Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 4
Quiz 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
A process,effected by an entity's board of directors,management and other personnel,applied in strategy settings and across the enterprise,designed to identify potential events that may effect the entity,and manage risk to be within its risk appetite,to provide reasonable assurance regarding the achievement of entity objectives is:
Question 22
True/False
A computer crime technique called worm involves the systematic theft of very small amounts from a number of bank or other financial accounts.
Question 23
True/False
Ensuring the security of resources is the control goal that seeks to provide protection of organization's resources from loss,destruction,disclosure,copying,sale,or other misuse of an organization's resources.
Question 24
True/False
The control goal of ensuring input materiality strives to prevent fictitious items from entering an information system.
Question 25
Multiple Choice
A process by which organizations select objectives,establish processes to achieve objectives,and monitor performance is:
Question 26
True/False
Valid input data are appropriately authorized and represent actual economic events and objects.
Question 27
True/False
The control goal of input accuracy is concerned with the correctness of the transaction data that are entered into a system.
Question 28
True/False
Salami slicing is program code that can attach itself to other programs (i.e. ,"infect" those programs),that can reproduce itself,and that operates to alter the programs or to destroy data.
Question 29
True/False
Business process control plans relate to those controls particular to a specific process or subsystem,such as billing or cash receipts.
Question 30
True/False
A sale to a customer is entered into the system properly,but the event does not accurately update the customer's outstanding balance.This type of processing error would be classified as a user error.
Question 31
True/False
A computer abuse technique called a back door involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program.
Question 32
True/False
According to the 2012 Report to the Nation on Occupational Fraud and Abuse,frauds are more likely to be detected by audits or internal controls than through tips.
Question 33
True/False
A logic bomb is a computer abuse technique in which unauthorized code is inserted in a program,which,when activated,may cause a disaster such as shutting down a system or destroying data.
Question 34
True/False
The control goal called efficiency of operations strives to assure that a given operations system is fulfilling the purpose(s)for which it was intended.