ACC 564 Endless Education /uophelp.com ACC 564 Endless Education /uophelp.com | Page 30

Question 4
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
Question 5
When a computer criminal gains access to a system by searching records or the trash of the target company , this is referred to as
Question 6
to
Generally in a risk assessment process , the first step is
Question 7
Congress passed this federal law for the purpose of preventing financial statement fraud , to make financial reports more transparent and to strengthen the internal control of public companies . Question 8
Corporate policy that requires a purchasing agent and purchasing department manager to sign off on asset purchases over $ 1,500 is an example of
Question 9
A ________ is created to guide and oversee systems development and acquisition .
Question 10
What is one reason why AIS threats are increasing ?
Question 11