Thursday, May 23, 2019

Acg 4401

Review Questions ACG 4401 U01B Summer 2010NameMULTIPLE CHOICEChoose the one alternative that best completes the statement or answers the question.1) Which of the grammatical constituents listed below is non a common factor for fraud? 1) _______A) rationalization for the crimeB) desire to get even with the employerC) opportunity to commit fraudD) pressure to commit fraud2) Misappropriation of assets can also be called 2) _______A) Fraudulent fiscal reportingB) Management fraudC) Employee fraudD) Computer fraud3)Which type of antivirus program is most effective in spotting an infection soon aft(prenominal) it starts? 3) _______A) a virus maculation programB) a virus protection programC) a virus identification programD) none of the above4) How can an organization reduce fraud losses? 4) _______A) require vacations and rotate dutiesB) maintain equal to(predicate) insuranceC) encrypt data and programsD) use forensic accountants5) A ________ is similar to a ________, except that it is a program rather than a code segment surreptitious in a host program. 5) _______A) worm virusB) worm Trojan horseC) Trojan horse wormD) virus worm6) Which method of fraud is physical in its nature rather than electronic? 6) _______A) eavesdroppingB) crackingC) scavengingD) hacking7) The deceptive method by which a perpetrator gains access to the schema by pretending to be an authorized user is called 7) _______A) masquerading.B) superzapping.C) hacking.D) cracking.8) Intentional or reckless conduct that sequels in materially misleading financial statements is called 8) _______A) financial fraud.B) misstatement fraud.C) size up failure fraud.D) fraudulent financial reporting.9) The potential dollar loss that could result if an unwanted event occurs is called a(n) 9) _______A) exposure.B) extraordinary loss.C) threat.D) risk.10) The likelihood that an adverse or unwanted event could occur is referred to as a(n) 10) ______A) threat.B) loss.C) risk.D) exposure.11) Which of the fo llowing federal laws incorporated the language of the AICPA just about controls into a law applying to all registered companies? 11) ______A) orthogonal Corrupt Practices Act of 1977B) The Securities Act of 1933C) Federal Corruption Prevention Act of 1987D) The Securities Exchange Act of 193412) Personnel policies much(prenominal) as background checks, mandatory vacations, and rotation of duties tend to deter 12) ______A) fraud by outsidersB) unintentional errorsC) employee fraud or embezzlementD) payroll irregularities13) Chuck Hewitt was relaxing after work with a colleague at a local watering hole. Well into his second martini, he began expressing his opinion about government regulation. It seems that, as a result of government interference the companys longstanding policy of making low-interest loans to top management was being terminated. The regulation that Chuck is referring to is the 13) ______A) Truth in Lending ActB) McCain-Feingold ActC) Sarbanes-Oxley ActD) Foreign Co rrupt Practices Act14) River Rafting Adventures of Iowa provides rafts and tour guides to tourists eager to effort the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. extermination of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deductible is available. It covers the costs of lawsuits unless there is usher of criminal negligence. What is the judge loss without insurance? 14) ______A) $650B) $650,000C) $50,000D) $5015) The risk that remains after management implements internal controls is 15) ______A) Risk appetiteB) Residual riskC) Risk assessmentD) Inherent risk16) River Rafting Adventures of Iowa provides rafts and tour guides to tourists eager to ride the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deduc tible is available. It covers the costs of lawsuits unless there is evidence of criminal negligence. What is the expected loss with insurance? 16) ______A) $650B) $50,000C) $650,000D) $5017) There are various types of internal controls available to an organization. The type of controls that deters problems before they arise are called 17) ______A) preventive controls.B) corrective controls.C) exposure controls.D) detective controls.18) According to SysTrust, the reliability principle of integrity is achieved when 18) ______A) the system is available for operation and use at times set forth by agreement.B) system processing is complete, accurate, timely, and authorized.C) the system can be maintained as required without affecting system availability, security, and integrity.D) the system is protected against unauthorized physical and logical access.19) An electronic document that certifies the identity of the owner of a particular creation key. 19) ______A) Public keyB) Asymmetric encryptionC) Digital signatureD) Digital certificate20) In developing policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The monetary standard applicable to these policies is 20) ______A) privacy.B) security.C) confidentiality.D) availability.21) In a private key system the sender and the receiver have ________, and in the public key system they have ________. 21) ______A) the equal key two separate keysB) an encrypting algorithm a decrypting algorithmC) different keys the same keyD) a decrypting algorithm an encrypting algorithm22) Which of the following is an example of a corrective control? 22) ______A) sensual access controlsB) Intrusion detectionC) Emergency response teamsD) Encryption23) A more rigorous test of the effectiveness of an organizations computer security. 23) ______A) Vulnerability scanB) Penetration testC) Log analysisD) Intrusion detection system24) Which of the following is not a requi rement of effective passwords? 24) ______A) Passwords should be no more than 8 characters in length.B) Passwords should contain a mixture of upper and small letters, numbers and characters.C) Passwords should be changed at regular intervals.D) Passwords should not be words found in dictionaries.25) An auditor examining a firms accounting information system creates a fictitious customer in the system and then creates several fictitious sales to the customer. The records are then tracked as they are processed by the system. This is an example collecting audit evidence using 25) ______A) a system control audit review file.B) an integrated test facility.C) audit hooks.D) the snapshot technique.E) perpetual and intermittent simulation.26) The ________ part of the auditing process involves (among other things) the auditors observing the operating activities and having discussion with employees. 6) ______A) communication of audit resultsB) evaluation of audit evidenceC) audit planningD) collection of audit evidence27) The evidence collection method that considers the relationship and trends among information to detect items that should be investigated further is called 27) ______A) physical examination.B) vouching.C) analytical review.D) review of the documentation.28) One way an auditor gauges how much audit work and testing needs to be performed is through evaluating materiality and seeking reasonable assurance about the nature of the information or process. What is key to find out materiality during an audit? 28) ______A) the testing of records, account balances, and procedures on a sample basisB) determining if material errors exist in the information or processes undergoing auditC) determining what is and is not important given a set of circumstances is primarily a matter of judgmentD) none of the above29) The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures. 29) ______ A) financial audit approachB) risk-adjusted approachC) risk-based approachD) information systems approach30) The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives. 30) ______A) financialB) informationalC) operationalD) information systemsAnswersBCDBACADACACCABDABDAACBABDCCCC

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.