Search Header Logo
AIS: Async Computer Fraud

AIS: Async Computer Fraud

Assessment

Presentation

Other

University

Easy

Created by

Accounting Dept KPM Bandar Penawar

Used 1+ times

FREE Resource

4 Slides • 17 Questions

1

media

2

web page not embeddable

Definition of Computer Fraud, Types and Classification | Loom

You can open this webpage in a new tab.

3

Multiple Choice

A junior bank employee notices unusual activity where his colleague is modifying customer account balances directly in the database while transactions are being processed. When the employee reports this to his supervisor, what type of computer fraud should be investigated according to the classification?

1

Input fraud

2

Processor fraud

3

Output fraud

4

Network fraud

4

Multiple Choice

Sarah, working as a retail store manager, discovers that one of her staff members has been entering false refund transactions into the system using genuine customer details at the point of sale terminal during peak hours. What specific type of computer fraud is being committed in this situation?

1

Output fraud

2

Processor fraud

3

Input fraud

4

System fraud

5

Multiple Choice

During an external audit of a multinational corporation, auditors discover that while the accounting database contains accurate financial figures, the system generates shareholder reports showing significantly inflated profits. Which category of computer fraud best describes this situation?

1

Data manipulation fraud

2

Output fraud

3

Input Fraud

4

Processing Fraud

6

Multiple Choice

Input fraud can only occur through digital means and never through manual data entry.

1
True
2
False

7

Multiple Choice

Output fraud involves manipulating the final presentation of data, even if the underlying data is correct.

1

True

2

False

8

Multiple Choice

How many times does Sir Helmi yawn in previous video?

1

1

2

2

3

3

4

4

9

web page not embeddable

Computer Fraud and Abuse Techniques | Loom

You can open this webpage in a new tab.

10

Multiple Choice

The finance director of Bersatu Corporation receives an urgent email supposedly from the CEO requesting an immediate wire transfer of RM500,000 to a new supplier. Upon closer inspection, the email address differs by one character from the CEO's actual email, and the message emphasizes the urgent nature of the transaction. What combination of fraud techniques is most likely being employed?

1
Malware and ransomware
2
Data breach and insider threat
3
Identity theft and social engineering
4
Phishing and email spoofing

11

Multiple Choice

A company's IT security team detects a pattern of systematic login attempts occurring every three seconds on their main server, with each attempt using variations of common passwords and employee names. What type of cyber attack is most likely occurring?

1
DDoS attack
2
Brute force attack
3
Phishing attack
4
SQL injection attack

12

Multiple Choice

A multinational bank's security team discovers several branded USB drives scattered strategically near employee parking spots and building entrances, labeled with enticing titles such as "Executive Salaries 2024" and "Confidential Merger Details." What specific type of social engineering attack does this represent?

1
Phishing
2
Pretexting
3

Spoofing

4
Baiting

13

Multiple Choice

Password cracking always involves using sophisticated software and cannot be done through simple guessing techniques.

1

True

2

False

14

Multiple Choice

Botnets are networks of compromised computers that can be controlled remotely by attackers.

1

True

2

False

15

web page not embeddable

Computer Fraud Impact and Preventing Strategies | Loom

You can open this webpage in a new tab.

16

Multiple Choice

Following a major data breach at Xavier Healthcare, the company faces immediate financial penalties, extensive media coverage of exposed patient records, and a significant drop in their stock price. Several long-term clients have terminated their contracts, and potential clients are choosing competitors. What represents the most significant long-term impact to the organization?

1

Immediate financial loss

2

Technical system damage

3

Employee morale

4
Loss of trust and reputation in the market

17

Multiple Choice

A financial institution implements a new security system requiring employees to enter their password, scan their fingerprint, and input a code from their security token before accessing sensitive customer data. Which security measure best describes this implementation?

1
Single sign-on (SSO)
2
Multi-factor authentication (MFA)
3
Password complexity requirement
4
Biometric access control

18

Multiple Choice

A large corporation's finance department institutes new procedures where payment requests must be initiated by the accounting team, approved by finance managers, and reconciled by external auditors. What specific control measure is being implemented?

1

Access control

2
Segregation of duties
3

Audit logging

4
Centralized approval process

19

Multiple Choice

Regular security audits and vulnerability assessments are essential components of a comprehensive fraud prevention strategy.

1

True

2

False

20

Multiple Choice

Employee training is less important than technical controls in preventing computer fraud.

1

True

2

False

21

Audio Response

In this audio reflection, provide a detailed explanation of the most significant concept or insight you gained from this lecture. Your recording must be a minimum of 1 minute in length.

audio
Open Audio Recorder
media

Show answer

Auto Play

Slide 1 / 21

SLIDE