100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ACC 360 Fraud Examination Final Exam (Ch. 13-15) | Questions And Answers Latest {} A+ Graded | 100% Verified $13.48   Add to cart

Exam (elaborations)

ACC 360 Fraud Examination Final Exam (Ch. 13-15) | Questions And Answers Latest {} A+ Graded | 100% Verified

 6 views  0 purchase
  • Course
  • Top Academic Resources 2024/2025
  • Institution
  • Top Academic Resources 2024/2025

ACC 360 Fraud Examination Final Exam (Ch. 13-15) | Questions And Answers Latest {} A+ Graded | 100% Verified

Preview 2 out of 6  pages

  • August 24, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Top Academic Resources 2024/2025
  • Top Academic Resources 2024/2025
avatar-seller
oneclass
ACC 360 Fraud Examination Final Exam (Ch. 13-15) | Questions And Answers Latest
{2024- 2025} A+ Graded | 100% Verified




Which of the following is NOT one of the three sources of external fraud discussed? - Auditors



Which of the following statements is true with regard to external fraud threats? - Companies that house
large amounts of customer payment data are especially vulnerable to external fraud threats



What is a paperhanger? - A person who is an expert in check fraud



Which of the following statements is true with regard to credit cards? - The chances of being caught
using an unauthorized card are small



Taylor is a procurement specialist for Hillside Corporation. He is reviewing contracts, and notices a
pattern between three particular contractors. Contractor A bid the lowest on the first job, Contractor B
bid the lowest on the second job, and Contractor C bid the lowest on the third job. All three contractors
bid on all three jobs. Which of the following is a potential scheme perpetrated by these contractors? -
Bid rotation



Which of the following is NOT one of the four phases of the procurement process? - The project review
phase



Which of the following is the best way to prevent vendor fraud? - Conduct vendor audits



Which of the following is a key finding from the 2010/2011 Computer Crime and Security Survey? -
Respondents believed that the activities of outsiders accounted for much of their losses from
cybercrime.



Why are computer fraud cases difficult for a fraud examiner to investigate? - All of the above are
reasons why computer fraud cases are difficult to investigate.

, ________________ is the use of technology to gain unauthorized access to sensitive information on a
computer system. - Computer hacking



Password cracking, social engineering, and phishing are all: - Methods used to gain unauthorized access



Max Reynolds is trying to obtain customer payment data from Stella Corporation. He wanders around
Stella's offices pretending to be a confused intern, looking for someone who can help him get on his
computer. An unsuspecting employee gives him her login information, not realizing the amount of data
she has just given him access to. He downloads several spreadsheets of customer payment data and
takes off. What type of scheme has Max committed against Stella Corporation? - Social enginerring



Which of the following is commonly used to perpetrate data manipulation and destruction schemes? -
Malware



If an organization offers wireless or remote access, its server software should terminate any connection:
- After a certain number of unsuccessful attempts to enter an invalid password



All of the following are examples of malware EXCEPT: - Blackware



What is encryption? - Procedures used to convert information using an algorithm that makes it
unreadable



Which of the following does corporate espionage include? - Acquisition of information through
clandestine means



What is a recommended preventative measure a company should take to protect its physical property? -
Ensure outdoor waste receptacles are locked and guarded



Factors that influence the level of fraud risk faced by an organization include which of the following? -
All of the above



_________ controls are designed to stop an undesirable event from occurring, whereas _________
controls are designed to identify an undesirable event that has already occurred. - Preventive; detective

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62555 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.48
  • (0)
  Add to cart