Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
The ERM framework addresses four categories of management objectives. Which category addresses the effective and efficient use of resources?
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
B
Under the Sarbanes Oxley Act of 2002, the section on Corporate Responsibility requires a company's CEO and CFO to certify quarterly and annual reports.
Free
(True/False)
4.7/5
(34)
Correct Answer:
True
A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator.
Free
(Short Answer)
4.7/5
(34)
Correct Answer:
zombie
A(n) ______________________________ item is an object or event that is not authorized, never occurred, or is otherwise not genuine.
(Short Answer)
4.8/5
(30)
This component of the ERM framework that encompasses the tone of an organization and sets the basis for how risk is viewed and addressed by an entity's people, including risk management philosophy and risk appetite, integrity and ethical values and the environment in which they operate.
(Multiple Choice)
4.7/5
(39)
Under the Sarbanes Oxley Act of 2002, the section on Auditor Independence establishes an independent board to oversee public company audits.
(True/False)
4.8/5
(39)
The control environment reflects the organization's general awareness of and commitment to the importance of control throughout the organization.
(True/False)
4.7/5
(36)
Opportunities are events that could have a positive impact on organization objectives.
(True/False)
4.7/5
(43)
A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program.
(Short Answer)
4.9/5
(38)
Fraud is the possibility that an event or action will cause an organization to fail to meet its objectives (or goals).
(True/False)
4.9/5
(36)
A major reason management must exercise control over an organization's business processes is to provide reasonable assurance that the company is in compliance with applicable laws and regulations.
(True/False)
4.8/5
(38)
Assuring that the accounts receivable master data reflects all cash collections recorded in the cash receipts event data addresses the control goal of:
(Multiple Choice)
4.8/5
(41)
The control goal that is concerned with the correctness of the transaction data that are entered into a system is called ensure ______________________________.
(Short Answer)
4.8/5
(33)
____ is a process that evaluates the quality of internal control performance over time.
(Multiple Choice)
4.9/5
(36)
The section of Sarbanes Oxley that makes it a felony to knowingly destroy, alter, or create records and or documents with the intent to impede, obstruct, or influence an ongoing or contemplated federal investigation and offers legal protection to whistle-blowers is ______________________________.
(Short Answer)
4.8/5
(35)
The ERM framework addresses four categories of management objectives. Which category addresses the reliability of the financial statements?
(Multiple Choice)
4.9/5
(30)
A(n) ______________________________ is program code that can attach itself to other programs or macros thereby infecting those programs and macros.
(Short Answer)
4.9/5
(37)
Listed below are 13 specific fraud examples taken from some well-known fraud cases: MiniScribe, ZZZZ Best Carpet Cleaning, Lesley Fay, and Equity Funding.
Required:
For each fraud example, enter a letter corresponding to which information control goal was initially violated-Validity, Completeness, or Accuracy. Some examples might involve more than one violation.
NOTE: When we say initially, we mean what control goal failure led to this example, not what is the present condition. For example, master data might contain information that is inaccurate, but it might have been an inaccurate input that initially caused the data to be inaccurate.


(Essay)
4.8/5
(42)
______________________________ are those events that would have a negative impact on organization objectives.
(Short Answer)
4.8/5
(45)
Showing 1 - 20 of 161
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)