ACC 564 Endless Education /uophelp.com ACC 564 Endless Education /uophelp.com | Page 30

Question 4
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
Question 5
When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as
Question 6
to
Generally in a risk assessment process, the first step is
Question 7
Congress passed this federal law for the purpose of preventing financial statement fraud, to make financial reports more transparent and to strengthen the internal control of public companies. Question 8
Corporate policy that requires a purchasing agent and purchasing department manager to sign off on asset purchases over $ 1,500 is an example of
Question 9
A ________ is created to guide and oversee systems development and acquisition.
Question 10
What is one reason why AIS threats are increasing?
Question 11