Ch 11 Computer Fraud Flashcards
Perhaps the most striking fact about natural disasters in relation to AIS controls is that
A) many companies in one location can be seriously affected at one time by a disaster.
B) losses are absolutely unpreventable.
C) there are a large number of major disasters every year.
D) disaster planning has largely been ignored in the literature.
A) many companies in one location can be seriously affected at one time by a disaster.
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
A) human errors and omissions
B) physical threats such as natural disasters
C) dishonest employees
D) fraud and embezzlement
A) human errors and omissions
Identify the threat below that is not one of the four types of threats faced by accounting information systems.
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency
D) system inefficiency
4) A power outage is an example of a(n) ________ threat.
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency
B) software errors and equipment malfunctions
Excessive heat is an example of a(n) ________ threat.
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency
A) natural and political disasters
What was the first known cyber-attack intended to harm a real-world physical target? A) Sasser B) Stuxnet C) Michelangelo D) Doomsday
B) Stuxnet
What agency did the United States create to use cyber weapons and to defend against cyber attacks? A) U.S. Cyber Command B) Department of Network Security C) Department of Cyber Defense D) Department of Technology Strategy
A) U.S. Cyber Command
Which type of threat causes the greatest dollar losses?
A) software errors and equipment malfunctions
B) unintentional acts
C) intentional acts
D) system inefficiency
B) unintentional acts
Logic errors are an example of which type of threat?
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency
C) unintentional acts
Seble wants to open a floral shop in a downtown business district. She doesn’t have funds enough to purchase inventory and pay six months’’ rent up front. Seble approaches a good friend, Zhou, to discuss the possibility of Zhou investing funds and becoming a 25% partner in the business. After a lengthy discussion Zhou agrees to invest. Eight months later, Zhou and Seble have a major argument. In order for Zhou to sue Seble for fraud, all the following must be true except
A) Zhou’s decision to invest was primarily based on Seble’s assertion that she had prior floral retail experience.
B) Seble told Zhou she had worked at a floral shop for several years, when in fact she did not have any prior experience in floral retail.
C) before Zhou invested, Seble prepared a detailed business plan and sales forecasts, and provided Zhou with copies.
D) Zhou’s 25% share of the business is worth substantially less than her initial investment.
C) before Zhou invested, Seble prepared a detailed business plan and sales forecasts, and provided Zhou with copies.
Perpetrators do not typically
A) attempt to return or pay back stolen amounts soon after the initial theft, but find they are unable to make full restitution.
B) use trickery or lies to gain the confidence and trust of others at the organization they defraud.
C) become bolder and more greedy the longer the theft remains undetected.
D) begin to rely on stolen amounts as part of their income.
A) attempt to return or pay back stolen amounts soon after the initial theft, but find they are unable to make full restitution.
) "Cooking the books" is typically accomplished by all the following except A) overstating inventory. B) accelerating recognition of revenue. C) inflating accounts payable. D) delaying recording of expenses.
C) inflating accounts payable.
) SAS No. 99 requires that auditors
A) plan audits based on an analysis of fraud risk.
B) detect all material fraud.
C) alert the Securities and Exchange Commission of any fraud detected.
D) take all of the above actions.
A) plan audits based on an analysis of fraud risk.
Intentional or reckless conduct that results in materially misleading financial statements is called A) financial fraud. B) misstatement fraud. C) fraudulent financial reporting. D) audit failure fraud.
C) fraudulent financial reporting.
Which of the following is not an example of one of the basic types of fraud?
A) While straightening the store at the end of the day, a shoe store employee finds and keeps an expensive pair of sunglasses left by a customer.
B) An executive devised and implemented a plan to accelerate revenue recognition on a long-term contract, which will allow the company to forestall filing for bankruptcy. The executive does not own any stock, stock options or grants, and will not receive a bonus or perk because of the overstated revenue.
C) A purchasing agent places a large order at higher-than-normal unit prices with a vendor that gave the agent tickets to several football games.
D) A salesperson approves a large sales discount on an order from a company owned partially by the salesperson’s sister.
A) While straightening the store at the end of the day, a shoe store employee finds and keeps an expensive pair of sunglasses left by a customer.
All of the following are required for an act to be legally classified as fraudulent except A) a falsehood is made. B) about a material fact. C) to inflict pain. D) resulting in a financial loss.
C) to inflict pain.
) Misappropriation of assets is a fraudulent act that involves
A) dishonest conduct by those in power.
B) misrepresenting facts to promote an investment.
C) using computer technology to perpetrate.
D) theft of company property.
D) theft of company property.
Lapping is best described as the process of
A) applying cash receipts to a different customer’s account in an attempt to conceal previous thefts of cash receipts.
B) inflating bank balances by transferring money among different bank accounts.
C) stealing small amounts of cash, many times over a period of time.
D) increasing expenses to conceal that an asset was stolen.
A) applying cash receipts to a different customer’s account in an attempt to conceal previous thefts of cash receipts.
Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?
A) revenge against the company
B) intent to repay “borrowed” funds in the future
C) sense of entitlement as compensation for receiving a lower than average raise
D) belief that the company won’t suffer because an insurance company will reimburse losses
A) revenge against the company