ACC 564 TUTOR Invent Yourself/acc564tutor.com ACC 564 TUTOR Invent Yourself/acc564tutor.com | Page 25

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
Question 5
When a computer criminal gains access to a system by searching records or the trash of the target company , this is referred to as
Question 6 Generally in a risk assessment process , the first step is to
Question 7 Congress passed this federal law for the purpose of preventing financial statement fraud , to make financial reports more transparent and to strengthen the internal control of public companies . Question 8
Corporate policy that requires a purchasing agent and purchasing department manager to sign off on asset purchases over $ 1,500 is an example of
Question 9 A ________ is created to guide and oversee systems development and acquisition . Question 10 What is one reason why AIS threats are increasing ?
Question 11
When new employees are hired by Folding Squid Technologies , they are assigned user names and appropriate permissions are entered into the information system ' s access control matrix . This is an example of a ( an )