ACC 564 TUTOR Extraordinary Success/acc564tutor.com ACC 564 TUTOR Extraordinary Success/acc564tutor.c | Page 25

ACC 564 Week 5 Quiz 2 Question 1 Illegally obtaining and using confidential information about a person for economic gain is known as Question 2 The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called Question 3 Developers of computer systems often include a user name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a Question 4 A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called Question 5 When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as Question 6 Generally in a risk assessment process, the first step is to Question 7 Congress passed this federal law for the purpose of preventing financial statement fraud, to make financial reports more transparent and to strengthen the internal control of public companies. Question 8