Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
The control goal called efficiency of operations strives to assure that a given operations system is fulfilling the purpose(s) for which it was intended.
(True/False)
5.0/5
(39)
A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files.
(Multiple Choice)
4.9/5
(34)
With the issuance of the SEC Interpretative Guidance and the implementation of AS5:
(Multiple Choice)
4.9/5
(27)
SAS No. 99 emphasizes auditors should brainstorm fraud risks, increase professional skepticism, use unpredictable audit test patterns, and detect management override of internal controls.
(True/False)
4.8/5
(37)
A(n) ______________________________ control plan is designed to rectify problems that have occurred.
(Short Answer)
4.8/5
(46)
The ERM framework addresses four categories of management objectives. Which category concerns high-level goals, aligned with and supporting its mission?
(Multiple Choice)
4.9/5
(36)
A fraud is a deliberate act or untruth intended to obtain unfair or unlawful gain.
(True/False)
4.8/5
(43)
A computer abuse technique called a back door involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program.
(True/False)
4.9/5
(31)
______________________________ are events that would have a positive impact on objectives.
(Short Answer)
4.8/5
(39)
A computer crime technique called worm involves the systematic theft of very small amounts from a number of bank or other financial accounts.
(True/False)
4.7/5
(28)
Events that could have a positive impact on organizational objectives:
(Multiple Choice)
4.8/5
(41)
Discrepancies between data items recorded by a system and the underlying economic events or objects they represent are a violation of the control goal of:
(Multiple Choice)
4.9/5
(36)
______________________________ are applied to all IT service activities.
(Short Answer)
4.8/5
(30)
Ensuring the security of resources is the control goal that seeks to provide protection of organization's resources from loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources.
(True/False)
4.9/5
(38)
Under the Sarbanes Oxley Act of 2002, the section on Enhanced Financial Disclosures requires each annual report filed with the SEC to include an internal control report.
(True/False)
4.9/5
(34)
Why is there usually no control goal called update validity?
(Multiple Choice)
4.8/5
(46)
COSO's ______________________________ is a process that assesses the quality of internal control performance over time.
(Short Answer)
4.9/5
(38)
The ERM framework is comprised of eight components. Which component includes the policies and procedures established and implemented to help ensure the risk responses are effectively carried out?
(Multiple Choice)
4.9/5
(39)
______________________________ are business process objectives that an internal control system is designed to achieve.
(Short Answer)
4.9/5
(39)
A control that involves reprocessing transactions that are rejected during initial processing is an example of:
(Multiple Choice)
4.8/5
(45)
Showing 61 - 80 of 161
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)