Wednesday, July 17, 2019

Acg 4401

look backward Questions ACG 4401 U01B Summer 2010NameMULTIPLE CHOICEChoose the one alternative that better(p) completes the statement or answers the question.1) Which of the factors listed below is not a common factor for blind? 1) _______A) rationalization for the crimeB) desire to get level(p) with the employerC) opportunity to bless deviceD) pressure to commit fraud2) Misappropriation of assets kitty also be called 2) _______A) Fraudulent fiscal reportingB) Management fraudC) Employee fraudD) calculating machine fraud3)Which type of anticomputer virus program is most sound in spotting an infection briefly after it starts? 3) _______A) a virus staining programB) a virus protection programC) a virus identification programD) none of the above4) How can an organization reduce fraud losses? 4) _______A) require vacations and rotate dutiesB) maintain equal insuranceC) encrypt data and programsD) drop forensic written reportants5) A ________ is similar to a ________, turn out that it is a program rather than a code segment hidden in a host program. 5) _______A) bend virusB) worm Trojan horseC) Trojan horse wormD) virus worm6) Which manner of fraud is physical in its temperament rather than electronic? 6) _______A) eavesdroppingB) crackingC) scavengingD) hacking7) The unreal method by which a culprit gains access to the scheme by pretending to be an authorized user is called 7) _______A) masquerading.B) superzapping.C) hacking.D) cracking.8) designed or reckless conduct that get outs in materially misleading financial statements is called 8) _______A) financial fraud.B) misstatement fraud.C) examine failure fraud.D) fraudulent financial reporting.9) The potential dollar loss that could result if an unwanted suit occurs is called a(n) 9) _______A) exposure.B) extraordinary loss.C) threat.D) take chances.10) The likelihood that an adverse or unwanted event could occur is referred to as a(n) 10) ______A) threat.B) loss.C) risk.D) exposure.11) Which of the by-line federal laws incorporated the language of the AICPA about manages into a law applying to all registered companies? 11) ______A) Foreign indulge Practices affect of 1977B) The Securities Act of 1933C) Federal degeneration Prevention Act of 1987D) The Securities Exchange Act of 193412) Personnel policies such as priming checks, mandatory vacations, and rotation of duties tend to discourage 12) ______A) fraud by outsidersB) unintentional errorsC) employee fraud or embezzlementD) payroll irregularities13) Chuck Hewitt was relaxing after work with a follower at a local tearing hole. Well into his second martini, he began expressing his prospect about government regulation. It seems that, as a result of government interference the companys long policy of making low-interest loans to top anxiety was be terminated. The regulation that Chuck is referring to is the 13) ______A) honor in Lending ActB) McCain-Feingold ActC) Sarbanes-Oxley ActD) Foreign rou nd-shouldered Practices Act14) River Rafting Adventures of Iowa provides rafts and tour guides to tourists eager to badger the wild rivers of Iowa. Management has determined that in that location is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an middling cost of $650,000. Insurance with a $50,000 allowable is accessible. It covers the costs of lawsuits unless there is enjoin of twist negligence. What is the expected loss without insurance? 14) ______A) $650B) $650,000C) $50,000D) $5015) The risk that remains after management implements upcountry controls is 15) ______A) Risk appetiteB) Residual riskC) Risk assessmentD) constitutional risk16) River Rafting Adventures of Iowa provides rafts and tour guides to tourists eager to driving force the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an bonnie cost o f $650,000. Insurance with a $50,000 deductible is available. It covers the costs of lawsuits unless there is evidence of iniquitous negligence. What is the expected loss with insurance? 16) ______A) $650B) $50,000C) $650,000D) $5017) in that respect ar different types of internal controls available to an organization. The type of controls that deters problems before they arise are called 17) ______A) preventive controls.B) corrective controls.C) exposure controls.D) emissary controls.18) According to Sys faith, the reliability principle of legality is achieved when 18) ______A) the constitution is available for operation and use at times set aside by agreement.B) outline processing is complete, accurate, timely, and authorized.C) the body can be maintained as required without affecting system availability, security, and integrity.D) the system is protected against unauthorized physical and lawful access.19) An electronic document that certifies the identity of the proprie tor of a particular public key. 19) ______A) familiar keyB) Asymmetric encryptionC) Digital signatureD) Digital certificate20) In developing policies related to personal cultivation about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is 20) ______A) privacy.B) security.C) confidentiality.D) availability.21) In a private key system the sender and the receiver support ________, and in the public key system they have ________. 21) ______A) the alike key two resolve keysB) an encrypting algorithm a decrypting algorithmC) different keys the same keyD) a decrypting algorithm an encrypting algorithm22) Which of the following is an physical exercise of a corrective control? 22) ______A) somatogenetic access controlsB) Intrusion detectionC) Emergency receipt teamsD) Encryption23) A more rigorous quiz of the effectiveness of an organizations computer security. 23) ______A) Vulnerability scanB) incursion bea r witnessC) Log analysisD) Intrusion detection system24) Which of the following is not a requirement of effective passwords? 24) ______A) Passwords should be no more than 8 characters in length.B) Passwords should contain a miscellany of upper and lowercase letters, numbers and characters.C) Passwords should be changed at regular intervals.D) Passwords should not be words found in dictionaries.25) An hearer examining a firms accounting knowledge system creates a fancied customer in the system and then creates several fictitious sales to the customer. The records are then introduce as they are processed by the system. This is an example collecting audit evidence using 25) ______A) a system control audit follow-up file.B) an integrated test facility.C) audit hooks.D) the snapshot technique.E) continuous and intermittent simulation.26) The ________ part of the auditing process involves (among other things) the auditors detect the operating activities and having discussion with em ployees. 6) ______A) communication of audit resultsB) evaluation of audit evidenceC) audit planningD) accretion of audit evidence27) The evidence collection method that considers the relationship and trends among nurture to detect items that should be investigated further is called 27) ______A) physical examination.B) vouching.C) analytical review.D) review of the documentation.28) One way an auditor gauges how very much audit work and testing need to be performed is through evaluating materiality and seeking reasonable assurance about the nature of the information or process. What is key to ascertain materiality during an audit? 28) ______A) the testing of records, account balances, and procedures on a sample basisB) find if material errors exist in the information or processes undergoing auditC) determining what is and is not Copernican given a set of heap is primarily a matter of judgmentD) none of the above29) The ________ to auditing provides auditors with a clear under standing of achievable errors and irregularities and the related risks and exposures. 29) ______A) financial audit approachB) risk-adjusted approachC) risk-based approachD) information systems approach30) The ________ audit is concerned with the economical and good use of resources and the accomplishment of established goals and objectives. 30) ______A) financialB) informationalC) operationalD) information systemsAnswersBCDBACADACACCABDABDAACBABDCCCC

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.