Friday, August 16, 2019
Acg 4401
Review Questions ACG 4401 U01B Summer 2010NameMULTIPLE CHOICEChoose the one alternative that best completes the statement or answers the question.1) Which of the factors listed below is not a common factor for fraud? 1) _______A) rationalization for the crimeB) desire to get even with the employerC) opportunity to commit fraudD) pressure to commit fraud2) Misappropriation of assets can also be called 2) _______A) Fraudulent financial reportingB) Management fraudC) Employee fraudD) Computer fraud3)Which type of antivirus program is most effective in spotting an infection soon after it starts? 3) _______A) a virus detection programB) a virus protection programC) a virus identification programD) none of the above4) How can an organization reduce fraud losses? 4) _______A) require vacations and rotate dutiesB) maintain adequate insuranceC) encrypt data and programsD) use forensic accountants5) A ________ is similar to a ________, except that it is a program rather than a code segment hid den in a host program. 5) _______A) worm; virusB) worm; Trojan horseC) Trojan horse; wormD) virus; worm6) Which method of fraud is physical in its nature rather than electronic? 6) _______A) eavesdroppingB) crackingC) scavengingD) hacking7) The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called 7) _______A) masquerading.B) superzapping.C) hacking.D) cracking.8) Intentional or reckless conduct that results in materially misleading financial statements is called 8) _______A) financial fraud.B) misstatement fraud.C) audit failure fraud.D) fraudulent financial reporting.9) The potential dollar loss that could result if an unwanted event occurs is called a(n) 9) _______A) exposure.B) extraordinary loss.C) threat.D) risk.10) The likelihood that an adverse or unwanted event could occur is referred to as a(n) 10) ______A) threat.B) loss.C) risk.D) exposure.11) Which of the following federal laws incorporated the language of th e AICPA about controls into a law applying to all registered companies? 11) ______A) Foreign Corrupt Practices Act of 1977B) The Securities Act of 1933C) Federal Corruption Prevention Act of 1987D) The Securities Exchange Act of 193412) Personnel policies such as background checks, mandatory vacations, and rotation of duties tend to deter 12) ______A) fraud by outsidersB) unintentional errorsC) employee fraud or embezzlementD) payroll irregularities13) Chuck Hewitt was relaxing after work with a colleague at a local watering hole. Well into his second martini, he began expressing his opinion about government regulation. It seems that, as a result of ââ¬Å"government interferenceâ⬠the company's longstanding policy of making low-interest loans to top management was being terminated. The regulation that Chuck is referring to is the 13) ______A) Truth in Lending ActB) McCain-Feingold ActC) Sarbanes-Oxley ActD) Foreign Corrupt Practices Act14) River Rafting Adventures of Iowa prov ides rafts and tour guides to tourists eager to ride the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deductible is available. It covers the costs of lawsuits unless there is evidence of criminal negligence. What is the expected loss without insurance? 14) ______A) $650B) $650,000C) $50,000D) $5015) The risk that remains after management implements internal controls is 15) ______A) Risk appetiteB) Residual riskC) Risk assessmentD) Inherent risk16) River Rafting Adventures of Iowa provides rafts and tour guides to tourists eager to ride the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deductible is available. It covers the costs of lawsuits unless ther e is evidence of criminal negligence. What is the expected loss with insurance? 16) ______A) $650B) $50,000C) $650,000D) $5017) There are different types of internal controls available to an organization. The type of controls that deters problems before they arise are called 17) ______A) preventive controls.B) corrective controls.C) exposure controls.D) detective controls.18) According to SysTrust, the reliability principle of integrity is achieved when 18) ______A) the system is available for operation and use at times set forth by agreement.B) system processing is complete, accurate, timely, and authorized.C) the system can be maintained as required without affecting system availability, security, and integrity.D) the system is protected against unauthorized physical and logical access.19) An electronic document that certifies the identity of the owner of a particular public key. 19) ______A) Public keyB) Asymmetric encryptionC) Digital signatureD) Digital certificate20) In develo ping policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is 20) ______A) privacy.B) security.C) confidentiality.D) availability.21) In a private key system the sender and the receiver have ________, and in the public key system they have ________. 21) ______A) the same key; two separate keysB) an encrypting algorithm; a decrypting algorithmC) different keys; the same keyD) a decrypting algorithm; an encrypting algorithm22) Which of the following is an example of a corrective control? 22) ______A) Physical access controlsB) Intrusion detectionC) Emergency response teamsD) Encryption23) A more rigorous test of the effectiveness of an organization's computer security. 23) ______A) Vulnerability scanB) Penetration testC) Log analysisD) Intrusion detection system24) Which of the following is not a requirement of effective passwords? 24) ______A) Passwords should be no more than 8 characters in length.B) Passwords should contain a mixture of upper and lowercase letters, numbers and characters.C) Passwords should be changed at regular intervals.D) Passwords should not be words found in dictionaries.25) An auditor examining a firm's accounting information system creates a fictitious customer in the system and then creates several fictitious sales to the customer. The records are then tracked as they are processed by the system. This is an example collecting audit evidence using 25) ______A) a system control audit review file.B) an integrated test facility.C) audit hooks.D) the snapshot technique.E) continuous and intermittent simulation.26) The ________ part of the auditing process involves (among other things) the auditors observing the operating activities and having discussion with employees. 6) ______A) communication of audit resultsB) evaluation of audit evidenceC) audit planningD) collection of audit evidence27) The evidence collection method that considers the relationship and trends among information to detect items that should be investigated further is called 27) ______A) physical examination.B) vouching.C) analytical review.D) review of the documentation.28) One way an auditor gauges how much audit work and testing needs to be performed is through evaluating materiality and seeking reasonable assurance about the nature of the information or process. What is key to determining materiality during an audit? 28) ______A) the testing of records, account balances, and procedures on a sample basisB) determining if material errors exist in the information or processes undergoing auditC) determining what is and is not important given a set of circumstances is primarily a matter of judgmentD) none of the above29) The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures. 29) ______A) financial audit approachB) risk-adjusted approachC) risk-based approachD) information systems approach30) The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives. 30) ______A) financialB) informationalC) operationalD) information systemsAnswersBCDBACADACACCABDABDAACBABDCCCC
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.