Question

In: Accounting

Which of the following would least likely prevent a computer hacking? Select one: a. Encryptions are...

Which of the following would least likely prevent a computer hacking?

Select one:

a. Encryptions are used for sensitive data files, password files, and sensitive computer programs.

b. Passwords of transferred or terminated employees are changed immediately.

c. Security policies that include training for all employees, customers, and others who do not need to access the network.

d. Hacker publications and communications are reviewed to learn the current hacking methods.

Question 3

Not yet answered

Points out of 2.00

Flag question

Question text

Which of the following is not a duty of the PCAOB (Public Company Accounting Oversight Board) under the Sarbanes-Oxley Act of 2002?

Select one:

a. The PCOAB has a duty to register public accounting firms that audit publicly traded companies.

b. The PCOAB has a duty to ensure that all audit work papers of CPA firms are maintained for at least seven years.

c. The PCOAB has a duty to conduct an inspection once every three years of CPA firms that regularly audit more than 100 public companies.

d. The PCOAB has a duty to establish or adopt auditing, quality control, ethics, independence and other standards relating to audits of publicly traded companies.

Question 4

Not yet answered

Points out of 2.00

Flag question

Question text

In investigating insurance fraud, an accounting fraud examiner would least likely use which of the following computer-assisted detection methods?

Select one:

a. An accounting fraud examiner would use the computer to compare administrative files with payroll files to determine whether the insurance company is distributing payrolls to people who have changed their insurance policies.

b. An accounting fraud examiner would use the computer to generate an exception report for all exceptions to normal insurance policy procedures.

c. An accounting fraud examiner would use the computer to mail confirmation requests on delinquent premiums and change of address to verify that the insurance company’s records agree with the policyholders’ records.

d. An accounting fraud examiner would use the computer to compare insurance policy issue files with disbursement files to determine whether funds that are used to place new policies fraudulently come from the equity of old policies.

Question 5

Not yet answered

Points out of 2.00

Flag question

Question text

It is usually more difficult to identify and trace off-book bribery payments than on-book bribery payments. Which of the following is the best approach when examining off-book bribery payments?

Select one:

a. The suspected off-book bribery payments are best approached from the point of payment (payer of bribery).

b. The suspected off-book bribery payments are best approached from the point of receipt (recipient of bribery).

c. The suspected off-book bribery payments are best approached by determining whether employees have failed to execute tax withholding forms, or have not elected to receive any health benefits or other optional withdrawals, such as enforced saving plans.

d. The suspected off-book bribery payments are best approached by reviewing the exit interviews and comparing the vendor addresses with addresses of subsequent employers.

A conflict of interest occurs when an employee of a company has an undisclosed economic or personal interest in a transaction that adversely affects his/her employer. Which of the following methods is least effective in detecting a conflict of interest between an employee and a vendor?

Select one:

a. Matching the vendor address with the employee address to check whether the vendor and the employee are the same business entity.

b. Comparing the vendor tax files with the employee tax files to reveal whether the vendor and the employee have the same tax evasion scheme.

c. Reviewing the employee’s exit interview to check whether he/she is has obtained employment from the vendor.

d. Listening closely to complaints from competing vendors to check whether a particular vendor is being favored.

Question 7

Not yet answered

Points out of 2.00

Flag question

Question text

Which of the following is not a true statement regarding the detection of bank employee embezzlement?

Select one:

a. If the dollar amount of the embezzlement is so small that the bank’s financial statements will not be materially affected, the embezzlement can best be detected through a count of cash on hand.

b. If the dollar amount of the embezzlement is so large that the bank’s financial statement will be materially affected, the embezzlement can be best be detected through an analysis of the financial statements.

c. The bank should detect all bank employee embezzlement whether the dollar amount of the embezzlement will/will not materially affect the bank’s financial statements.

d. If the dollar amount of the embezzlement is so small that the bank’s financial statements will not be materially affected, the embezzlement can best be detected through a review of source documents.

Question 8

Not yet answered

Points out of 2.00

Flag question

Question text

The California Security Breach Information Act (SB-1386) is a state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised. Which of the following is the least likely step that organizations in California can take to comply with the Act?

Select one:

a. Appoint a bank lawyer or legal personnel to ensure SB-1386 compliance.  

b. Identify the location of all databases that contain personal information and implement access controls and physical security measures for data security.

c. Develop and implement procedures for rapid assessment of suspected security breaches, referral of suspected criminal acts to law enforcement agencies, notification of affected California residents and for appropriate public announcements to stakeholders and other interested parties to minimize the negative impact of the security breach.

d. Review arrangements with all third parties who store, process or transmit personal information and take steps to require them to adopt equivalent measures.

Question 9

Not yet answered

Points out of 2.00

Flag question

Question text

In April 2005, the Bankruptcy Abuse Prevention and Consumer Protection Act of 2005 (Section 256) was signed into law. The Act affects any person involved in a bankruptcy proceeding. Which of the following statements is not true concerning the effects of the Act?

Select one:

a. A person in debt will have to work out a repayment plan instead of having his/her obligations erased in bankruptcy court.

b. A person with insufficient assets or income could still file a Chapter 7 bankruptcy, which, if approved by a judge, erases debts entirely after certain assets are forfeited.

c. A state bankruptcy judge determines whether an individual must repay some or all of his/her debt.

d. A person with an income above his/her state's median income will have to pay some or all of his/her credit-card charges, medical bills and other obligations under a court-ordered bankruptcy plan.

Question 10

Not yet answered

Points out of 2.00

Flag question

Question text

Most states now expressly provide penalties for fraud perpetrated by using a computer and the internet. In 2005, California passed a state law on internet “spamming” - The Anti-Spam Law of 2005 (Senate Bill No.97) that

Select one:

a.
makes it a civil offense for anyone to create a website or domain name that seems like a legitimate online business and use it to ask, induce, request, or solicit any person to transmit, submit, or provide any means of identification without the authority or approval of the person.

b.

the victim to recover damages of $500,000 per unsolicited commercial e-mail advertisement transmitted in violation of the act, up to one million per incident, subject to reduction by the court.

c.
the perpetrator shall be punished by a fine of not more than $500,000, imprisonment in a county jail for not more than twelve months, or by both the fine and imprisonment.

d.
makes it a civil offense for anyone to create commercial e-mail advertisements containing certain falsifies, misrepresented, obscured, or misleading information.

Which of the following is a correct statement concerning the difference between a ponzi fraud and an illegal pyramid fraud?

Select one:

a. A ponzi fraud usually involves marketing of products and services; whereas, an illegal pyramid fraud usually involves marketing of financial instruments.

b. A ponzi fraud is an illegal business in which new investors’ money is used to make payments to earlier investors; whereas an illegal pyramid fraud is an illegal business in which new members are continually recruited to offer merchandise or services for sale, but only 70% of the business revenue comes from the sales whereas 30% of the business revenue comes from recruitment of new members.

c. A ponzi fraud requires a steady supply of new investors; whereas an illegal pyramid fraud does not require a steady supply of new members.

d. A ponzi fraud is an illegal business; whereas, a pyramid fraud can be a legal or illegal business.

Question 12

Not yet answered

Points out of 2.00

Flag question

Question text

Which of the following is not a precaution that an accounting fraud examiner should take when gathering computer evidence relating to an insider computer fraud?

Select one:

a. Do not eat, drink, or smoke close to the computer system or near any of the storage devices.

b. Do not fingerprint magnetic media; the fingerprint powder could permanently damage the drive equipment.

c. Do not fold or bend disks, or touch the magnetic media inside the disk cover.

d. Do not connect or disconnect any of the cables when the computer is not in operating mode.

Solutions

Expert Solution

Please give positive ratings so I can keep answering. It would help me a lot. Please comment if you have any query. Thanks!
Which of the following would least likely prevent a computer hacking?
c. Security policies that include training for all employees, customers, and others who do not need to access the network.
Which of the following is not a duty of the PCAOB (Public Company Accounting Oversight Board) under the Sarbanes-Oxley Act of 2002?
c. The PCOAB has a duty to conduct an inspection once every three years of CPA firms that regularly audit more than 100 public companies.
In investigating insurance fraud, an accounting fraud examiner would least likely use which of the following computer-assisted detection methods?
a. An accounting fraud examiner would use the computer to compare administrative files with payroll files to determine whether the insurance company is distributing payrolls to people who have changed their insurance policies.
It is usually more difficult to identify and trace off-book bribery payments than on-book bribery?
b. The suspected off-book bribery payments are best approached from the point of receipt (recipient of bribery).
A conflict of interest occurs when an employee of a company has an undisclosed economic or personal interest in a transaction that adversely affects his/her employer. Which of the following methods is least effective in detecting a conflict of interest between an employee and a vendor?
b. Comparing the vendor tax files with the employee tax files to reveal whether the vendor and the employee have the same tax evasion scheme.
Which of the following is not a true statement regarding the detection of bank employee embezzlement?
b. If the dollar amount of the embezzlement is so large that the bank’s financial statement will be materially affected, the embezzlement can be best be detected through an analysis of the financial statements.
The California Security Breach Information Act (SB-1386) is a state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised. Which of the following is the least likely step that organizations in California can take to comply with the Act?
d. Review arrangements with all third parties who store, process or transmit personal information and take steps to require them to adopt equivalent measures.
In April 2005, the Bankruptcy Abuse Prevention and Consumer Protection Act of 2005 (Section 256) was signed into law. The Act affects any person involved in a bankruptcy proceeding. Which of the following statements is not true concerning the effects of the Act?
d. A person with an income above his/her state's median income will have to pay some or all of his/her credit-card charges, medical bills and other obligations under a court-ordered bankruptcy plan.
Most states now expressly provide penalties for fraud perpetrated by using a computer and the internet. In 2005, California passed a state law on internet “spamming” - The Anti-Spam Law of 2005 (Senate Bill No.97) that
d. makes it a civil offense for anyone to create commercial e-mail advertisements containing certain falsifies, misrepresented, obscured, or misleading information.
Which of the following is a correct statement concerning the difference between a Ponzi fraud and an illegal pyramid fraud?
d. A Ponzi fraud is an illegal business; whereas, a pyramid fraud can be a legal or illegal business.
Which of the following is not a precaution that an accounting fraud examiner should take when gathering computer evidence relating to an insider computer fraud?
a. Do not eat, drink, or smoke close to the computer system or near any of the storage devices.

Related Solutions

Which of the following is least likely to be an income inferior good? Select one:
Which of the following is least likely to be an income inferior good? Select one: a. Beans. b. Education. c. Corn. d. Rice.
Which of the following transfer pricing methods is least likely to favor the seller? Select one:...
Which of the following transfer pricing methods is least likely to favor the seller? Select one: A. Absorption cost plus 5 percent B. Market prices C. Allowing the buyer and seller to negotiate the price D. Variable costs plus 5 percent
An element is least likely to form a molecule if... Select one: a. It has a...
An element is least likely to form a molecule if... Select one: a. It has a high ionisation energy. b. It has a high electron affinity. c. It is a good oxidising agent. d. It has a name ending in the letter 'm'.
Which one of the following types of contracts is least likely to be considered a contract...
Which one of the following types of contracts is least likely to be considered a contract of adhesion? A) homeowners policy contract B) commercial fire insurance policy contract C) manuscript or customized policy contract D) personal auto policy contract
In a sale of goods, which of the following would, LEAST LIKELY, create an EXPRESS WARRANTY...
In a sale of goods, which of the following would, LEAST LIKELY, create an EXPRESS WARRANTY under Section 2-313 of the U.C.C.:
Which one of the following time series is most likely to be stationary? Select one: Consumer...
Which one of the following time series is most likely to be stationary? Select one: Consumer price index Financial asset returns Life expectancy Nominal gross domestic product Provide a detailed explanation on why the selected option is correct.
Which revenue recognition method would most likely be used by a retailer? Select one: a. upon...
Which revenue recognition method would most likely be used by a retailer? Select one: a. upon cash collection b. upon delivery c. during production d. point of sale Which of the following is a disadvantage of issuing bonds instead of common shares? Select one: a. The principal of the debt must be repaid at maturity. b. Earnings per share will increase. c. Shareholder control is not affected. d. Income to common shareholders may increase. When bonds are issued at a...
IncorrectQuestion 3 0 / 1 pts Which of the following would represent the least likely use...
IncorrectQuestion 3 0 / 1 pts Which of the following would represent the least likely use of an income statement prepared for a business enterprise? Use by customers to determine a company's ability to provide needed goods and services. Use by labor unions to examine earnings closely as a basis for salary discussions.    Use by government agencies to formulate tax and economic policy.     Use by investors interested in the financial position of the entity. What might a manager...
Select one internal control from the list provided that would prevent or detect the error or...
Select one internal control from the list provided that would prevent or detect the error or fraud described. Controls may be used twice in this exercise or not at all. 1. ___ Invoices for goods sold are posted to the wrong account. 2. ___ Goods ordered by customers are shipped, but are not billed to anyone. 3. ___ Goods are removed from inventory for unauthorized orders. 4. ___ Invoices are sent to allies in a fraudulent scheme and sales are...
Which of the following is least likely to be included in the tax constraint for an...
Which of the following is least likely to be included in the tax constraint for an individual investor? a. The federal withholding tax from the individual's employment income. b. The tax liability from a taxable lump sum received as part of an employment contract. c. Property taxes to be paid during the upcoming year from ownership of a beach house. d. Capital gains taxes owed on the sale of a watch worn by Benjamin Franklin.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT