Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 16
Quiz 5: Computer Fraud and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Computer fraud can be analyzed using the traditional data processing model.According to this model,the simplest and most common fraud is __________ fraud.
Question 22
Multiple Choice
What is the most prevalent opportunity within most companies to commit fraud?
Question 23
Multiple Choice
Many fraud cases go unreported and unprosecuted for several reasons.Why is this the case?
Question 24
Multiple Choice
How can funds be stolen in payroll fraud?
Question 25
Multiple Choice
What is a denial of service attack?
Question 26
Multiple Choice
The US Justice Department defines computer fraud as
Question 27
Multiple Choice
What is one common way to hide a theft?
Question 28
Multiple Choice
Computer fraud is often much more difficult to detect than other types of fraud because
Question 29
Multiple Choice
Stealing a master list of customers and selling it to a competitor is an example of
Question 30
Multiple Choice
In a disbursement fraud the company
Question 31
Multiple Choice
Characteristics connected with fraud include pressures,opportunities,and rationalizations.Of these characteristics,which one often stems from a lack of internal controls within an organization?
Question 32
Multiple Choice
In a __________ scheme,customer receipts are stolen and then subsequent payments by other customers are misapplied to cover the theft of the original receipts.
Question 33
Multiple Choice
Characteristics connected with fraud include pressures,opportunities,and rationalizations.Of these characteristics,which one relates to excuses that perpetrators have allowing them to justify their illegal behavior?
Question 34
Multiple Choice
Why is computer fraud often more difficult to detect than other types of fraud?
Question 35
Multiple Choice
One computer fraud technique is known as data diddling.What is it?
Question 36
Multiple Choice
Computer fraud has been categorized into several different classifications.The classification of computer fraud where the perpetrator causes a company to pay for ordered goods,or to pay for goods never ordered is called