Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 16 You have just completed a fraud examination in which you concluded, based on security camera footage, that an outside intruder entered the company

QUESTION 16

  1. You have just completed a fraud examination in which you concluded, based on security camera footage, that an outside intruder entered the company dressed as a computer repair person. The footage shows the intruder chatting amiably with several individuals in the bookkeeping department, followed by logging onto their computers as they stand watching over his shoulder, using credentials they shared when he showed them his vendor badge (which was counterfeit). This type of attack is executed using:
  2. Shoulder surfing
  3. a Trojan horse
  4. Social engineering
  5. Spear phishing

6 points

QUESTION 17

  1. Adequate hacker detection programs contain three primary components: (1) log files should be printed and regularly reviewed by the data security officer, (2) the data security function should have sufficient resources and staff to administer passwords, maintain security software, review system activity reports and follow up on potential security violations, and (3):
  2. Anti-social engineering training for all users with passwords
  3. Buffer over-flow backup and redundancy streaming with auto EXE piggybacking
  4. Use of distributed ledger technology
  5. Periodic reviews of telecommunications security should be performed by internal or external auditors or other professionals

6 points

QUESTION 18

  1. ______________ and _______________ are any defalcation, fraud, or financial crime accomplished by tampering with computer programs, data files, operations, equipment, or media, and resulting in losses sustained by the organization whose computer was compromised.
  2. Computer crime; asset misappropriation schemes
  3. Financial crimes; blockchain compromises
  4. Computer-based fraud;financial crimes
  5. Cybercrime; complex frauds

6 points

QUESTION 19

  1. The most prevalent method of committing computer fraud is________________________________.
  2. Network weaving
  3. Digital device hacking
  4. Alteration or falsification of input transactions (and/or documents)
  5. Social engineering

6 points

QUESTION 20

  1. The U.S. government agency charged with investigating counterfeiting, credit card fraud, and some computer crimes is the:
  2. Internet Cybercrime Counterinsurgency Center (IC3)
  3. Financial Crimes Enforcement Network (FINCEN)
  4. Secret service
  5. Financial Action Task Force (FATF)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

College Accounting Chapters 1-12

Authors: Douglas McQuaig

10th Edition

1439038783, 978-1439038789

More Books

Students also viewed these Accounting questions

Question

What are the skills of management ?

Answered: 1 week ago

Question

1. What will happen in the future

Answered: 1 week ago

Question

3. Avoid making mistakes when reaching our goals

Answered: 1 week ago