Chapter 5

Is this your test? Login to manage it. If not, you can make a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following fraudulent acts generally takes most time and effort?
2.
1 point
Which of the following is the best way to hide theft of assets?
3.
1 point
Identify the threat below that is not one of the four types of threats faced by accounting information systems.
4.
1 point
Misappropriation of assets is a fraudulent act that involves
5.
1 point
This component of the fraud triangle explains how perpetrators justify their (illegal) behavior.
6.
1 point
What is the most prevalent opportunity within most companies to commit fraud?
7.
1 point
In many cases of fraud, the ________ takes more time and effort than the ________.
8.
1 point
Insiders are frequently the ones who commit fraud because
9.
1 point
Which situation below makes it easy for someone to commit a fraud?
10.
1 point
Identify the opportunity below that could enable an employee to commit fraud.
11.
1 point
Why is computer fraud often more difficult to detect than other types of fraud?
12.
1 point
Intentional or reckless conduct that results in materially misleading financial statements is called
13.
1 point
On Tuesday morning, Chen Lee, Chief Information Officer at American Trading Corporation (ATC), got some bad news. The hard drive use to store system data backups was lost while it was being transported to an offsite storage location. Chen called a meeting of her technical staff to discuss the implications of the loss. Which of the following is most likely to relieve her concerns over the potential cost of the loss?
14.
1 point
Logic errors are an example of which type of threat?
15.
1 point
Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?
16.
1 point
How does the U.S. Justice Department define computer fraud?
17.
1 point
What agency did the United States create to use cyber weapons and to defend against cyber attacks?
18.
1 point
________ is a simple, yet effective, method for catching or preventing many types of employee fraud.
19.
1 point
Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?
20.
1 point
Lapping is best described as the process of
21.
1 point
The fraud that requires the least computer knowledge or skill involves
22.
1 point
Most frauds are detected by
23.
1 point
Downloading a master list of customers and selling it to a competitor is an example of
24.
1 point
Excessive heat is an example of a(n) ________ threat.
25.
1 point
Seble wants to open a floral shop in a downtown business district. She doesn't have funds enough to purchase inventory and pay six months'' rent up front. Seble approaches a good friend, Zhou, to discuss the possibility of Zhou investing funds and becoming a 25% partner in the business. After a lengthy discussion Zhou agrees to invest. Eight months later, Zhou and Seble have a major argument. In order for Zhou to sue Seble for fraud, all the following must be true except
26.
1 point
A power outage is an example of a(n) ________ threat.
27.
1 point
Which of the following is not a way to make fraud less likely to occur?
28.
1 point
Researchers have compared the psychological and demographic characteristics of white-collar criminals, violent criminals, and the general public. They found that
29.
1 point
Perpetrators do not typically
30.
1 point
All of the following are required for an act to be legally classified as fraudulent except
31.
1 point
The simplest and most common way to commit a computer fraud is to
32.
1 point
Which of the following is a financial pressure that could cause an employee to commit fraud?
33.
1 point
"Cooking the books" is typically accomplished by all the following except
34.
1 point
Why do many fraud cases go unreported and unprosecuted?
35.
1 point
What was the first known cyber-attack intended to harm a real-world physical target?
36.
1 point
Which of the following is not a way to improve fraud detection?
37.
1 point
Which of the following is not a management characteristic that increases pressure to commit fraudulent financial reporting?
38.
1 point
Which of the following is least likely to result in computer fraud?
39.
1 point
The most efficient way to conceal asset misappropriation is to
40.
1 point
Which type of threat causes the greatest dollar losses?
41.
1 point
Which of the following is not a way to reduce fraud losses?
42.
1 point
Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?
43.
1 point
Explain the threats faced by modern information systems.
44.
1 point
SAS No. 99 requires that auditors
45.
1 point
Why is computer fraud often much more difficult to detect than other types of fraud?
46.
1 point
Which of the following is not an example of one of the basic types of fraud?
47.
1 point
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as
48.
1 point
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
49.
1 point
Which of the following will not reduce the likelihood of an occurrence of fraud?