ACC 564 Experience Tradition / tutorialrank.com ACC 564 Experience Tradition / tutorialrank.com | Page 6

Most frauds are detected by. Question 25. The most efficient way to conceal asset misappropriation is to. Question 26.
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
. Question 27.
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
. Question 28.
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
. Question 29.
Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
. Question 30.
A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.
. Question 31.
________ controls prevent, detect and correct transaction errors and fraud.
. Question 32.
According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports.