b. Processor fraud [Correct. Processor fraud includes unauthorized system use, including
the theft of computer time and services.]
b. fraudulent financial reporting (Correct. Attesting to fraudulent financial statements is
the basis of a large percentage of lawsuits against auditors.)
b. The psychological profiles of white-collar criminals are significantly different from
those of the general public. (Correct. This is false; the psychological profile of whitecollar
criminals is similar to that of the general public.)
a b d
c. failure to perform preventive maintenance on a computer (Correct. This is poor management
of computer resources, but it is not computer fraud.)
a. human errors (Correct. The Computing Technology Industry Association estimates
that human errors cause 80% of security problems. These unintentional acts usually
are caused by human carelessness, failure to follow established procedures, and poorly
trained or supervised personnel.)
d. catching the perpetrators in the act of committing the fraud. (Correct. SAS No. 99 does
not require auditors to witness the perpetrators committing fraud.)
d. periodic rotation of duties (Correct. Lapping requires a constant and ongoing cover-up
to hide the stolen funds. Rotating duties such that the perpetrator does not have access
to the necessary accounting records will most likely result in the fraud’s discovery.)
c. segregation of duties (Correct. Segregating duties among different employees is the
most effective control for the largest number of fraud schemes, because it makes it difficult
for any single employee to both commit and conceal a fraud.)
a. insurance (Correct. The right insurance will pay for all or a portion of fraud losses.)
b. regular backup of data and programs (Correct. Regular backup helps the injured party
recover lost or damaged data and programs.)
c. contingency plan (Correct. A contingency plan helps the injured party restart operations
on a timely basis.)