Question
6)Which of the following statements is (are) TRUE? A)Perpetrators who do not steal cash or use the stolen assets usually convert the assets to a
6)Which of the following statements is (are) TRUE?
A)Perpetrators who do not steal cash or use the stolen assets usually convert the assets to a spendable form.
B)The biggest fraud opportunity arises from a companys failure to design and enforce its internal control system.
C)A huge fraud opportunity arises when a company has clear policies and procedures and teaches and stresses honesty.
D)Strong, mutually beneficial personal relationships with suppliers is unlikely to result in fraud.
E)Fraud is highly unlikely to occur when a crisis arises and normal controls are suspended.
7)The number of incidents and the total dollar losses from computer fraud are increasing rapidly for which of the following reasons?
A)Many instances of computer fraud go undetected and many computer frauds are not reported.
B)Many companies are moving to cloud services where there are few data security controls.
C)Internet sites offer step-by-step instructions on how to perpetrate computer fraud and abuse.
D)Law enforcement is not interested in preventing or prosecuting computer fraud.
E)There are no laws against computer fraud, so prosecution is difficult.
8)Cyber sleuths need which of the following skills?
A)Ability to do complex programming, so they can develop their own software to examine corporate data and records
B)Ability to follow a trail, think analytically, and be thorough
C)Ability to use their computer engineering experience to evaluate the hardware used by the company
D)Ability to think like a fraud perpetrator and use hacking tools and techniques
E)Ability to use their legal training to properly prepare the evidence needed to prosecute perpetrators
9)A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying a premium to the checks value. He then scanned the check and used a variety of software packages to prepare fictitious paychecks from the employer. The group arrived on the next payday, cashed the checks at local establishments, and moved to another town before the checks were presented for payment at the local bank. This is an example of what type of fraud?
A)Input fraud
B)Processor fraud
C)Computer instruction Fraud
D)Data fraud
E)Output fraud
10)Which of the following statements is (are) TRUE?
A)The type of computer fraud that is simplest and most common and that requires the least amount of skill is data fraud.
B)The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud.
C)The biggest cause of data breaches is organized hacker groups.
D)Losses from the theft of physical assets are much greater than those from the electronic theft of data.
E)In the absence of controls, it is not hard for a dishonest employee to steal data.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started