Chapter 3-Fraud, Ethics & Internal Control Flashcards

1
Q

Audit Trail

A

presents verifiable information about the accuracy of accounting records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availibility

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Check Fraud

A

involve the customer’s use of stolen or fraudulent checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control Objectives for Information Technology (COBIT)

A

extremely important guidance for those who design or audit IT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collusion

A

occurs when two or more people work together to commit fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compensating Control

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control Activities

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control Environment

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Committee of Sponsoring Organizations (COSO)

A

issuer of the Internal Controls Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credit Card Fraud

A

involve the customer’s use of stolen or fraudulent credit cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Customer Fraud

A

Occurs when a customer improperly obtains cash or property from a company, or avoids a liability through deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Defalcation

A

Misappropriation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of Service Attack

A

intended to overwhelm an intended target computer system with so much bogus network traffic that the system is unable to respond to valid network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employee Fraud

A

Conducted by non-management employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Foreign Corrupt Practices Act

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fraud

A

the theft, concealment, and conversion to personal gain of another’s money, physical assets, or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fraud Triangle

A
  1. Opportunity 2. Incentive 3. Rationalization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

General Authorization

A

asdf

20
Q

Hacking

A

the term commonly used for computer network break-ins.

21
Q

Independent Checks

A

Serve as a method to confirm the accuracy and completeness of data in the accounting system

22
Q

Industrial Espionage

A

The theft of proprietary company information, by digging through the trash of the intended target company or hacking into the target’s computer systems.

23
Q

Information & Communication

A

asdf

24
Q

Information Criteria

A

asdf

25
Q

Internal Theft

A

Misappropriation of assets

26
Q

IT Resources

A

asdf

27
Q

Kickbacks

A

a cash payment that the vendor gives the employee in exchange for the sale, it is like a business bribe

28
Q

Larceny

A

Theft of company cash after it’s been recorded in the accounting records

29
Q

Management Fraud

A

conducted by one or more upper-level managers within the company. (Usually in the form of financial reporting)

30
Q

Management Override

A

circumvention of the systems of internal controls that are in place

31
Q

Misappropriation of Assets

A

theft of any item of value

32
Q

Monitoring

A

asdf

33
Q

Preventative Controls

A

designed to avoid errors, fraud, or events not authorized by management.

34
Q

Reasonable Assurance

A

the controls achieve a sensible balance of reducing risk when compared with the cost of the control

35
Q

Refund Fraud

A

occurs when a customer tries to return stolen goods to collect a cash refund

36
Q

Salami Technique

A

alters a program to slice a small amount from several accounts and then credit those small amounts to the perpetrator’s benefit. Think about the movie “Office Space”

37
Q

Skimming

A

The organization’s cash is stolen before it is entered into the accounting records.

38
Q

Software Piracy

A

the unlawful copying of software programs

39
Q

Specific Authorization

A

asdf

40
Q

Spoofing

A

occurs when a person, through a computer system, pretends to be someone else.

41
Q

Stewardship

A

The careful and responsible oversight and use of the assets entrusted to management.

42
Q

Trap Door Alteration

A

a valid programming tool that is misused to commit fraud.

43
Q

Trojan Horse Program

A

a small, unauthorized program within a larger, legitimate program, used to manipulate the computer system to conduct a fraud.

44
Q

Trust Services Principles

A

set forth guidance for CPAs who provide assurance services for organizations

45
Q

Vendor Audit

A

involved the examination of vendor records in support of amounts charged to the company

46
Q

Vendor Fraud

A

Occurs when vendors obtain payments to which they are not entitled.