Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. 1. Which of the following statements
Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer.
- 1. Which of the following statements is (are) true?
- a. The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud.
- b. Losses from the theft of physical assets are much greater than those from the electronic theft of data.
- c. In the absence of controls, it is not hard for a dishonest employee to steal data.
- d. The biggest cause of data breaches is organized hacker groups.
- e. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data fraud.
- 2. Which of the following statements is (are) true?
- a. Strong, mutually beneficial personal relationships with suppliers is unlikely to result in fraud.
- b. Fraud is highly unlikely to occur when a crisis arises, and normal controls are suspended.
- c. Perpetrators who do not steal cash or use the stolen assets usually convert the assets to a spendable form.
- d. A huge fraud opportunity arises when a company has clear policies and procedures and teaches and stresses honesty.
- e. The biggest fraud opportunity arises from a companys failure to design and enforce its internal control system.
- 3. The number of incidents and the total dollar losses from computer fraud are increasing rapidly for which of the following reasons?
- a. Many companies are moving to cloud services where there are few data security controls.
- b. Internet sites offer step-by-step instructions on how to perpetrate computer fraud and abuse.
- c. Law enforcement is not interested in preventing or prosecuting computer fraud.
- d. There are no laws against computer fraud, so prosecution is difficult.
- e. Many instances of computer fraud go undetected, and many computer frauds are not reported.
- 4. SAS No. 99 requires auditors to ________________________.
- a. limit discussion among audit team members of how and where the companys financial statements have been susceptible to fraud in prior years due to confidentiality concerns
- b. understand fraud and why it is committed
- c. limit the use of technology in the audit due to managements ability to change or manipulate electronic records
- d. document and communicate findings to the general public
- e. identify, assess, and respond to risks by varying the nature, timing, and extent of audit procedures
- f. evaluate the results of their audit tests to determine whether misstatements indicate the presence of fraud
- 5. Which of the following actions did the Treadway Commission recommended to reduce fraudulent financial reporting?
- a. Design and implement internal controls to provide reasonable assurance of preventing fraudulent financial reporting.
- b. Establish financial incentives that promote integrity in the financial reporting process.
- c. Identify and understand the factors that lead to fraudulent financial reporting.
- d. Assess the risk of corruption and misappropriation of assets within the company.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started