Filters
Question type

Study Flashcards

Identify the opportunity below that could enable an employee to commit fraud.


A) An employee's spouse loses her job.
B) An employee has a close association with suppliers or customers.
C) An employee suddenly acquires lots of credit cards.
D) An employee is upset that he was passed over for a promotion.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Describe four ways companies can reduce losses from fraud.

Correct Answer

verifed

verified

Maintain adequate insurance.Keep a curre...

View Answer

Identify the threat below that is not one of the four types of threats faced by accounting information systems.


A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Seble wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months'' rent up front.Seble approaches a good friend,Zhou,to discuss the possibility of Zhou investing funds and becoming a 25% partner in the business.After a lengthy discussion Zhou agrees to invest.Eight months later,Zhou and Seble have a major argument.In order for Zhou to sue Seble for fraud,all the following must be true except


A) Zhou's decision to invest was primarily based on Seble's assertion that she had prior floral retail experience.
B) Seble told Zhou she had worked at a floral shop for several years, when in fact she did not have any prior experience in floral retail.
C) before Zhou invested, Seble prepared a detailed business plan and sales forecasts, and provided Zhou with copies.
D) Zhou's 25% share of the business is worth substantially less than her initial investment.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which type of threat causes the greatest dollar losses?


A) software errors and equipment malfunctions
B) unintentional acts
C) intentional acts
D) system inefficiency

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is the best way to hide theft of assets?


A) creating "cash" through the transfer of money between banks
B) conversion of stolen assets into cash
C) stealing cash from customer A and then using customer B's balance to pay customer A's accounts receivable
D) charging the stolen asset to an expense account

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting?

Correct Answer

verifed

verified

Establish an organizational environment ...

View Answer

The most efficient way to conceal asset misappropriation is to


A) write-off a customer receivable as bad debt.
B) alter monthly bank statements before reconciliation.
C) alter monthly physical inventory counts to reconcile to perpetual inventory records.
D) record phony payments to vendors.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

On Tuesday morning,Chen Lee,Chief Information Officer at American Trading Corporation (ATC) ,got some bad news.The hard drive use to store system data backups was lost while it was being transported to an offsite storage location.Chen called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?


A) ATC has a comprehensive disaster recovery plan.
B) The hard drive was encrypted and password protected.
C) The shipper has insurance that will reimburse ATC for the cost of the hard drive.
D) ATC has a copy of the hard drive onsite, so a new copy for storage offsite can easily be prepared.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the most prevalent opportunity within most companies to commit fraud?


A) lack of any internal controls
B) failure to enforce the internal controls
C) loopholes in the design of internal controls
D) management's failure to believe employees would commit fraud

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

This component of the fraud triangle explains how perpetrators justify their (illegal) behavior.


A) pressure
B) rationalization
C) concealment
D) opportunity

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Intentional or reckless conduct that results in materially misleading financial statements is called


A) financial fraud.
B) misstatement fraud.
C) fraudulent financial reporting.
D) audit failure fraud.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Lapping is best described as the process of


A) applying cash receipts to a different customer's account in an attempt to conceal previous thefts of cash receipts.
B) inflating bank balances by transferring money among different bank accounts.
C) stealing small amounts of cash, many times over a period of time.
D) increasing expenses to conceal that an asset was stolen.

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

A 16 year old hacker was able to access the systems of U.S.Missile Command and accidently launched a small nuclear missile,which fortunately,failed to detonate.

A) True
B) False

Correct Answer

verifed

verified

Why is computer fraud on the rise?

Correct Answer

verifed

verified

Not everyone agrees on what constitutes ...

View Answer

Which of the following will not reduce the likelihood of an occurrence of fraud?


A) encryption of data and programs
B) use of forensic accountants
C) adequate insurance coverage
D) required vacations and rotation of duties

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Logic errors are an example of which type of threat?


A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Why do fraudulent acts often go unreported and are therefore not prosecuted?

Correct Answer

verifed

verified

Most fraud cases go unreported and are n...

View Answer

Misappropriation of assets is a fraudulent act that involves


A) dishonest conduct by those in power.
B) misrepresenting facts to promote an investment.
C) using computer technology to perpetrate.
D) theft of company property.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What agency did the United States create to use cyber weapons and to defend against cyber attacks?


A) U.S. Cyber Command
B) Department of Network Security
C) Department of Cyber Defense
D) Department of Technology Strategy

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 60

Related Exams

Show Answer