Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

6. Which of the following statements is (are) true? a. Perpetrators can hide an asset theft by charging the stolen item to an expense account.

  1. 6. Which of the following statements is (are) true?
    1. a. Perpetrators can hide an asset theft by charging the stolen item to an expense account.
    2. b. To prevent detection when an asset is stolen, the perpetrator must inflate liabilities or decrease assets.
    3. c. Committing a fraud almost always takes more effort and time than concealing it.
    4. d. An individual can hide the theft of cash using a check-kiting scheme.
    5. e. A lapping scheme is used to commit a fraud but not to conceal it.
  2. 7. A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying a premium to the checks value. He then scanned the check and used a variety of software packages to prepare fictitious paychecks from the employer. The group arrived on the next payday, cashed the checks at local establishments, and moved to another town before the checks were presented for payment at the local bank. This is an example of what type of fraud?
    1. a. input
    2. b. processor
    3. c. output
    4. d. computer instruction
    5. e. data
  3. 8. In a typical asset misappropriation, the perpetrator ____________.
    1. a. does not attempt to conceal the fraud
    2. b. terminates the fraud as soon as the desired amount of money is taken to avoid detection
    3. c. gains the trust or confidence of the entity being defrauded
    4. d. saves a large portion of the stolen money
    5. e. uses trickery, cunning, or false or misleading information to commit fraud
    6. f. gets greedy and takes ever-larger amounts of money or grows careless or overconfident, leading to a mistake that leads to the frauds detection
  4. 9. Cyber sleuths need which of the following skills?
    1. a. ability to follow a trail, think analytically, and be thorough
    2. b. ability to use their computer engineering experience to evaluate the hardware used by the company
    3. c. ability to think like a fraud perpetrator and use hacking tools and techniques
    4. d. ability to use their legal training to properly prepare the evidence needed to prosecute perpetrators
    5. e. ability to do complex programming so they can develop their own software to examine corporate data and records
  5. 10. Which of the following statements is (are) true about computer fraud perpetrators?
    1. a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community.
    2. b. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold.
    3. c. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money.
    4. d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing a risk based approach to conducting a quality audit

Authors: Karla Johnstone, Audrey Gramling, Larry Rittenberg

9th edition

9781133939160, 1133939155, 1133939163, 978-1133939153

More Books

Students also viewed these Accounting questions

Question

Where do you see the organization in 5/10 years?

Answered: 1 week ago