ACC 564 TUTOR Great Stories /acc564tutor.com ACC 564 TUTOR Great Stories /acc564tutor.com | Page 25

get into the system and correct problems in the future. This is referred to as a Question 4 A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called Question 5 When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as Question 6 Generally in a risk assessment process, the first step is to Question 7 Congress passed this federal law for the purpose of preventing financial statement fraud, to make financial reports more transparent and to strengthen the internal control of public companies. Question 8 Corporate policy that requires a purchasing agent and purchasing department manager to sign off on asset purchases over $1,500 is an example of Question 9 A ________ is created to guide and oversee systems development and acquisition. Question 10 What is one reason why AIS threats are increasing?