Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
According to the 2011 PricewaterhouseCoopers (PwC) Global Economic Crime Survey:
(Multiple Choice)
4.8/5
(36)
A(n) ____ is a computer abuse technique where unauthorized instructions are inserted into a program to systematically steal very small amounts, usually by rounding to the nearest cent in financial transactions.
(Multiple Choice)
4.7/5
(49)
A manager of a manufacturing plant alters production reports to provide the corporate office with an inflated perception of the plant's cost effectiveness in an effort to keep the inefficient plant from being closed. This action would be classified as a(n):
(Multiple Choice)
4.9/5
(40)
Events that could have a negative impact on organizational objectives:
(Multiple Choice)
4.9/5
(36)
A(n) ______________________________ control plan is designed to discover problems that have occurred.
(Short Answer)
4.7/5
(32)
____ sets the tone of the organization, influencing the control consciousness of its people.
(Multiple Choice)
4.9/5
(41)
A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data.
(Short Answer)
4.8/5
(44)
External directives are the policies and procedures that help ensure that management directives are carried out.
(True/False)
4.9/5
(41)
The control matrix is a computer virus that takes control of the computer's operating system for malicious purposes.
(True/False)
4.9/5
(42)
COSO's ______________________________ are the policies and procedures that help ensure that management directives are carried out.
(Short Answer)
4.9/5
(36)
The section of Sarbanes Oxley that provides for fines and imprisonment of up to 20 years for individuals who corruptly alter, destroy, mutilate, or conceal documents with the intent to impair the document's integrity or availability for use in an official proceeding, or to otherwise obstruct, influence or impede any official proceeding is ______________________________.
(Short Answer)
4.9/5
(34)
A programming error causes the sale of an inventory item to be added to the quantity on hand attribute in the inventory master data. Which control goal was not achieved?
(Multiple Choice)
4.8/5
(30)
place the capital letter of the source that best matches that description. HINT: Some letters may be used more than once. Conversely, some letters may not apply at all.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(38)
______________________________ is a deliberate act or untruth intended to obtain unfair or unlawful gain.
(Short Answer)
4.9/5
(39)
The major reasons for exercising control of the organization's business processes include:
(Multiple Choice)
4.7/5
(32)
Approvals, authorizations, verifications, reconciliations, reviews of operating performance, security procedures, supervision, audit trails, and segregation of duties are examples of:
(Multiple Choice)
4.8/5
(44)
The control goal of ensure ______________________________ provides assurance that all valid objects or events which were entered into the computer are in turn reflected in their respective master data once and only once.
(Short Answer)
4.8/5
(38)
A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks.
(Short Answer)
4.8/5
(34)
Showing 81 - 100 of 161
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)