Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The control goal called efficiency of operations strives to assure that a given operations system is fulfilling the purpose(s) for which it was intended.

(True/False)
5.0/5
(39)

A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files.

(Multiple Choice)
4.9/5
(34)

With the issuance of the SEC Interpretative Guidance and the implementation of AS5:

(Multiple Choice)
4.9/5
(27)

SAS No. 99 emphasizes auditors should brainstorm fraud risks, increase professional skepticism, use unpredictable audit test patterns, and detect management override of internal controls.

(True/False)
4.8/5
(37)

A(n) ______________________________ control plan is designed to rectify problems that have occurred.

(Short Answer)
4.8/5
(46)

The ERM framework addresses four categories of management objectives. Which category concerns high-level goals, aligned with and supporting its mission?

(Multiple Choice)
4.9/5
(36)

A fraud is a deliberate act or untruth intended to obtain unfair or unlawful gain.

(True/False)
4.8/5
(43)

A computer abuse technique called a back door involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program.

(True/False)
4.9/5
(31)

______________________________ are events that would have a positive impact on objectives.

(Short Answer)
4.8/5
(39)

A computer crime technique called worm involves the systematic theft of very small amounts from a number of bank or other financial accounts.

(True/False)
4.7/5
(28)

Events that could have a positive impact on organizational objectives:

(Multiple Choice)
4.8/5
(41)

Discrepancies between data items recorded by a system and the underlying economic events or objects they represent are a violation of the control goal of:

(Multiple Choice)
4.9/5
(36)

______________________________ are applied to all IT service activities.

(Short Answer)
4.8/5
(30)

Ensuring the security of resources is the control goal that seeks to provide protection of organization's resources from loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources.

(True/False)
4.9/5
(38)

Under the Sarbanes Oxley Act of 2002, the section on Enhanced Financial Disclosures requires each annual report filed with the SEC to include an internal control report.

(True/False)
4.9/5
(34)

Why is there usually no control goal called update validity?

(Multiple Choice)
4.8/5
(46)

COSO's ______________________________ is a process that assesses the quality of internal control performance over time.

(Short Answer)
4.9/5
(38)

The ERM framework is comprised of eight components. Which component includes the policies and procedures established and implemented to help ensure the risk responses are effectively carried out?

(Multiple Choice)
4.9/5
(39)

______________________________ are business process objectives that an internal control system is designed to achieve.

(Short Answer)
4.9/5
(39)

A control that involves reprocessing transactions that are rejected during initial processing is an example of:

(Multiple Choice)
4.8/5
(45)
Showing 61 - 80 of 161
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)