Term
When a task force is charged with developing a program for safeguarding proprietary information (SPI), which of the following should be the first step that it takes? |
|
Definition
Determine what information should be protected. |
|
|
Term
Which of the following is a means of measuring the relationship between two different financial statement amounts? |
|
Definition
|
|
Term
A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a: |
|
Definition
|
|
Term
Bruce, a manager for a retail store, suspects his cashiers of skimming sales. Bruce will be able to detect this kind of scheme by comparing their register totals to the amount of money in their cash drawers. |
|
Definition
|
|
Term
Which of the following is a technical or administrative control for securing computer systems and communication networks? |
|
Definition
Implementing logical access controls |
|
|
Term
A company must disclose all contingent liabilities in the notes to the financial statements, regardless of the liabilities’ probability or materiality. |
|
Definition
|
|
Term
All of the following measures are recommended to help mitigate the risk of billing schemes EXCEPT: |
|
Definition
Prohibit competitive bidding |
|
|
Term
Why is the health care industry concerned about the potential effect of the Electronic Data Interchange (EDI) on fraudulent activity? |
|
Definition
The efficiency of EDI allows for more vendors and thus more claims to process |
|
|
Term
Which of the following statements concerning fraud involving special care facilities is TRUE? |
|
Definition
Many patients in special care facilities are less likely to report fraud because they often are not responsible for their own financial affairs |
|
|
Term
Which of the following is the best definition of the automobile insurance scheme known as ditching? |
|
Definition
An insured falsely reports a vehicle as stolen to collect on an insurance policy. |
|
|
Term
Which of the following is the best definition of the automobile insurance scheme known as ditching? |
|
Definition
An insured falsely reports a vehicle as stolen to collect on an insurance policy. |
|
|
Term
Which of the following schemes are often used by fraudsters to take advantage of the elderly? |
|
Definition
Homeownership schemes Sweepstake and prize schemes Work-at-home schemes All of the above
|
|
|
Term
Vertical analysis can best be described as a technique for analyzing a percentage change from one accounting period to the next. |
|
Definition
|
|
Term
All of the following activities are included in the presolicitation phase of procurements involving open and free competition EXCEPT: |
|
Definition
The procuring entity issues the solicitation document. |
|
|
Term
All of the following can help prevent a computer from being infected by malicious software EXCEPT: |
|
Definition
Installing shareware into a system's root directory |
|
|
Term
If a fraudster wants to conceal the removal of a liability from the books, which of the following actions will NOT balance the accounting equation? |
|
Definition
|
|
Term
In a financial statement fraud scheme in which capital expenditures are recorded as expenses rather than assets, the transactions will have the following effect on the organization's financial statements: |
|
Definition
Total assets will be understated |
|
|
Term
In a financial statement fraud scheme in which capital expenditures are recorded as expenses rather than assets, the transactions will have the following effect on the organization's financial statements: |
|
Definition
Total assets will be understated |
|
|
Term
Which of the following activities is included in the bid evaluation and award phase of procurements involving open and free competition? |
|
Definition
The procuring employees assess the bids or proposals. |
|
|
Term
When looking at a set of financial statements, on which statement would you find notes payable, current assets, retained earnings, and accumulated depreciation? |
|
Definition
|
|
Term
Which of the following types of accounting changes must be disclosed in an organization's financial statements?
I. Changes in estimates II. Changes in accounting principles III. Changes in reporting entities |
|
Definition
|
|
Term
The removal of cash from a victim organization before the cash is entered in the organization's accounting system is: |
|
Definition
|
|
Term
Cooper is an intelligence professional for Whetstone Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about Cryptic Global, the major competitor of Whetstone’s biggest client. To gather the intelligence, Cooper infiltrates Cryptic Global’s office by posing as a member of its cleaning crew and collects information left around employees’ computers and desks. Cooper’s approach is an example of: |
|
Definition
|
|