Exam 11: Ais and Internal Controls
Exam 2: Accountants As Business Analysts52 Questions
Exam 3: Data Modeling50 Questions
Exam 4: Relational Databases and Enterprise System50 Questions
Exam 5: Sales and Collections Business Process36 Questions
Exam 6: Purchases and Payments Business Process37 Questions
Exam 7: Conversion Processes34 Questions
Exam 9: Data Analytics in Accounting30 Questions
Exam 10: Reporting Processes and Extensible Business Reporting Language XBRL12 Questions
Exam 11: Ais and Internal Controls55 Questions
Exam 12: Information Security and Computer Fraud52 Questions
Exam 13: Monitoring and Auditing Ais50 Questions
Exam 14: The Balanced Scorecard and Business Value of Information Technology40 Questions
Exam 15: Evaluating Ais Investments28 Questions
Exam 16: The Systems Development Life Cycle and Project Management: Addressing the Challenges of Building Ais Systems15 Questions
Select questions type
The main objective of the ISO 27000 series is to provide a model for establishing, implementing, operating, monitoring, maintaining, and improving information security.
Free
(True/False)
4.9/5
(43)
Correct Answer:
False
Which of the following input controls is a numeric value computed to provide assurance that the original value has not been altered in construction or transmission?
A. Hash total.
B. Parity check.
C. Encryption.
D. Check digit.
Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Check digit
Proper segregation of duties calls for separation of the following functions:
A. Authorization, execution, and payment.
B. Authorization, recording, and custody.
C. Custody, execution, and reporting.
D. Authorization, payment, and recording.
Free
(Short Answer)
4.9/5
(41)
Correct Answer:
Authorization, recording, and custody
In a large pubic corporation, evaluating internal control procedures should be responsibility of:
A. Accounting management staff who report to the CFO.
B. Internal audit staff who report to the board of directors.
C. Operations management staff who report to the chief operation officer.
D. Security management staff who report to the chief facilities officer.
(Short Answer)
4.8/5
(42)
Each of the following types of controls is considered to be an entity-level control, except those:
A. Relating to the control environment.
B. Pertaining to the company's risk assessment process.
C. Regarding the company's annual stockholder meeting.
D. Addressing policies over significant risk management practices
(Short Answer)
4.9/5
(30)
The Public Company Accounting Oversight Board (PCAOB) is not responsible for standards related to:
A. Accounting practice.
B. Attestation.
C. Auditing.
D. Quality control over attestation and/or assurance.
(Short Answer)
4.8/5
(36)
When considering internal control, an auditor should be aware of reasonable assurance, which recognizes that
A. Internal control may be ineffective due to mistakes in judgment and personal carelessness.
B. Adequate safeguards over access to assets and records should permit an entity to maintain proper accountability.
C. Establishing and maintaining internal control is an important responsibility of management.
D. The cost of an entity's internal control should not exceed the benefits expected to be derived.
(Short Answer)
4.8/5
(33)
In a computerized environment, internal controls can be categorized into which of the following?
A. General controls and application controls.
B. Detective controls and protective controls.
C. Network controls and transaction controls.
D. Preventive controls and mandatory controls.
(Short Answer)
4.9/5
(39)
Tracing shipping documents to pre-numbered sales invoices provides evidence that
A. No duplicate shipments or billings occurred.
B. Shipments to customers were properly invoiced.
C. All goods ordered by customers were shipped.
D. All pre-numbered sales invoices were accounted for.
(Short Answer)
4.9/5
(37)
Reconciliation of cash accounts may be referred to as what type of control?
A. Detective.
B. Preventive.
C. Adjustive.
D. Non-routine.
(Short Answer)
4.7/5
(33)
According to COSO ERM, which of the following is not one of the bases that should be used to analyze the risks of an identified event?
A. Inherent risk.
B. Organizational risk.
C. Residual risk.
D. Control risk.
(Short Answer)
4.7/5
(35)
Internal controls guarantee the accuracy and reliability of accounting records.
(True/False)
4.8/5
(40)
Management philosophy and operating style would have a relatively less significant influence on a firm's control environment when
A. The internal auditor reports directly to the controller.
B. Management is dominated by one individual.
C. Accurate management job descriptions delineate specific duties.
D. The audit committee does not have regular meetings.
(Short Answer)
4.9/5
(31)
Review of the audit log is an example of which of the following types of security control?
A. Governance.
B. Detective.
C. Preventive.
D. Corrective.
(Short Answer)
4.9/5
(37)
Sound internal control dictates that immediately upon receiving checks from customers by mail, a responsible employee should
A. Add the checks to the daily cash summary.
B. Verify that each check is supported by a pre-numbered sales invoice.
C. Prepare a summary listing of checks received.
D. Record the checks in the cash receipts journal.
(Short Answer)
4.9/5
(38)
Which of the following is an example of a validity check?
A. The computer ensures that a numerical amount in a record does not exceed some predetermined amount.
B. As the computer corrects errors and data are successfully resubmitted to the system, the causes of the errors are printed out.
C. After data for a transaction are entered, the computer sends certain data back to the terminal for comparison with data originally sent.
E. The computer flags any transmission for which the control field value did not match that of an existing file record.
(Short Answer)
4.8/5
(45)
Which of the following best describes what is meant by corporate governance?
A. The organizational structure and responsibilities of the executive team and board of directors of a corporation.
B. Regulatory bodies, such as the SEC and PCAOB, that govern the behavior of corporations.
C. The ability of a corporation's management team to meet earnings forecasts over an extended period of time..
D. Management's processes, policies, and ethical approach to safeguarding stakeholder interests.
(Short Answer)
4.9/5
(38)
Controls in the information technology area are classified into preventive, detective, and corrective categories. Which of the following is preventive control?
A. Contingency planning.
B. Hash total.
C. Echo check.
D. Access control software.
(Short Answer)
4.9/5
(36)
A firm must establish control policies, procedures, and practices that ensure the firm's business objectives are achieved and its risk mitigation strategies are carried out.
(True/False)
4.9/5
(26)
Showing 1 - 20 of 55
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)