exam 2 Flashcards

(58 cards)

1
Q

A scheme where the perpetrator steals the cash or check that customer A mails in to pay its accounts receivable, then the perpetrator takes the funds from customer B to later cover that account. And so on with customer C.

A

Lapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following creates an environment where computer fraud is less likely to occur?

A

Increase the penalties for committing fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Kitting is a scheme in which:

A

Insufficient funds are covered up by deposits made at one bank by checks drawn at another bank.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not part of the fraud triangle?

A

All are part of the fraud triangle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In order for an act to be legally considered fraud it must be all of the following except

A

No intent to deceive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to Statement on Auditing Standards No. 99 (SAS 99) an auditor should do all of the following except:

A

Acquire malpractice insurance in case the auditor does not detect actual fraud during the audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to the opportunity part of the fraud triangle, a person may do all of the following acts except:

A

Control the fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following pressures are classified as Management Characteristics that can lead to financial statement fraud?

A

High management and/or employee turnover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All of the following are classifications of computer fraud except:

A

Reconciliation fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following actions are used to reduce fraud loss after fraud occurs?

A

Maintain adequate insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is considered a financial pressure (as opposed to emotional or lifestyle pressures) that can lead to employee fraud?

A

Poor credit ratings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There are many threats to accounting information systems. Which of the following is an example of an Intentional Act?

A

Computer Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A computer crime that involves attacking phone lines is:

A

phreaking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hackers use all of the following techniques except:

A

war driving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering is most likely to facilitate what type of computer fraud?

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The computer crime of piggybacking

A

can involve the clandestine use of another user’s WIFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network of computers used in a denial-of-service (DoS) attack is called a(n):

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Time bombs are most likely planted in an information system by:

A

disgruntled computer programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Spyware infections came from:

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is not a characteristic of computer viruses?

A

They are easy to detect and destroy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is known as a zero-day attack?

A

an attack between the time a new software vulnerability is discovered and the time a patch for fixing the problem is released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is a method used to embezzle money a small amount at a time from many different accounts?

A

Salami technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is not a method that is used for identity theft?

A

spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A computer fraud and abuse technique that steals information, trade secrets, and intellectual property.

A

economic espionage

25
The Sarbanes Oxley Act is the most important business-oriented legislation in the past 80 years. Which of the following are elements of the Sarbanes Oxley Act?
All of the above
26
After the Sarbanes Oxley Act (SOX) was passed, the Securities and Exchange Commission (SEC) required management to do which of the following:
report material internal control weaknesses
27
Which of the following system(s) compares actual performance with planned performance?
diagnostic control system
28
Which of the following is (are) a component(s) of COSO's internal control model?
all of the above
29
What is (are) a principle(s) behind enterprise risk management (ERM)?
all of the above
30
General authorization is different from specific authorization. With general authorization an employee in the proper functional area can:
all of the above
31
The ERM model includes an element called Risk Response. According to that element, which of the following is an appropriate way to respond to risk?
Share the risk with another
32
What is an assumption underlying the valuation of internal controls?
The internal control should at least provide reasonable assurance that control problems do not develop
33
Which functions should be segregated?
all of the above
34
Which of the following is not a principle applicable to project development and acquisition controls?
network management
35
According to sound internal control concepts, which of the following systems duties should be segregated?
Answers 1 and 2 are correct
36
Which of the following are internal control functions?
all of the above are internal control functions
37
Component 1
Control Environment
38
The organization demonstrates a commitment to _____ and ______ _______.
integrity; ethical values
39
The board of directors demonstrates ________ from management and ________ ________ of the development and performance of internal control.
independence; exercises oversight
40
_________ establishes, with ______ oversight, structures, reporting lines, and appropriate authorities and responsibilities in the _______ __ _________.
Management; board; pursuit of objectives
41
The organization demonstrates a commitment to attract, develop, and retain _______ ________ in alignment with objectives.
competent individuals
42
The organization _______ ________ ________ for their internal control responsibilities in the pursuit of objectives.
holds individuals accountable
43
Component 2
Risk Assessment
44
The organization specifies _________ with ________ ________ to enable the identification and assessment of risks relating to objectives.
objectives; sufficient clarity
45
The organization _______ _______ to the achievement of its objectives across the entity and ________ _____ as a basis for determining how the risks should be managed.
identifies risks; analyzes risks
46
The organization considers the _______ ____ _______ in assessing risks to the achievement of objectives.
potential for fraud
47
The organization _______ and _______ _______ that could significantly impact the system of internal control.
identifies; assesses changes
48
Component 3
Control Activities
49
The organization selects and develops _____ ______ that contribute to the mitigation of risks to the achievement of objectives to _______ ______.
control activities; acceptable levels
50
The organization selects and develops general ______ _______ over _______ to support the achievement of objectives.
control activities; technology
51
The organization deploys ______ _____ through _____ that establish what is expected and _____ that put policies into action.
control activities; policies; procedures
52
Component 4
Information and Communication
53
The organization obtains or generates and uses ______, _______ ________ to support the functioning of internal control.
relevant; quality information
54
The organization _______ __________ _______, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
internally communicates information
55
The organization ______ with _______ _______ regarding matters affecting the functioning of internal control.
communicates; external parties
56
Component 5
Monitoring Activities
57
The organization selects, develops, and performs ongoing and/or separate _______ to ascertain whether the _____ of internal control are present and functioning.
evaluations; components
58
The organization _____ and ________ internal control ________ in a timely manner to those participants responsible for taking corrective action, including senior management and the board of directors, as appropriate.
evaluates; communicates; deficiencies