A) Relating to the control environment.
B) Pertaining to the company's risk assessment process.
C) Regarding the company's annual stockholder meeting.
D) Addressing policies over significant risk management practices.
Correct Answer
verified
Multiple Choice
A) No duplicate shipments or billings occurred.
B) Shipments to customers were properly invoiced.
C) All goods ordered by customers were shipped.
D) All pre-numbered sales invoices were accounted for.
Correct Answer
verified
Multiple Choice
A) Detective.
B) Preventive.
C) Adjustive.
D) Non-routine.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) General controls and application controls.
B) Detective controls and protective controls.
C) Network controls and transaction controls.
D) Preventive controls and mandatory controls.
Correct Answer
verified
Multiple Choice
A) Enabling a holistic approach.
B) Meeting stakeholder needs.
C) Separating management from shareholders.
D) Applying an integrated framework.
Correct Answer
verified
Multiple Choice
A) Prevention.
B) Reflection.
C) Detection.
D) Correction.
Correct Answer
verified
Multiple Choice
A) The computer ensures that a numerical amount in a record does not exceed some predetermined amount.
B) As the computer corrects errors and data are successfully resubmitted to the system,the causes of the errors are printed out.
C) The computer flags any transmission for which the control field value did not match that of an existing file record.
D) After data for a transaction are entered,the computer sends certain data back to the terminal for comparison with data originally sent.
Correct Answer
verified
Multiple Choice
A) Add the checks to the daily cash summary.
B) Verify that each check is supported by a pre-numbered sales invoice.
C) Prepare a summary listing of checks received.
D) Record the checks in the cash receipts journal.
Correct Answer
verified
Multiple Choice
A) Weaknesses and vulnerabilities.
B) Risks and opportunities.
C) Risks and rewards.
D) Controls and vulnerabilities.
Correct Answer
verified
Multiple Choice
A) The customer name must be populated.
B) Accounts are reconciled.
C) A manager reviews all return transactions.
D) Procedures are documented.
Correct Answer
verified
Multiple Choice
A) Control environment.
B) Control activities.
C) Inherent risk.
D) Monitoring.
Correct Answer
verified
Multiple Choice
A) Segregation of duties.
B) Ensure proper authorization of transactions.
C) Adequately safeguard assets.
D) Independently verify the transactions.
Correct Answer
verified
Multiple Choice
A) Disclosing lack of segregation of duties to external auditors during the annual review.
B) Replacing personnel every three or four years.
C) Requiring accountants to pass a yearly background check.
D) Providing greater management oversight of incompatible activities.
Correct Answer
verified
Multiple Choice
A) Disposal of excess documents.
B) URL Class diagram.
C) A record count.
D) Password management.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A well-designed internal control environment ensures the achievement of an entity's control objectives.
B) An inherent limitation to internal control is the fact that controls can be circumvented by management override.
C) A well-designed and operated internal control environment should detect collusion perpetrated by two people.
D) Internal control in a necessary business function and should be designed and operated to detect errors and fraud.
Correct Answer
verified
Multiple Choice
A) ITIL.
B) COBIT 2019.
C) COSO 2013.
D) ISO 27000.
Correct Answer
verified
Showing 1 - 20 of 60
Related Exams