A)A man used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.
B)Two accountants without the appropriate access rights hacked into Cisco''s stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.
C)The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities.
D)A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
74
A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan.The teller appeared to process the payment,but told the customer the printer was jammed and she can't print a receipt.The customer accepted the excuse and drove away.The teller pocketed the cash and wrote down customer #1's loan number and payment amount for future reconciling.A couple of days before customer #1's monthly statement was printed,the teller recorded a cash payment from customer #2 as if it were made by customer #1.The teller pocketed the difference between the two payments.The teller continued to steal and misapply customer payments for the next two years without detection.
Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.
Identify the type of fraud scheme described.Describe five controls you would implement to address the fraud risk,and label each control as preventive or detective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
75
What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
76
The day after Christmas,Jane Olson,Chief Information Officer at American Trading Corporation (ATC),received some bad news.The hard drive use to store the company's system data backups was lost while it was being transported to an offsite storage location.Jane called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?
A)ATC has a comprehensive disaster recovery plan.
B)The hard drive was encrypted and password protected.
C)The shipper has insurance that will reimburse ATC for the cost of the hard drive.
D)ATC has a copy of the hard drive onsite, so a new copy for storage offsite can easily be prepared.
A)ATC has a comprehensive disaster recovery plan.
B)The hard drive was encrypted and password protected.
C)The shipper has insurance that will reimburse ATC for the cost of the hard drive.
D)ATC has a copy of the hard drive onsite, so a new copy for storage offsite can easily be prepared.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
77
The fraud that requires the least computer knowledge or skill involves
A)altering or falsifying source data.
B)unauthorized use of computers.
C)tampering with or copying software.
D)forging documents like paychecks.
A)altering or falsifying source data.
B)unauthorized use of computers.
C)tampering with or copying software.
D)forging documents like paychecks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
78
At the beginning of this chapter,you were presented with a situation regarding Jason Scott.Jason is an internal auditor for Northwest Industries,a forest products company.On March 31,he reviewed his completed tax return and noticed that the federal income tax withholding on his final paycheck was $5 more than the amount indicated on his W-2 form.He used the W-2 amount to complete his tax return and made a note to ask the payroll department what happened to the other $5.The next day,Jason was swamped,and he dismissed the $5 difference as immaterial.On April 16,a coworker grumbled that the company had taken $5 more from his check than he was given credit for on his W-2.When Jason realized he was not the only one with the $5 discrepancy,he investigated and found that all 1,500 employees had the same $5 discrepancy.He also discovered that the W-2 of Don Hawkins,the payroll programmer,had
thousands of dollars more in withholdings reported to the Internal Revenue Service (IRS)than had been withheld from his paycheck.
Identify the type of fraud scheme may have happened as described.Describe controls you would implement to address the fraud risk,and label each control as preventive or detective.
thousands of dollars more in withholdings reported to the Internal Revenue Service (IRS)than had been withheld from his paycheck.
Identify the type of fraud scheme may have happened as described.Describe controls you would implement to address the fraud risk,and label each control as preventive or detective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which of the following will not reduce the likelihood of an occurrence of fraud?
A)Encryption of data and programs.
B)Use of forensic accountants.
C)Adequate insurance coverage.
D)Required vacations and rotation of duties.
A)Encryption of data and programs.
B)Use of forensic accountants.
C)Adequate insurance coverage.
D)Required vacations and rotation of duties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
80
Most frauds are detected by
A)external auditors.
B)hotline tip.
C)internal auditors.
D)forensic accountants.
A)external auditors.
B)hotline tip.
C)internal auditors.
D)forensic accountants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck