ACC 564 TUTOR Great Stories /acc564tutor.com ACC 564 TUTOR Great Stories /acc564tutor.com | Page 25
get into the system and correct problems in the future. This is
referred to as a
Question 4
A fraud technique that allows a perpetrator to bypass normal
system controls and enter a secured system is called
Question 5
When a computer criminal gains access to a system by
searching records or the trash of the target company, this is
referred to as
Question 6
Generally in a risk assessment process, the first step is to
Question 7
Congress passed this federal law for the purpose of preventing
financial statement fraud, to make financial reports more
transparent and to strengthen the internal control of public
companies.
Question 8
Corporate policy that requires a purchasing agent and
purchasing department manager to sign off on asset purchases
over $1,500 is an example of
Question 9
A ________ is created to guide and oversee systems development
and acquisition.
Question 10
What is one reason why AIS threats are increasing?