Monday, March 4, 2019
Acg 4401
Review Questions ACG 4401 U01B Summer 2010NameMULTIPLE CHOICEChoose the adept alternative that best completes the bid or answers the question.1) Which of the factors listed below is not a common factor for twaddle? 1) _______A) rationalization for the crimeB) desire to get even with the employerC) opportunity to commit finesseD) pressure level to commit fraud2) Misappropriation of as stricts can also be called 2) _______A) Fraudulent financial reportingB) Management fraudC) Employee fraudD) Computer fraud3)Which type of antivirus program is most effectual in spotting an infection soon after it starts? 3) _______A) a virus signal detection programB) a virus protection programC) a virus identification programD) none of the above4) How can an organization reduce fraud sackinges? 4) _______A) require vacations and string out dutiesB) maintain adequate insuranceC) encrypt data and programsD) use forensic accountants5) A ________ is similar to a ________, except that it is a prog ram rather than a code segment hidden in a host program. 5) _______A) twine virusB) worm Trojan horseC) Trojan horse wormD) virus worm6) Which method of fraud is physical in its nature rather than electronic? 6) _______A) eavesdroppingB) crackingC) scavengingD) hacking7) The deceptive method by which a perpetrator gains access to the organisation by computer simulation to be an authorized user is called 7) _______A) masquerading.B) superzapping.C) hacking.D) cracking.8) Intentional or reckless expatriate that results in materially misleading financial statements is called 8) _______A) financial fraud.B) misstatement fraud.C) analyse distress fraud.D) fraudulent financial reporting.9) The potential dollar loss that could result if an discarded solution occurs is called a(n) 9) _______A) exposure.B) extraordinary loss.C) threat.D) risk.10) The likelihood that an adverse or unwanted event could occur is referred to as a(n) 10) ______A) threat.B) loss.C) risk.D) exposure.11) Wh ich of the following federal laws incorporated the language of the AICPA active suppresss into a law applying to all registered companies? 11) ______A) Foreign Corrupt Practices cultivate of 1977B) The Securities Act of 1933C) Federal Corruption Prevention Act of 1987D) The Securities Exchange Act of 193412) force policies such as background checks, mandatory vacations, and rotation of duties tend to admonish 12) ______A) fraud by outsidersB) unintentional errorsC) employee fraud or embezzlementD) payroll ir stiffities13) dab Hewitt was relaxing after work with a colleague at a local watering hole. Well into his second martini, he began expressing his opinion about government regulation. It seems that, as a result of government interference the companys long policy of making low-interest loans to top management was world terminated. The regulation that contrive is referring to is the 13) ______A) Truth in Lending ActB) McCain-Feingold ActC) Sarbanes-Oxley ActD) Foreign Cor rupt Practices Act14) River Rafting Adventures of Iowa provides rafts and go guides to tourists eager to rouse the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deductible is available. It covers the cost of lawsuits unless there is show of criminal negligence. What is the expected loss without insurance? 14) ______A) $650B) $650,000C) $50,000D) $5015) The risk that remains after management implements internal controls is 15) ______A) happen appetiteB) Residual riskC) Risk assessmentD) Inherent risk16) River Rafting Adventures of Iowa provides rafts and tour guides to tourists eager to ride the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deductibl e is available. It covers the costs of lawsuits unless there is evidence of criminal negligence. What is the expected loss with insurance? 16) ______A) $650B) $50,000C) $650,000D) $5017) at that place are different types of internal controls available to an organization. The type of controls that deters problems before they surface are called 17) ______A) preventive controls.B) corrective controls.C) exposure controls.D) detective controls.18) According to SysTrust, the reliability principle of integrity is achieved when 18) ______A) the establishment is available for operation and use at times set forth by agreement.B) system processing is complete, accurate, timely, and authorized.C) the system can be maintained as required without affecting system availability, security, and integrity.D) the system is protected against unauthorized physical and logical access.19) An electronic text file that certifies the identity of the owner of a particular public key. 19) ______A) Public keyB) noninterchangeable encryptionC) Digital signatureD) Digital certificate20) In developing policies related to personal instruction about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is 20) ______A) privacy.B) security.C) confidentiality.D) availability.21) In a private key system the sender and the liquidator have ________, and in the public key system they have ________. 21) ______A) the uniform key two separate keysB) an encrypting algorithm a decrypting algorithmC) different keys the selfsame(prenominal) keyD) a decrypting algorithm an encrypting algorithm22) Which of the following is an example of a corrective control? 22) ______A) Physical access controlsB) Intrusion detectionC) Emergency response teamsD) Encryption23) A more(prenominal) rigorous test of the effectiveness of an organizations computer security. 23) ______A) Vulnerability scanB) Penetration testC) put down analysisD) Intrusion detection system24) Which of the following is not a requirement of effective passwords? 24) ______A) Passwords should be no more than 8 characters in length.B) Passwords should contain a mixture of upper and lowercase letters, numbers and characters.C) Passwords should be changed at regular intervals.D) Passwords should not be words found in dictionaries.25) An analyzeor examining a firms accounting info system creates a fictitious customer in the system and whence creates several fictitious sales to the customer. The records are then tracked as they are processed by the system. This is an example accumulate audit evidence using 25) ______A) a system control audit review file.B) an integrated test facility.C) audit hooks.D) the snapshot technique.E) continuous and intermittent simulation.26) The ________ part of the auditing process involves (among other things) the auditors observing the operating activities and having discussion with employees. 6) ______A) communicating of au dit resultsB) evaluation of audit evidenceC) audit planningD) collection of audit evidence27) The evidence collection method that considers the relationship and trends among discipline to detect items that should be investigated save is called 27) ______A) physical examination.B) vouching.C) analytical review.D) review of the documentation.28) One way an auditor gauges how lots audit work and testing needs to be performed is through evaluating physicalness and seeking reasonable assurance about the nature of the information or process. What is key to determining materiality during an audit? 28) ______A) the testing of records, account balances, and procedures on a sample basisB) determining if material errors exist in the information or processes undergoing auditC) determining what is and is not important given a set of circumstances is primarily a matter of judgmentD) none of the above29) The ________ to auditing provides auditors with a recognise understanding of possible erro rs and irregularities and the related risks and exposures. 29) ______A) financial audit approachB) risk-adjusted approachC) risk-based approachD) information systems approach30) The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives. 30) ______A) financialB) informationalC) operationalD) information systemsAnswersBCDBACADACACCABDABDAACBABDCCCC
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment