Ch 11 Computer Fraud Flashcards

1
Q

Perhaps the most striking fact about natural disasters in relation to AIS controls is that
A) many companies in one location can be seriously affected at one time by a disaster.
B) losses are absolutely unpreventable.
C) there are a large number of major disasters every year.
D) disaster planning has largely been ignored in the literature.

A

A) many companies in one location can be seriously affected at one time by a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
A) human errors and omissions
B) physical threats such as natural disasters
C) dishonest employees
D) fraud and embezzlement

A

A) human errors and omissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identify the threat below that is not one of the four types of threats faced by accounting information systems.
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency

A

D) system inefficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4) A power outage is an example of a(n) ________ threat.
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency

A

B) software errors and equipment malfunctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Excessive heat is an example of a(n) ________ threat.
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency

A

A) natural and political disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What was the first known cyber-attack intended to harm a real-world physical target?
A) Sasser
B) Stuxnet
C) Michelangelo
D) Doomsday
A

B) Stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
What agency did the United States create to use cyber weapons and to defend against cyber attacks?
A) U.S. Cyber Command
B) Department of Network Security
C) Department of Cyber Defense
D) Department of Technology Strategy
A

A) U.S. Cyber Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of threat causes the greatest dollar losses?
A) software errors and equipment malfunctions
B) unintentional acts
C) intentional acts
D) system inefficiency

A

B) unintentional acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logic errors are an example of which type of threat?
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency

A

C) unintentional acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Seble wants to open a floral shop in a downtown business district. She doesn’t have funds enough to purchase inventory and pay six months’’ rent up front. Seble approaches a good friend, Zhou, to discuss the possibility of Zhou investing funds and becoming a 25% partner in the business. After a lengthy discussion Zhou agrees to invest. Eight months later, Zhou and Seble have a major argument. In order for Zhou to sue Seble for fraud, all the following must be true except
A) Zhou’s decision to invest was primarily based on Seble’s assertion that she had prior floral retail experience.
B) Seble told Zhou she had worked at a floral shop for several years, when in fact she did not have any prior experience in floral retail.
C) before Zhou invested, Seble prepared a detailed business plan and sales forecasts, and provided Zhou with copies.
D) Zhou’s 25% share of the business is worth substantially less than her initial investment.

A

C) before Zhou invested, Seble prepared a detailed business plan and sales forecasts, and provided Zhou with copies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Perpetrators do not typically
A) attempt to return or pay back stolen amounts soon after the initial theft, but find they are unable to make full restitution.
B) use trickery or lies to gain the confidence and trust of others at the organization they defraud.
C) become bolder and more greedy the longer the theft remains undetected.
D) begin to rely on stolen amounts as part of their income.

A

A) attempt to return or pay back stolen amounts soon after the initial theft, but find they are unable to make full restitution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
) "Cooking the books" is typically accomplished by all the following except
A) overstating inventory.
B) accelerating recognition of revenue.
C) inflating accounts payable.
D) delaying recording of expenses.
A

C) inflating accounts payable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

) SAS No. 99 requires that auditors
A) plan audits based on an analysis of fraud risk.
B) detect all material fraud.
C) alert the Securities and Exchange Commission of any fraud detected.
D) take all of the above actions.

A

A) plan audits based on an analysis of fraud risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Intentional or reckless conduct that results in materially misleading financial statements is called 
A) financial fraud. 
B) misstatement fraud. 
C) fraudulent financial reporting. 
D) audit failure fraud.
A

C) fraudulent financial reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not an example of one of the basic types of fraud?
A) While straightening the store at the end of the day, a shoe store employee finds and keeps an expensive pair of sunglasses left by a customer.
B) An executive devised and implemented a plan to accelerate revenue recognition on a long-term contract, which will allow the company to forestall filing for bankruptcy. The executive does not own any stock, stock options or grants, and will not receive a bonus or perk because of the overstated revenue.
C) A purchasing agent places a large order at higher-than-normal unit prices with a vendor that gave the agent tickets to several football games.
D) A salesperson approves a large sales discount on an order from a company owned partially by the salesperson’s sister.

A

A) While straightening the store at the end of the day, a shoe store employee finds and keeps an expensive pair of sunglasses left by a customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
All of the following are required for an act to be legally classified as fraudulent except 
A) a falsehood is made.
B) about a material fact.
C) to inflict pain.
D) resulting in a financial loss.
A

C) to inflict pain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

) Misappropriation of assets is a fraudulent act that involves
A) dishonest conduct by those in power.
B) misrepresenting facts to promote an investment.
C) using computer technology to perpetrate.
D) theft of company property.

A

D) theft of company property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Lapping is best described as the process of
A) applying cash receipts to a different customer’s account in an attempt to conceal previous thefts of cash receipts.
B) inflating bank balances by transferring money among different bank accounts.
C) stealing small amounts of cash, many times over a period of time.
D) increasing expenses to conceal that an asset was stolen.

A

A) applying cash receipts to a different customer’s account in an attempt to conceal previous thefts of cash receipts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?
A) revenge against the company
B) intent to repay “borrowed” funds in the future
C) sense of entitlement as compensation for receiving a lower than average raise
D) belief that the company won’t suffer because an insurance company will reimburse losses

A

A) revenge against the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

) Insiders are frequently the ones who commit fraud because
A) they are more dishonest than outsiders.
B) they need money more than outsiders.
C) they are less likely to get caught than outsiders.
D) they know more about the system and its weaknesses than outsiders.

A

D) they know more about the system and its weaknesses than outsiders.

21
Q

Which of the following is not a management characteristic that increases pressure to commit fraudulent financial reporting?
A) close relationship with the current audit engagement partner and manager
B) pay for performance incentives based on short-term performance measures
C) high management and employee turnover
D) highly optimistic earnings projections

A

A) close relationship with the current audit engagement partner and manager

22
Q

Researchers have compared the psychological and demographic characteristics of white-collar criminals, violent criminals, and the general public. They found that
A) few differences exist between white-collar criminals and the general public.
B) white-collar criminals eventually become violent criminals.
C) most white-collar criminals invest their illegal income rather than spend it.
D) most white-collar criminals are older and not technologically proficient.

A

A) few differences exist between white-collar criminals and the general public.

23
Q

Identify the opportunity below that could enable an employee to commit fraud.
A) An employee’s spouse loses her job.
B) An employee has a close association with suppliers or customers.
C) An employee suddenly acquires lots of credit cards.
D) An employee is upset that he was passed over for a promotion.

A

B) An employee has a close association with suppliers or customers.

24
Q

Which of the following is a financial pressure that could cause an employee to commit fraud?
A) a feeling of not being appreciated
B) failing to receive a deserved promotion
C) believing that their pay is too low relative to others around them
D) having a spouse injured in a car accident and in the hospital for several weeks

A

D) having a spouse injured in a car accident and in the hospital for several weeks

25
Q

Which of the following fraudulent acts generally takes most time and effort?
A) lapping accounts receivable
B) selling stolen inventory to get cash
C) stealing inventory from the warehouse
D) creating false journal entries to overstate revenue

A

A) lapping accounts receivable

26
Q
In many cases of fraud, the \_\_\_\_\_\_\_\_ takes more time and effort than the \_\_\_\_\_\_\_\_. 
A) concealment; theft 
B) theft; concealment 
C) conversion; theft 
D) conversion; concealment
A

A) concealment; theft

27
Q

Which of the following is the best way to hide theft of assets?
A) creating “cash” through the transfer of money between banks
B) conversion of stolen assets into cash
C) stealing cash from customer A and then using customer B’s balance to pay customer A’s accounts receivable
D) charging the stolen asset to an expense account

A

D) charging the stolen asset to an expense account

28
Q
Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?
A) kiting 
B) laundering 
C) lapping 
D) bogus expense
A

C) lapping

29
Q
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as 
A) lapping. 
B) misappropriation of assets. 
C) kiting. 
D) concealment.
A

C) kiting.

30
Q
Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization? 
A) pressure 
B) opportunity 
C) rationalization 
D) concealment
A

B) opportunity

31
Q

) Which situation below makes it easy for someone to commit a fraud?
A) placing excessive trust in key employees
B) inadequate staffing within the organization
C) unclear company policies
D) All of the above situations make it easy for someone to commit a fraud.

A

D) All of the above situations make it easy for someone to commit a fraud.

32
Q

What is the most prevalent opportunity within most companies to commit fraud?
A) lack of any internal controls
B) failure to enforce the internal controls
C) loopholes in the design of internal controls
D) management’s failure to believe employees would commit fraud

A

B) failure to enforce the internal controls

33
Q
This component of the fraud triangle explains how perpetrators justify their (illegal) behavior.
A) pressure
B) rationalization 
C) concealment
D) opportunity
A

B) rationalization

34
Q

The most efficient way to conceal asset misappropriation is to
A) write-off a customer receivable as bad debt.
B) alter monthly bank statements before reconciliation.
C) alter monthly physical inventory counts to reconcile to perpetual inventory records.
D) record phony payments to vendors.

A

A) write-off a customer receivable as bad debt.

35
Q

Which of the following is least likely to result in computer fraud?
A) releasing data to unauthorized users
B) allowing computer users to test software upgrades
C) allowing computer operators full access to the computer room
D) storing backup tapes in a location where they can be quickly accessed

A

C) allowing computer operators full access to the computer room

36
Q

How does the U.S. Justice Department define computer fraud?
A) as any crime in which a computer is used
B) as any act in which cash is stolen using a computer
C) as an illegal act in which a computer is an integral part of the crime
D) as an illegal act in which knowledge of computer technology is essential

A

D) as an illegal act in which knowledge of computer technology is essential

37
Q

Why is computer fraud often much more difficult to detect than other types of fraud?
A) because massive fraud can be committed in only seconds, leaving little-to-no evidence
B) because most perpetrators invest their illegal income rather than spend it, concealing key evidence
C) because most computer criminals are older and more cunning than perpetrators of other types of fraud
D) because perpetrators usually only steal very small amounts of money at a time, requiring a long period of time to pass before discovery

A

A) because massive fraud can be committed in only seconds, leaving little-to-no evidence

38
Q

Why is computer fraud often more difficult to detect than other types of fraud?
A) Rarely is cash stolen in computer fraud.
B) The fraud may leave little or no evidence it ever happened.
C) Computers provide more opportunities for fraud.
D) Computer fraud perpetrators are just more clever than other types of criminals.

A

B) The fraud may leave little or no evidence it ever happened.

39
Q

Why do many fraud cases go unreported and unprosecuted?
A) Major fraud is a public relations nightmare.
B) Fraud is difficult, costly, and time-consuming to investigate and prosecute.
C) Law enforcement and the courts are often so busy with violent crimes that little time is left for fraud cases.
D) all of the above

A

D) all of the above

40
Q
The fraud that requires the least computer knowledge or skill involves 
A) altering or falsifying source data. 
B) unauthorized use of computers. 
C) tampering with or copying software.
D) forging documents like paychecks.
A

A) altering or falsifying source data.

41
Q
The simplest and most common way to commit a computer fraud is to 
A) alter computer input. 
B) alter computer output. 
C) modify the processing. 
D) corrupt the database.
A

A) alter computer input.

42
Q
) Downloading a master list of customers and selling it to a competitor is an example of 
A) data fraud. 
B) output theft. 
C) download fraud. 
D) fraudulent financial reporting.
A

A) data fraud.

43
Q
Most frauds are detected by
A) external auditors.
B) hotline tip.
C) internal auditors.
D) the police.
A

B) hotline tip.

44
Q

Which of the following will not reduce the likelihood of an occurrence of fraud?
A) encryption of data and programs
B) use of forensic accountants
C) adequate insurance coverage
D) required vacations and rotation of duties

A

C) adequate insurance coverage

45
Q

) On Tuesday morning, Chen Lee, Chief Information Officer at American Trading Corporation (ATC), got some bad news. The hard drive use to store system data backups was lost while it was being transported to an offsite storage location. Chen called a meeting of her technical staff to discuss the implications of the loss. Which of the following is most likely to relieve her concerns over the potential cost of the loss?
A) ATC has a comprehensive disaster recovery plan.
B) The hard drive was encrypted and password protected.
C) The shipper has insurance that will reimburse ATC for the cost of the hard drive.
D) ATC has a copy of the hard drive onsite, so a new copy for storage offsite can easily be prepared.

A

B) The hard drive was encrypted and password protected.

46
Q

________ is a simple, yet effective, method for catching or preventing many types of employee fraud.
A) Requiring all employees to take annual vacations
B) Monitoring employee bank accounts and net worth
C) Monitoring employee behavior using video cameras
D) Explaining that fraud is illegal and will be severely punished to employees

A

A) Requiring all employees to take annual vacations

47
Q

Which of the following is not a way to make fraud less likely to occur?
A) Adopt an organizational structure that minimizes the likelihood of fraud.
B) Create an organizational culture that stresses integrity and commitment to ethical values.
C) Create an audit trail so individual transactions can be traced.
D) Effectively supervise employees.

A

C) Create an audit trail so individual transactions can be traced.

48
Q

Which of the following is not a way to reduce fraud losses?
A) Conduct periodic external and internal audits.
B) Maintain adequate insurance.
C) Use software to monitor system activity.
D) Store backup copies of program and data files.

A

A) Conduct periodic external and internal audits.

49
Q

Which of the following is not a way to improve fraud detection?
A) Install fraud detection software.
B) Implement a fraud hotline.
C) Employ a computer security officer.
D) Implement computer-based controls over input, processing, storage, and output activities.

A

D) Implement computer-based controls over input, processing, storage, and output activities.