ACCT 461 - Chapter 13
What is a paperhanger?
A person who is an expert in check fraud
Which of the following does corporate espionage include?
Acqusition of information through clandestine means
If an organization offers wireless or remote access, its server software should terminate any connection:
After a certain number of unsuccesful attempts to enter an invaild password
Why are computer fraud cases difficult for a fraud examiner to investigate?
All of the above are reasons why computer fraud cases are difficult to investigate.
Which of the following is NOT one of the three sources of external fraud discussed?
Auditors
Taylor is a procurement specialist for Hillside Corporation. He is reviewing contracts, and notices a pattern between three particular contractors. Contractor A bid the lowest on the first job, Contractor B bid the lowest on the second job, and Contractor C bid the lowest on the third job. All three contractors bid on all three jobs. Which of the following is a potential scheme perpetrated by these contractors?
Bid rotation
All of the following are examples of malware EXCEPT:
Blackware
Which of the following statements is true with regard to external fraud threats?
Companies that house large amounts of customer payment data are especially vulnerable to external fraud threats
________________ is the use of technology to gain unauthorized access to sensitive information on a computer system.
Computer hacking
Which of the following is the best way to prevent vendor fraud?
Conduct vendor audits
What is a recommended preventative measure a company should take to protect its physical property?
Ensure outdoor waste receptacles are locked and guarded
According to the textbook, which of the following is NOT one of a corporate spy's favorite departments to target?
Legal
Which of the following is commonly used to perpetrate data manipulation and destruction schemes?
Malware
Password cracking, social engineering, and phishing are all:
Methods used to gain unauthorized access
What is encryption?
Procedures used to convert information using an algorithm that makes it unreadable
A caterer has been contracted by Austin Corp. to provide the food for a large banquet. The catering contract explicitly states that the caterer will serve a fish entrée and a chicken entrée, and the fish entrée will consist of red snapper. The caterer decides to use tilapia instead, which costs about a third as much as red snapper, but is also a white fish and looks quite similar. He figures that no one at the banquet will be able to tell the difference. Austin Corp. is charged the price of the red snapper. What type of scheme has the caterer perpetrated?
Product substitution
Which of the following is a key finding from the 2010/2011 Computer Crime and Security Survey?
Respondents believed that the activities of outsiders accounted for much of their losses from cybercrime.
Max Reynolds is trying to obtain customer payment data from Stella Corporation. He wanders around Stella's offices pretending to be a confused intern, looking for someone who can help him get on his computer. An unsuspecting employee gives him her login information, not realizing the amount of data she has just given him access to. He downloads several spreadsheets of customer payment data and takes off. What type of scheme has Max committed against Stella Corporation?
Social engineering
Which of the following statements is true with regard to credit cards?
The chances of being caught using an unauthorized card are small
Which of the following is NOT one of the four phases of the procurement process?
The project review phase