Exam 10: Using Information Technology for Fraud Examination and Financial Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List five assertions of management in respect to financial statements.

(Essay)
4.8/5
(32)

This type of graphic allows the investigator to analyze the movement of goods services, people and money:

(Multiple Choice)
4.9/5
(45)

Output controls address how to monitor waste and how to identify who is responsible for data accuracy, report distribution, and end-user controls.

(True/False)
4.8/5
(36)

The assertions of management related to financial statements include all of the these EXCEPT:

(Multiple Choice)
4.8/5
(35)

The functions of data extraction and analysis software tools includes all EXCEPT:

(Multiple Choice)
4.9/5
(32)

What computer functions can make recovering deleted files more difficult?

(Essay)
4.9/5
(42)

What are the two categories of data mining and knowledge discovery software?

(Essay)
4.8/5
(36)

An information technology IT audit consists of 1 planning, 2 tests of controls, and 3 substantive tests.

(True/False)
4.9/5
(33)

List two commercial data extraction and analysis software and list four functions of this software.

(Essay)
4.8/5
(40)

IDEA can read, display, analyze, manipulate, sample, and extract data from files obtained from many sources in only one format.

(True/False)
4.9/5
(31)

In data analysis and extraction software, the types of queries conducted on the general ledger would include everything EXCEPT:

(Multiple Choice)
4.8/5
(30)

An information technology IT audit consists of all EXCEPT

(Multiple Choice)
4.8/5
(36)

Benford's Law can be used as an indicator of potential fraud.

(True/False)
4.8/5
(39)

An association matrix is not useful for identifying major players who are central to an investigation and to identify linkages between those players.

(True/False)
4.8/5
(40)

An example of an input error that would likely be caught by a validation control in payroll processing would be:

(Multiple Choice)
4.8/5
(36)

Duplicate searches in data extraction and analysis software could be used to discover:

(Multiple Choice)
4.9/5
(41)

ACL and IDEA are examples of commercially available data mining software.

(True/False)
4.9/5
(40)

The general framework for viewing IT risks and controls include all the following EXCEPT

(Multiple Choice)
4.9/5
(41)

Which of the following would be considered a batch control for payroll?

(Multiple Choice)
4.7/5
(38)

An activity that can enhance the ability to recover deleted files is the "Defrag" command.

(True/False)
4.9/5
(37)
Showing 21 - 40 of 57
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)