ACC 564 TUTOR Education Terms/acc564tutor.com ACC 564 TUTOR Education Terms/acc564tutor.com | Page 5

Which of the following is an opportunity that could contribute to employee fraud? . Question 22 . Which of the following is the greatest risk to information systems and causes the greatest dollar losses? . Question 23 . One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as . Question 24 . Most frauds are detected by . Question 25 . The most efficient way to conceal asset misappropriation is to . Question 26 . A fraud technique that slices off tiny amounts from many projects is called the ________ technique. . Question 27 . Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using . Question 28 . A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called . Question 29 . Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called . Question 30 . A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program. . Question 31 . ________ controls prevent, detect and correct transaction errors and fraud. . Question 32 . According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports. . Question 33 .