Exam 3: Fraud, Ethics, and Internal Control
Exam 1: Introduction to AIS81 Questions
Exam 2: Foundational Concepts of the AIS117 Questions
Exam 3: Fraud, Ethics, and Internal Control98 Questions
Exam 4: Internal Controls and Risks in IT Systems108 Questions
Exam 5: IT Governance93 Questions
Exam 6: Enterprise Resource Planning ERP Systems71 Questions
Exam 7: Auditing Information Technology-Based Processes108 Questions
Exam 8: Revenue and Cash Collection Processes and Controls104 Questions
Exam 9: Expenditures Processes and Controlspurchases92 Questions
Exam 10: Expenditures Processes and Controlspayroll and Fixed Assets95 Questions
Exam 11: Conversion Processes and Controls105 Questions
Exam 12: Administrative Processes and Controls99 Questions
Exam 13: Data and Databases118 Questions
Exam 14: E-Commerce and E-Business105 Questions
Select questions type
The most difficult type of misstatement to discover is fraud that is concealed by:
(Multiple Choice)
4.8/5
(39)
The Trust Services Principles document divided the risks and controls in IT into five categories.Which of the following is not one of those categories?
(Multiple Choice)
4.9/5
(39)
Management circumvention of systems or internal controls that are in place is termed:
(Multiple Choice)
4.7/5
(35)
Fraudsters typically try to justify their behavior by telling themselves that they intend to repay the amount stolen or that they believe the organization owes them the amount stolen.This justification is referred to as:
(Multiple Choice)
4.9/5
(47)
This type of external computer fraud is intended to overwhelm an intended target computer system with so much bogus network traffic so that the system is unable to respond to valid traffic.
(Multiple Choice)
4.8/5
(33)
The accounting profession has accepted this report as the standard definition and description of internal control.
(Multiple Choice)
4.8/5
(36)
Which of the following is a characteristic of computer fraud?
(Multiple Choice)
4.9/5
(35)
Independent checks on the performance of others is one of the categories of internal control.These independent checks would include all of the following, except:
(Multiple Choice)
4.9/5
(33)
Segregation of duties is a fundamental concept in an effective system of internal controls.Nevertheless, the effectiveness of this control can be compromised through which situation?
(Multiple Choice)
5.0/5
(35)
Establishing and maintaining a culture where ethical conduct is recognized, valued, and exemplified by all employees can be accomplished by doing all of the following except:
(Multiple Choice)
4.8/5
(35)
According to the COSO report, there are five different interrelated components of internal control.Which of the following is not one of those five components?
(Multiple Choice)
4.9/5
(49)
Which of the following is not an obligation of management in an organization with strong ethical practices and internal controls?
(Multiple Choice)
5.0/5
(36)
The category of control activities referred to as segregation of duties requires that certain activities should be the responsibility of different person or department.The three duties that are to be separated are:
(Multiple Choice)
4.8/5
(36)
The process of risk assessment would include all of the following actions, except:
(Multiple Choice)
4.9/5
(36)
Which is not one of the three conditions necessary for fraud perpetration
(Multiple Choice)
4.8/5
(40)
The ongoing review and evaluation of a system of internal control is referred to as:
(Multiple Choice)
4.9/5
(41)
Which of the following is generally an external computer fraud, rather than an internal computer fraud?
(Multiple Choice)
4.8/5
(32)
Showing 81 - 98 of 98
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)