ACCT 461 - Chapter 13

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a paperhanger?

A person who is an expert in check fraud

Which of the following does corporate espionage include?

Acqusition of information through clandestine means

If an organization offers wireless or remote access, its server software should terminate any connection:

After a certain number of unsuccesful attempts to enter an invaild password

Why are computer fraud cases difficult for a fraud examiner to investigate?

All of the above are reasons why computer fraud cases are difficult to investigate.

Which of the following is NOT one of the three sources of external fraud discussed?

Auditors

Taylor is a procurement specialist for Hillside Corporation. He is reviewing contracts, and notices a pattern between three particular contractors. Contractor A bid the lowest on the first job, Contractor B bid the lowest on the second job, and Contractor C bid the lowest on the third job. All three contractors bid on all three jobs. Which of the following is a potential scheme perpetrated by these contractors?

Bid rotation

All of the following are examples of malware EXCEPT:

Blackware

Which of the following statements is true with regard to external fraud threats?

Companies that house large amounts of customer payment data are especially vulnerable to external fraud threats

________________ is the use of technology to gain unauthorized access to sensitive information on a computer system.

Computer hacking

Which of the following is the best way to prevent vendor fraud?

Conduct vendor audits

What is a recommended preventative measure a company should take to protect its physical property?

Ensure outdoor waste receptacles are locked and guarded

According to the textbook, which of the following is NOT one of a corporate spy's favorite departments to target?

Legal

Which of the following is commonly used to perpetrate data manipulation and destruction schemes?

Malware

Password cracking, social engineering, and phishing are all:

Methods used to gain unauthorized access

What is encryption?

Procedures used to convert information using an algorithm that makes it unreadable

A caterer has been contracted by Austin Corp. to provide the food for a large banquet. The catering contract explicitly states that the caterer will serve a fish entrée and a chicken entrée, and the fish entrée will consist of red snapper. The caterer decides to use tilapia instead, which costs about a third as much as red snapper, but is also a white fish and looks quite similar. He figures that no one at the banquet will be able to tell the difference. Austin Corp. is charged the price of the red snapper. What type of scheme has the caterer perpetrated?

Product substitution

Which of the following is a key finding from the 2010/2011 Computer Crime and Security Survey?

Respondents believed that the activities of outsiders accounted for much of their losses from cybercrime.

Max Reynolds is trying to obtain customer payment data from Stella Corporation. He wanders around Stella's offices pretending to be a confused intern, looking for someone who can help him get on his computer. An unsuspecting employee gives him her login information, not realizing the amount of data she has just given him access to. He downloads several spreadsheets of customer payment data and takes off. What type of scheme has Max committed against Stella Corporation?

Social engineering

Which of the following statements is true with regard to credit cards?

The chances of being caught using an unauthorized card are small

Which of the following is NOT one of the four phases of the procurement process?

The project review phase


Ensembles d'études connexes

Chapter 23: Evolution (Practice Questions)

View Set

Russian, Начало: Урок 1 Idioms and Expressions

View Set

HESI case study - Benign Prostatic Hyperplasia - Bob Hamilton

View Set

Christian Faith and Living Unit 1

View Set