Exam 3: Fraud, Ethics, and Internal Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The theft of proprietary company information is called:

(Multiple Choice)
4.8/5
(43)

When two or more people work together to commit a fraud, it is called:

(Multiple Choice)
4.8/5
(44)

Proper segregation of functional responsibilities calls for separation of the functions of:

(Multiple Choice)
4.9/5
(36)

The Sarbanes-Oxley act was passed in 2002 as a Congress's response to the many situations of fraudulent financial reporting discovered during 2001.The intention of the Act was:

(Multiple Choice)
4.7/5
(40)

A fraudster uses this to alter a program to slice a small amount from several accounts, crediting those small amounts to the perpetrator's benefit.

(Multiple Choice)
4.9/5
(38)

Circumstances that provide access to the assets or records that are the objects of the fraudulent activity describes which condition of the Fraud Triangle?

(Multiple Choice)
4.8/5
(39)

When a customer improperly obtains cash or property from a company, or avoids liability through deception, it is termed:

(Multiple Choice)
4.7/5
(40)

The most common method for detecting occupational fraud is a tip - from an employee, a customer, vendor, or anonymous source.

(True/False)
4.8/5
(33)

The risk related to this category of Trust Services Principles could be inaccurate, incomplete, or improperly authorized information.

(Multiple Choice)
4.7/5
(36)

A kickback is an example of which type of fraud?

(Multiple Choice)
4.9/5
(35)

Changing the accounting records to hide the existence of a fraud is termed:

(Multiple Choice)
4.9/5
(31)

COSO describes five components of internal control.Which of the following terms is best described as "policies and procedures that help ensure management directives are carried out and management objectives are achieved"?

(Multiple Choice)
4.9/5
(34)

The objectives of an internal control system include all of the following except:

(Multiple Choice)
4.9/5
(43)

The risk assessment is the foundation for all other components of internal control and provides the discipline and structure of all other components.

(True/False)
4.8/5
(34)

A sophisticated accounting system will provide the necessary accurate and effective feedback needed by management to assess, manage and control the operations of an organization.

(True/False)
4.8/5
(34)

The risk related to this category of Trust Principles is system or subsystem failure due to hardware or software problems.

(Multiple Choice)
4.8/5
(33)

The review of amounts charged to the company from a seller that it purchased from is called a:

(Multiple Choice)
4.9/5
(33)

The process of risk assessment would include all of the following actions, except:

(Multiple Choice)
4.7/5
(31)

Internal controls can be effective in preventing or detecting all of the following types of fraud except:

(Multiple Choice)
4.8/5
(32)

The main risk related to this category of Trust Services Principles is unauthorized access.

(Multiple Choice)
4.8/5
(33)
Showing 81 - 100 of 131
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)