13-16 Flashcards
(59 cards)
- Which of the following is NOT one of the three sources of external fraud discussed?
a. Vendors
b. Customers
c. Auditors
d. Unrelated third parties
c. Auditors
- Which of the following statements is true with regard to external fraud threats?
a. Unrelated third parties pose the greatest threat to an organization
b. Only companies that contract with vendors are at a risk of external fraud
c. A member of an organization’s board of directors committing fraud against that organization is an example of external fraud
d. Companies that house large amounts of customer payment data are especially vulnerable to external fraud threats
d. Companies that house large amounts of customer payment data are especially vulnerable to external fraud threats
- What is a paperhanger?
a. A person who is an expert in check fraud
b. A person who counterfeits money
c. A person who specializes in e-commerce check scams
d. A person who is an expert in credit card fraud
a. A person who is an expert in check fraud
- Which of the following statements is true with regard to credit cards?
a. Less than half of the U.S. population has a credit card
b. The chances of being caught using an unauthorized card are small
c. Counterfeit credit cards are known as “black plastic” cards
d. The hologram is the easiest part of a credit card to duplicate
b. The chances of being caught using an unauthorized card are small
- Taylor is a procurement specialist for Hillside Corporation. He is reviewing contracts, and notices a pattern between three particular contractors. Contractor A bid the lowest on the first job, Contractor B bid the lowest on the second job, and Contractor C bid the lowest on the third job. All three contractors bid on all three jobs. Which of the following is a potential scheme perpetrated by these contractors?
a. Bid tailoring
b. Bid rotation
c. Complementary bids
d. Phantom bids
b. Bid rotation
- Which of the following is NOT one of the four phases of the procurement process?
a. The presolicitation phase
b. The solicitation phase
c. The performance phase
d. The project review phase
d. The project review phase
- A caterer has been contracted by Austin Corp. to provide the food for a large banquet. The catering contract explicitly states that the caterer will serve a fish entrée and a chicken entrée, and the fish entrée will consist of red snapper. The caterer decides to use tilapia instead, which costs about a third as much as red snapper, but is also a white fish and looks quite similar. He figures that no one at the banquet will be able to tell the difference. Austin Corp. is charged the price of the red snapper. What type of scheme has the caterer perpetrated?
a. Product substitution
b. Cost mischarging
c. Material deception
d. Contract falsification
a. Product substitution
- Which of the following is the best way to prevent vendor fraud?
a. Conduct vendor audits
b. Perform services in-house rather than using vendors
c. Disallow any contract modifications
d. Require a minimum of three vendors to be considered for any project
a. Conduct vendor audits
- Which of the following is a key finding from the 2010/2011 Computer Crime and Security Survey?
a. Data manipulation is one of the most commonly seen attacks.
b. Almost 80% of the survey respondents experienced at least one security incident.
c. Respondents believed that the activities of outsiders accounted for much of their losses from cybercrime.
d. All companies surveyed had a technical expert on staff.
c. Respondents believed that the activities of outsiders accounted for much of their losses from cybercrime.
- Why are computer fraud cases difficult for a fraud examiner to investigate?
a. They lack a traditional paper audit trail.
b. They require an understanding of the technology used to commit the crime.
c. They require the use of one or more specialists to assist the fraud examiner.
d. All of the above are reasons why computer fraud cases are difficult to investigate.
d. All of the above are reasons why computer fraud cases are difficult to investigate.
- ________________ is the use of technology to gain unauthorized access to sensitive information on a computer system.
a. Data manipulation
b. Computer hacking
c. Social engineering
d. Computer crime
b. Computer hacking
- Password cracking, social engineering, and phishing are all:
a. Methods used to gain unauthorized access
b. Data manipulation tactics
c. Corporate espionage tactics
d. None of the above
a. Methods used to gain unauthorized access
- Max Reynolds is trying to obtain customer payment data from Stella Corporation. He wanders around Stella’s offices pretending to be a confused intern, looking for someone who can help him get on his computer. An unsuspecting employee gives him her login information, not realizing the amount of data she has just given him access to. He downloads several spreadsheets of customer payment data and takes off. What type of scheme has Max committed against Stella Corporation?
a. Phishing
b. Password cracking
c. Social engineering
d. Employee hijacking
c. Social engineering
- Which of the following is commonly used to perpetrate data manipulation and destruction schemes?
a. Wire tapping
b. Data dumps
c. Network infiltration
d. Malware
d. Malware
- If an organization offers wireless or remote access, its server software should terminate any connection:
a. From a foreign country
b. Cash larceny
c. After a certain number of unsuccessful attempts to enter an invalid password
d. Skimming
c. After a certain number of unsuccessful attempts to enter an invalid password
- All of the following are examples of malware EXCEPT:
a. Blackware
b. Virus
c. Trojan horse
d. Botnet
a. Blackware
- What is encryption?
a. Impersonating one of the organization’s computers to get access to the network
b. A type of intrusion detection system
c. A company’s criteria for password selection
d. Procedures used to convert information using an algorithm that makes it unreadable
d. Procedures used to convert information using an algorithm that makes it unreadable
- Which of the following does corporate espionage include?
a. Legitimate intelligence collection
b. Acquisition of information through clandestine means
c. Intelligence analysis using legal means
d. All of the above
b. Acquisition of information through clandestine means
- According to the textbook, which of the following is NOT one of a corporate spy’s favorite departments to target?
a. Research and development
b. Legal
c. Marketing
d. Human resources
b. Legal
- What is a recommended preventative measure a company should take to protect its physical property?
a. Send and receive all mail from company premises
b. Ensure outdoor waste receptacles are locked and guarded
c. Keep sensitive documents out of sight and in employees’ drawers
d. Ensure the cleaning staff only works after business hours
b. Ensure outdoor waste receptacles are locked and guarded
- Factors that influence the level of fraud risk faced by an organization include which of the following?
a. The nature of the business
b. The effectiveness of the organization’s internal control
c. The ethics and values of the organization and the people in it
d. All of the above
d. All of the above
- _________ controls are designed to stop an undesirable event from occurring, whereas _________ controls are designed to identify an undesirable event that has already occurred.
a. Preventive; detective
b. Internal; external
c. Risk; discovery
d. Operating; review
a. Preventive; detective
- Fraudulent financial reporting risks include which of the following?
a. Payment of bribes or gratuities
b. Aiding and abetting of fraud by outside parties
c. Inappropriately reflected balance sheet amounts
d. Misappropriation of intangible assets
c. Inappropriately reflected balance sheet amounts
- Which of the following factors should be considered when selecting a sponsor for the fraud risk assessment?
a. Seniority
b. Independence
c. Ability to elicit cooperation
d. All of the above
d. All of the above