Exam 3: Fraud, Ethics, and Internal Control
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
The tone at the top of the organization tends to flow through the entire organization and affects behavior at all levels.
(True/False)
4.7/5
(40)
Industrial espionage can occur with or without the use of a computer.
(True/False)
4.9/5
(35)
Collusion can occur only when two employees who work for the same firm conspire to circumvent the internal controls to commit fraud or theft.
(True/False)
4.8/5
(37)
A company's cash custody function should be separated from the related cash recordkeeping function in order to:
(Multiple Choice)
4.8/5
(38)
Which of the following is generally an external computer fraud, rather than an internal computer fraud?
(Multiple Choice)
4.8/5
(40)
In order for a code of ethics to reduce opportunities for managers and employees to commit fraud, it is necessary that management emphasizes this code.Punishment related to violations of the code are not necessary.
(True/False)
4.9/5
(34)
Independent checks can serve as a preventive control in that they uncover problems in the data or the processing.
(True/False)
4.8/5
(32)
A poor control environment can be overcome if the remaining components of internal control are strong.
(True/False)
4.9/5
(30)
One of the components of internal control identified by COSO required that management must be considering threats and the potential for risks, and stand ready to respond should these events occur.This component is referred to as:
(Multiple Choice)
4.7/5
(40)
When management does not act ethically, fraud is more likely to occur.
(True/False)
4.9/5
(46)
Which of the following was NOT listed as a procedure to accomplish independent checks?
(Multiple Choice)
4.8/5
(26)
E-mail spoofing is more of an irritation to an organization that a fraud threat.
(True/False)
4.8/5
(28)
Defalcation and internal theft are names that refer to the misstatement of financial records.
(True/False)
4.7/5
(33)
According to the authors of this textbook, which of the following is not one of general categories of people who commit fraud?
(Multiple Choice)
4.8/5
(51)
This type of control is included in the internal control system because it is not always possible to prevent all frauds.They help employees to discover or uncover errors, fraud, or unauthorized events.
(Multiple Choice)
4.9/5
(30)
AICPA Trust Principles identify five categories of risks and controls.Which category is best described by the statement, "Information process could be inaccurate, incomplete, or not properly authorized"?
(Multiple Choice)
4.8/5
(42)
This type of control is designed to avoid errors, fraud, or events not authorized by management.
(Multiple Choice)
4.9/5
(35)
It is necessary to use a computer to accomplish software piracy.
(True/False)
4.7/5
(32)
Which of the following is not an example of employee fraud?
(Multiple Choice)
4.9/5
(31)
Showing 41 - 60 of 131
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)