Exam 3: Fraud, Ethics, and Internal Control
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
When two or more people work together to commit a fraud, it is called:
(Multiple Choice)
4.8/5
(44)
Proper segregation of functional responsibilities calls for separation of the functions of:
(Multiple Choice)
4.9/5
(36)
The Sarbanes-Oxley act was passed in 2002 as a Congress's response to the many situations of fraudulent financial reporting discovered during 2001.The intention of the Act was:
(Multiple Choice)
4.7/5
(40)
A fraudster uses this to alter a program to slice a small amount from several accounts, crediting those small amounts to the perpetrator's benefit.
(Multiple Choice)
4.9/5
(38)
Circumstances that provide access to the assets or records that are the objects of the fraudulent activity describes which condition of the Fraud Triangle?
(Multiple Choice)
4.8/5
(39)
When a customer improperly obtains cash or property from a company, or avoids liability through deception, it is termed:
(Multiple Choice)
4.7/5
(40)
The most common method for detecting occupational fraud is a tip - from an employee, a customer, vendor, or anonymous source.
(True/False)
4.8/5
(33)
The risk related to this category of Trust Services Principles could be inaccurate, incomplete, or improperly authorized information.
(Multiple Choice)
4.7/5
(36)
Changing the accounting records to hide the existence of a fraud is termed:
(Multiple Choice)
4.9/5
(31)
COSO describes five components of internal control.Which of the following terms is best described as "policies and procedures that help ensure management directives are carried out and management objectives are achieved"?
(Multiple Choice)
4.9/5
(34)
The objectives of an internal control system include all of the following except:
(Multiple Choice)
4.9/5
(43)
The risk assessment is the foundation for all other components of internal control and provides the discipline and structure of all other components.
(True/False)
4.8/5
(34)
A sophisticated accounting system will provide the necessary accurate and effective feedback needed by management to assess, manage and control the operations of an organization.
(True/False)
4.8/5
(34)
The risk related to this category of Trust Principles is system or subsystem failure due to hardware or software problems.
(Multiple Choice)
4.8/5
(33)
The review of amounts charged to the company from a seller that it purchased from is called a:
(Multiple Choice)
4.9/5
(33)
The process of risk assessment would include all of the following actions, except:
(Multiple Choice)
4.7/5
(31)
Internal controls can be effective in preventing or detecting all of the following types of fraud except:
(Multiple Choice)
4.8/5
(32)
The main risk related to this category of Trust Services Principles is unauthorized access.
(Multiple Choice)
4.8/5
(33)
Showing 81 - 100 of 131
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)