Exam 3: Fraud, Ethics, and Internal Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The category of control activities referred to as segregation of duties requires that certain activities should be the responsibility of different person or department.The three duties that are to be separated are:

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

Which of the following is NOT one of the three critical actions that a company can undertake to assist with fraud prevention and fraud detection?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

A vendor audit occurs when a vendor examines the books and records of a customer.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

False

Which of the following statements related to the COSO report is false?

(Multiple Choice)
4.8/5
(33)

The COSO report identified a component of internal control as the policies and procedures that help ensure that management directives are carried out and that management directives are achieved The component is:

(Multiple Choice)
5.0/5
(36)

The three conditions that make up the fraud triangle are theft, concealment, and conversion.

(True/False)
4.9/5
(40)

Factors that limit the effectiveness of internal controls include all of the following except:

(Multiple Choice)
4.8/5
(40)

According to the ACFE 2010 Report to the Nation, fraudulent financial statements account for less than 5% of the cases, and were the least costly form of fraud.

(True/False)
4.8/5
(29)

Maintaining high ethics can help prevent fraud but will not help to detect fraud.

(True/False)
4.8/5
(30)

Which of the following objectives were not identified as necessary to be provided by an effective accounting system?

(Multiple Choice)
4.8/5
(36)

Feedback needed by management to assess, manage, and control the efficiency and effectiveness of the operations of an organization relates to both financial and operational information.

(True/False)
4.9/5
(43)

A hacker is someone who has gained unauthorized access to the computer and must be someone outside the organization.

(True/False)
4.8/5
(33)

In response to the need for internal controls above and beyond what was described by COSO, the Information Systems Audit and Control Association developed an extensive framework of IT controls entitled:

(Multiple Choice)
4.8/5
(37)

Small businesses, those having fewer than 100 employees, are less vulnerable to fraud and abuse than are larger businesses.

(True/False)
4.9/5
(39)

A cash payment made by a vendor to an organization's employee in exchange for a sale to the organization by the vendor is termed:

(Multiple Choice)
4.8/5
(36)

A situation where the organization's cash is stolen after it is entered in the accounting records is termed:

(Multiple Choice)
4.9/5
(40)

The Trust Services Principles document divided the risks and controls in IT into five categories.Which of the following is not one of those categories?

(Multiple Choice)
4.9/5
(35)

A situation where the organization's cash is stolen before it is entered in the accounting records is termed:

(Multiple Choice)
4.8/5
(31)

A good set of internal controls may not be as effective in reducing the chance of management fraud as it would be in reducing the chance of fraud committed by an employee.

(True/False)
4.9/5
(37)

The ongoing review and evaluation of a system of internal control is referred to as:

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 131
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)