Exam 3: Fraud, Ethics, and Internal Control
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
According to the 2010 Report to the Nation by the Association of Certified Fraud Examiners, the estimate of global losses due to fraud would total approximately $650 billion.
(True/False)
4.9/5
(35)
The theft, concealment, and conversion of personal gain of another's money, physical assets, or information is termed:
(Multiple Choice)
4.9/5
(43)
This activity serves as a method to confirm the accuracy and completeness of data in the accounting system:
(Multiple Choice)
4.8/5
(38)
Which of the following types of fraud is the most common, according to the Association of Certified Fraud Examiners?
(Multiple Choice)
4.8/5
(46)
Computer systems increase the efficiency and effectiveness of an organization but also increase their vulnerability.
(True/False)
4.9/5
(35)
It is not always possible to avoid all mistakes and frauds because there will always be human error, human nature, and it is not always cost-effective to close all the holes.
(True/False)
4.9/5
(37)
The theft of assets by a non-management employee is termed:
(Multiple Choice)
4.9/5
(32)
This type of external computer fraud is intended to overwhelm an intended target computer system with so much bogus network traffic so that the system is unable to respond to valid traffic.
(Multiple Choice)
4.8/5
(50)
The existence of verifiable information about the accuracy of accounting records is called an):
(Multiple Choice)
4.7/5
(33)
In order to fulfill the obligations of stewardship and reporting, management has to create a code of ethics.
(True/False)
4.9/5
(36)
Management circumvention of systems or internal controls that are in place is termed:
(Multiple Choice)
4.9/5
(34)
In the Phar-Mor fraud case, management did not write or adopt a code of ethics.
(True/False)
4.8/5
(35)
The component of internal control, identified in the COSO report, that sets the tone of an organization and includes the consciousness of its employees is:
(Multiple Choice)
4.9/5
(40)
The careful and responsible oversight and use of the assets entrusted to management is called:
(Multiple Choice)
4.8/5
(34)
Which of the following is a characteristic of computer fraud?
(Multiple Choice)
4.8/5
(46)
In order to have the segregation of duties recommended by COSO, it would be necessary for a small organization to hire two additional individuals.At this time, there is not enough work for the one office employee to stay busy.The reason for not hiring the additional people would have to do with:
(Multiple Choice)
4.9/5
(32)
Showing 61 - 80 of 131
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)