exam 2 Flashcards
A scheme where the perpetrator steals the cash or check that customer A mails in to pay its accounts receivable, then the perpetrator takes the funds from customer B to later cover that account. And so on with customer C.
Lapping
Which of the following creates an environment where computer fraud is less likely to occur?
Increase the penalties for committing fraud.
Kitting is a scheme in which:
Insufficient funds are covered up by deposits made at one bank by checks drawn at another bank.
Which of the following is not part of the fraud triangle?
All are part of the fraud triangle.
In order for an act to be legally considered fraud it must be all of the following except
No intent to deceive
According to Statement on Auditing Standards No. 99 (SAS 99) an auditor should do all of the following except:
Acquire malpractice insurance in case the auditor does not detect actual fraud during the audit.
According to the opportunity part of the fraud triangle, a person may do all of the following acts except:
Control the fraud.
Which of the following pressures are classified as Management Characteristics that can lead to financial statement fraud?
High management and/or employee turnover
All of the following are classifications of computer fraud except:
Reconciliation fraud.
Which of the following actions are used to reduce fraud loss after fraud occurs?
Maintain adequate insurance.
Which of the following is considered a financial pressure (as opposed to emotional or lifestyle pressures) that can lead to employee fraud?
Poor credit ratings
There are many threats to accounting information systems. Which of the following is an example of an Intentional Act?
Computer Fraud
A computer crime that involves attacking phone lines is:
phreaking.
Hackers use all of the following techniques except:
war driving.
Social engineering is most likely to facilitate what type of computer fraud?
identity theft
The computer crime of piggybacking
can involve the clandestine use of another user’s WIFI
A network of computers used in a denial-of-service (DoS) attack is called a(n):
botnet
Time bombs are most likely planted in an information system by:
disgruntled computer programmers
Spyware infections came from:
all of the above
Which of the following is not a characteristic of computer viruses?
They are easy to detect and destroy.
Which of the following is known as a zero-day attack?
an attack between the time a new software vulnerability is discovered and the time a patch for fixing the problem is released
Which of the following is a method used to embezzle money a small amount at a time from many different accounts?
Salami technique
Which of the following is not a method that is used for identity theft?
spamming