Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control
Exam 1: Introduction to Accounting Information Systems115 Questions
Exam 2: Enterprise Systems140 Questions
Exam 3: Electronic Business E-Business Systems113 Questions
Exam 4: Documenting Information Systems108 Questions
Exam 5: Database Management Systems180 Questions
Exam 6: Relational Databases and Sql93 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls157 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls126 Questions
Exam 10: The Order Entrysales Oes Process128 Questions
Exam 11: The Billingaccounts Receivable Cash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process131 Questions
Exam 13: Accounts Payablecash Disbursements Apcd Process104 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes118 Questions
Exam 15: Integrated Production Processes IPP106 Questions
Exam 16: General Ledger and Business Reporting Glbr Process78 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
The section of Sarbanes Oxley that sets forth criminal penalties applicable to CEOs and CFOs of up to $5 million and up to 20 years imprisonment if they knowingly or willfully certify false or misleading information contained in periodic reports:
(Multiple Choice)
4.9/5
(38)
A fraud is a deliberate act or untruth intended to obtain unfair or unlawful gain.
(True/False)
4.8/5
(40)
This framework was issued in 1996 (and updated in 2007) by the Information Systems Audit and Control Association because of the influence of IT over information systems, financial reporting and auditing.
(Multiple Choice)
4.9/5
(31)
The control goal that seeks to provide protection against loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources is called ________________________________________.
(Short Answer)
4.9/5
(48)
A computer abuse technique called a ____ involves a virus that replicates itself on disks, in memory, or across networks.
(Multiple Choice)
4.9/5
(41)
A manager of a manufacturing plant alters production reports to provide the corporate office with an inflated perception of the plant's cost effectiveness in an effort to keep the inefficient plant from being closed.This action would be classified as a(n):
(Multiple Choice)
4.9/5
(41)
The ERM framework addresses four categories of management objectives.Which category addresses the effective and efficient use of resources?
(Multiple Choice)
4.9/5
(35)
A deliberate act or untruth intended to obtain unfair or unlawful gain is a(n)
(Multiple Choice)
4.9/5
(40)
The control goal called ________________________________________ strives to ensure that a given operational process is fulfilling the purpose for which it was intended.
(Short Answer)
4.9/5
(29)
___________________________________ is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance.
(Short Answer)
4.8/5
(31)
____________________ is a deliberate act or untruth intended to obtain unfair or unlawful gain.
(Short Answer)
4.8/5
(38)
Control plans that relate to a multitude of goals and processes are called:
(Multiple Choice)
4.8/5
(29)
Which of the following is not a requirement of SOX Section 404?
(Multiple Choice)
4.9/5
(34)
As a result of an inadequate design, a production process yields an abnormally high amount of raw material scrapped.Which control goal is being violated?
(Multiple Choice)
4.8/5
(29)
The control goal called efficiency of operations strives to assure that a given operations system is fulfilling the purpose(s) for which it was intended.
(True/False)
4.7/5
(29)
Management is responsible for establishing and maintaining an adequate system of internal control
(True/False)
4.7/5
(42)
_________________________ are business process objectives that an internal control system is designed to achieve.
(Short Answer)
5.0/5
(38)
Ensuring the security of resources is the control goal that seeks to provide protection against loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources.
(True/False)
4.9/5
(36)
An invalid item is an object or event that is not authorized, never occurred, or is otherwise not genuine.
(True/False)
4.9/5
(43)
Showing 81 - 100 of 161
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)