Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ERM framework addresses four categories of management objectives. Which category addresses the effective and efficient use of resources?

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

Under the Sarbanes Oxley Act of 2002, the section on Corporate Responsibility requires a company's CEO and CFO to certify quarterly and annual reports.

Free
(True/False)
4.7/5
(34)
Correct Answer:
Verified

True

A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator.

Free
(Short Answer)
4.7/5
(34)
Correct Answer:
Verified

zombie

A(n) ______________________________ item is an object or event that is not authorized, never occurred, or is otherwise not genuine.

(Short Answer)
4.8/5
(30)

This component of the ERM framework that encompasses the tone of an organization and sets the basis for how risk is viewed and addressed by an entity's people, including risk management philosophy and risk appetite, integrity and ethical values and the environment in which they operate.

(Multiple Choice)
4.7/5
(39)

Under the Sarbanes Oxley Act of 2002, the section on Auditor Independence establishes an independent board to oversee public company audits.

(True/False)
4.8/5
(39)

The control environment reflects the organization's general awareness of and commitment to the importance of control throughout the organization.

(True/False)
4.7/5
(36)

Opportunities are events that could have a positive impact on organization objectives.

(True/False)
4.7/5
(43)

A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program.

(Short Answer)
4.9/5
(38)

Fraud is the possibility that an event or action will cause an organization to fail to meet its objectives (or goals).

(True/False)
4.9/5
(36)

A major reason management must exercise control over an organization's business processes is to provide reasonable assurance that the company is in compliance with applicable laws and regulations.

(True/False)
4.8/5
(38)

Assuring that the accounts receivable master data reflects all cash collections recorded in the cash receipts event data addresses the control goal of:

(Multiple Choice)
4.8/5
(41)

The control goal that is concerned with the correctness of the transaction data that are entered into a system is called ensure ______________________________.

(Short Answer)
4.8/5
(33)

Control goals of operations processes include:

(Multiple Choice)
4.9/5
(37)

____ is a process that evaluates the quality of internal control performance over time.

(Multiple Choice)
4.9/5
(36)

The section of Sarbanes Oxley that makes it a felony to knowingly destroy, alter, or create records and or documents with the intent to impede, obstruct, or influence an ongoing or contemplated federal investigation and offers legal protection to whistle-blowers is ______________________________.

(Short Answer)
4.8/5
(35)

The ERM framework addresses four categories of management objectives. Which category addresses the reliability of the financial statements?

(Multiple Choice)
4.9/5
(30)

A(n) ______________________________ is program code that can attach itself to other programs or macros thereby infecting those programs and macros.

(Short Answer)
4.9/5
(37)

Listed below are 13 specific fraud examples taken from some well-known fraud cases: MiniScribe, ZZZZ Best Carpet Cleaning, Lesley Fay, and Equity Funding. Required: For each fraud example, enter a letter corresponding to which information control goal was initially violated-Validity, Completeness, or Accuracy. Some examples might involve more than one violation. NOTE: When we say initially, we mean what control goal failure led to this example, not what is the present condition. For example, master data might contain information that is inaccurate, but it might have been an inaccurate input that initially caused the data to be inaccurate. Listed below are 13 specific fraud examples taken from some well-known fraud cases: MiniScribe, ZZZZ Best Carpet Cleaning, Lesley Fay, and Equity Funding. Required: For each fraud example, enter a letter corresponding to which information control goal was initially violated-Validity, Completeness, or Accuracy. Some examples might involve more than one violation. NOTE: When we say initially, we mean what control goal failure led to this example, not what is the present condition. For example, master data might contain information that is inaccurate, but it might have been an inaccurate input that initially caused the data to be inaccurate.

(Essay)
4.8/5
(42)

______________________________ are those events that would have a negative impact on organization objectives.

(Short Answer)
4.8/5
(45)
Showing 1 - 20 of 161
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)