ACC 564 Course Great Wisdom / tutorialrank.com ACC 564 Course Great Wisdom / tutorialrank.com | Page 6
Most frauds are detected by
. Question 25 .
The most efficient way to conceal asset misappropriation is to
. Question 26 .
A fraud technique that slices off tiny amounts from many projects is
called the ________ technique.
. Question 27 .
Computer fraud perpetrators that modify programs during systems
development, allowing access into the system that bypasses normal
system controls are using
. Question 28 .
A fraud technique that allows a perpetrator to bypass normal system
controls and enter a secured system is called
. Question 29 .
Computer fraud perpetrators who use telephone lines to commit fraud
and other illegal acts are typically called
. Question 30 .
A ________ is similar to a ________, except that it is a program
rather than a code segment hidden in a host program.
. Question 31 .
________ controls prevent, detect and correct transaction errors and
fraud.
. Question 32 .
According to the ERM, these objectives help ensure the accuracy,
completeness and reliability of internal and external company reports.