Term
| When a task force is charged with developing a program for safeguarding proprietary information (SPI), which of the following should be the first step that it takes? |
|
Definition
| Determine what information should be protected. |
|
|
Term
| Which of the following is a means of measuring the relationship between two different financial statement amounts? |
|
Definition
|
|
Term
| A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a: |
|
Definition
|
|
Term
| Bruce, a manager for a retail store, suspects his cashiers of skimming sales. Bruce will be able to detect this kind of scheme by comparing their register totals to the amount of money in their cash drawers. |
|
Definition
|
|
Term
| Which of the following is a technical or administrative control for securing computer systems and communication networks? |
|
Definition
| Implementing logical access controls |
|
|
Term
| A company must disclose all contingent liabilities in the notes to the financial statements, regardless of the liabilities’ probability or materiality. |
|
Definition
|
|
Term
| All of the following measures are recommended to help mitigate the risk of billing schemes EXCEPT: |
|
Definition
| Prohibit competitive bidding |
|
|
Term
| Why is the health care industry concerned about the potential effect of the Electronic Data Interchange (EDI) on fraudulent activity? |
|
Definition
| The efficiency of EDI allows for more vendors and thus more claims to process |
|
|
Term
| Which of the following statements concerning fraud involving special care facilities is TRUE? |
|
Definition
| Many patients in special care facilities are less likely to report fraud because they often are not responsible for their own financial affairs |
|
|
Term
| Which of the following is the best definition of the automobile insurance scheme known as ditching? |
|
Definition
| An insured falsely reports a vehicle as stolen to collect on an insurance policy. |
|
|
Term
| Which of the following is the best definition of the automobile insurance scheme known as ditching? |
|
Definition
| An insured falsely reports a vehicle as stolen to collect on an insurance policy. |
|
|
Term
| Which of the following schemes are often used by fraudsters to take advantage of the elderly? |
|
Definition
Homeownership schemes Sweepstake and prize schemes Work-at-home schemes All of the above
|
|
|
Term
| Vertical analysis can best be described as a technique for analyzing a percentage change from one accounting period to the next. |
|
Definition
|
|
Term
| All of the following activities are included in the presolicitation phase of procurements involving open and free competition EXCEPT: |
|
Definition
| The procuring entity issues the solicitation document. |
|
|
Term
| All of the following can help prevent a computer from being infected by malicious software EXCEPT: |
|
Definition
| Installing shareware into a system's root directory |
|
|
Term
| If a fraudster wants to conceal the removal of a liability from the books, which of the following actions will NOT balance the accounting equation? |
|
Definition
|
|
Term
| In a financial statement fraud scheme in which capital expenditures are recorded as expenses rather than assets, the transactions will have the following effect on the organization's financial statements: |
|
Definition
| Total assets will be understated |
|
|
Term
| In a financial statement fraud scheme in which capital expenditures are recorded as expenses rather than assets, the transactions will have the following effect on the organization's financial statements: |
|
Definition
| Total assets will be understated |
|
|
Term
| Which of the following activities is included in the bid evaluation and award phase of procurements involving open and free competition? |
|
Definition
| The procuring employees assess the bids or proposals. |
|
|
Term
| When looking at a set of financial statements, on which statement would you find notes payable, current assets, retained earnings, and accumulated depreciation? |
|
Definition
|
|
Term
Which of the following types of accounting changes must be disclosed in an organization's financial statements?
I. Changes in estimates II. Changes in accounting principles III. Changes in reporting entities |
|
Definition
|
|
Term
| The removal of cash from a victim organization before the cash is entered in the organization's accounting system is: |
|
Definition
|
|
Term
| Cooper is an intelligence professional for Whetstone Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about Cryptic Global, the major competitor of Whetstone’s biggest client. To gather the intelligence, Cooper infiltrates Cryptic Global’s office by posing as a member of its cleaning crew and collects information left around employees’ computers and desks. Cooper’s approach is an example of: |
|
Definition
|
|