Exam 3: Fraud, Ethics, and Internal Control
Exam 1: Introduction to AIS81 Questions
Exam 2: Foundational Concepts of the AIS117 Questions
Exam 3: Fraud, Ethics, and Internal Control98 Questions
Exam 4: Internal Controls and Risks in IT Systems108 Questions
Exam 5: IT Governance93 Questions
Exam 6: Enterprise Resource Planning ERP Systems71 Questions
Exam 7: Auditing Information Technology-Based Processes108 Questions
Exam 8: Revenue and Cash Collection Processes and Controls104 Questions
Exam 9: Expenditures Processes and Controlspurchases92 Questions
Exam 10: Expenditures Processes and Controlspayroll and Fixed Assets95 Questions
Exam 11: Conversion Processes and Controls105 Questions
Exam 12: Administrative Processes and Controls99 Questions
Exam 13: Data and Databases118 Questions
Exam 14: E-Commerce and E-Business105 Questions
Select questions type
A set of documented guidelines for moral and ethical behavior within an organization is termed a(n):
(Multiple Choice)
4.8/5
(37)
If an organization's IT systems are not properly controlled, they may become exposed to the risks of:
(Multiple Choice)
4.9/5
(45)
When a customer improperly obtains cash or property from a company, or avoids liability through deception, it is termed:
(Multiple Choice)
4.8/5
(36)
Jamie Stark, a sales employee, stole merchandise from her employer, and Frank Adams, the accounting clerk, covered it up by altering the inventory records.This is an example of:
(Multiple Choice)
4.9/5
(36)
A process, effected by an entity's board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives related to the effectiveness and efficiency of operations, reliability of financial reporting, and compliance with applicable laws and regulations is:
(Multiple Choice)
4.8/5
(33)
When a person, using a computer system, pretends to be someone else, it is termed:
(Multiple Choice)
4.9/5
(42)
Which of the following is not an example of employee fraud?
(Multiple Choice)
4.9/5
(30)
When a person alters a system generated check or reports to commit fraud it is referred to as:
(Multiple Choice)
4.8/5
(42)
The existence of verifiable information about the accuracy of accounting records is called a(n):
(Multiple Choice)
4.9/5
(37)
Which control activity is intended to serve as a method to confirm the accuracy or completeness of data in the accounting system?
(Multiple Choice)
4.7/5
(39)
The theft of assets by a non-management employee is termed:
(Multiple Choice)
4.7/5
(37)
Internal controls can be effective in preventing or detecting all of the following types of fraud except:
(Multiple Choice)
5.0/5
(32)
When discussing the security of assets and documents, there are many actions that can be taken.Which of the following would not be related to this category of internal control?
(Multiple Choice)
4.9/5
(42)
The types of concepts commonly found in a code of ethics would not include:
(Multiple Choice)
4.8/5
(41)
The range of actions that make up the component of internal control referred to as control activities includes each of the following, except:
(Multiple Choice)
4.9/5
(41)
All of the following are reasons why it is not possible to eliminate all fraud risks, except
(Multiple Choice)
4.8/5
(40)
In order to have the segregation of duties recommended by COSO, it would be necessary for a small organization to hire two additional individuals.At this time, there is not enough work for the one office employee to stay busy.The reason for not hiring the additional people would have to do with:
(Multiple Choice)
4.8/5
(41)
Showing 61 - 80 of 98
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)