Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
Ethical behavior and management integrity are products of the "corporate culture".
(True/False)
4.8/5
(41)
Automated business process controls contained within IT systems are called:
(Multiple Choice)
4.9/5
(38)
Business process control plans relate to those controls particular to a specific process or subsystem, such as billing or cash receipts.
(True/False)
4.9/5
(38)
Achieving which control goal requires that all valid objects or events are captured and entered into a system's database once and only once?
(Multiple Choice)
4.9/5
(39)
A logic bomb is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, may cause a disaster such as shutting down a system or destroying data.
(True/False)
4.8/5
(41)
Risks are those events that could have a negative impact on organization objectives.
(True/False)
4.8/5
(39)
COSO's ______________________________ is the foundation for all other components of internal control, providing discipline and structure.
(Short Answer)
4.8/5
(36)
____ are the policies and procedures that help ensure that the risk responses are effectively carried out.
(Multiple Choice)
4.8/5
(40)
A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant control plans.
(Short Answer)
4.7/5
(39)
A business event which is not properly authorized violates the control goal of:
(Multiple Choice)
4.8/5
(42)
Three terms used in the chapter to refer to when a control plan is exercised are ______________________________, ______________________________, and corrective control plans.
(Short Answer)
4.9/5
(32)
______________________________ is a process-effected by an entity's board of directors, management, and other personnel-designed to provide reasonable assurance regarding the achievement of objectives such as: effectiveness and efficiency of operations, reliability of reporting, and compliance with applicable laws and regulations.
(Short Answer)
4.7/5
(32)
The ERM framework addresses four categories of management objectives. Which category of concerns laws and regulations?
(Multiple Choice)
4.9/5
(26)
The control goal that seeks to protect an organization's resources from loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources is called ensure ______________________________.
(Short Answer)
4.9/5
(33)
COSO's ______________________________ is the entity's identification and analysis of relevant risks to the achievement of its objectives, forming a basis for determining how the risks should be managed.
(Short Answer)
4.7/5
(34)
______________________________ is the possibility that an event will occur.
(Short Answer)
4.9/5
(39)
The section of Sarbanes Oxley that authorizes the SEC to censure or deny any person the privilege of appearing or practicing before the SEC if that person is deemed to be unqualified, have acted in an unethical manner, or have aided and abetted in the violation of federal securities laws is ______________________________.
(Short Answer)
4.9/5
(42)
Which component of the ERM framework is best described here: Internal and external events affecting achievement of an entity's objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management's strategy or objective-setting processes.
(Multiple Choice)
4.8/5
(31)
A missing data field on a source document or computer screen is an example of an error that could undermine the achievement of the control goal of ensure ______________________________.
(Short Answer)
4.9/5
(30)
Showing 21 - 40 of 161
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)