2
10/12/2015 TheAceStudent: Saint acc303 quiz 5 (100%) data:text/html;charset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B… 1/2 Saint acc303 quiz 5 (100%) Question 1.1. Almost all computer criminals can be described as: (Points : 4) professional criminals. technical hackers possessing strong computer skills. white collar professional criminals. amateurs who describe themselves as relatively honest. Question 2. 2. Logical access to the computer system would be best controlled by: (Points : 4) intrusion alarm systems. complex operating systems. restrictions on physical access to online terminals. password codes. Question 3. 3. Hacking involves: (Points : 4) stealing carbons of credit cards. destroying computer hardware. gaining illegal entry to computer files from remote locations. inserting a logic bomb in a computer program Question 4. 4. An ideal control is: (Points : 4) a control procedure that reduces to practically zero the risk of an error or an irregularity taking place and not being detected. a control procedure that is anticipated to have the lowest possible cost in relation to its benefits. a control procedure that should always be implemented into a company’s system due to the efficiency and effectiveness that will result from its implementation. a control procedure that is always cost effective. Question 5. 5. Which of the following statements is true? (Points : 4) The COSO report failed to define internal control. The COSO report emphasized that an internal control system is a tool of management. SAS 78 rejected the definition of internal control provided in the COSO report. COBIT concluded that a company’s management is not responsible for establishing and monitoring a company’s internal control system. Question 6. 6.Regarding the internal audit function, which of the following statements is true? (Points : 4) Since many internal auditors have accounting backgrounds, the internal audit function should ideally be included within a company’s accounting subsystem. It is not proper for internal auditors to perform a fraud investigation within any part of their company’s system. Because of the independence of external auditors, they should never accept previous work of evaluating controls performed by a company’s internal auditors. Within a company’s system, it is preferable to establish the internal audit function as a separate subsystem. Question 7. 7.An approach used by many companies to reduce the risk of loss caused by the theft of assets by employees is to: (Points : 4) utilize polygraphs. acquire arbitrage loss protection. acquire fidelity bond coverage. institute punitive management. Saint acc303 quiz 5 (100%)

Saint Acc303 Quiz 5 (100%)

Embed Size (px)

DESCRIPTION

Saint acc303 quiz 5 (100%)Saint acc303 quiz 5 (100%)Question 1.1. Almost all computer criminals can be described as: (Points : 4)professional criminals.technical hackers possessing strong computer skills.white collar professional criminals.amateurs who describe themselves as relatively honest.Question 2. 2. Logical access to the computer system would be best controlled by: (Points : 4)intrusion alarm systems.complex operating systems.restrictions on physical access to online terminals.password codes.Question 3. 3. Hacking involves: (Points : 4)stealing carbons of credit cards.destroying computer hardware.gaining illegal entry to computer files from remote locations.inserting a logic bomb in a computer programQuestion 4. 4. An ideal control is: (Points : 4)a control procedure that reduces to practically zero the risk of an error or an irregularity taking place and not being detected.a control procedure that is anticipated to have the lowest possible cost in relation to its benefits.a control procedure that should always be implemented into a company’s system due to the efficiency and effectiveness that will result from its implementation.a control procedure that is always cost effective.Question 5. 5. Which of the following statements is true? (Points : 4)The COSO report failed to define internal control.The COSO report emphasized that an internal control system is a tool of management.SAS 78 rejected the definition of internal control provided in the COSO report.COBIT concluded that a company’s management is not responsible for establishing and monitoring a company’s internal control system.Question 6. 6.Regarding the internal audit function, which of the following statements is true? (Points : 4)Since many internal auditors have accounting backgrounds, the internal audit function should ideally be included within a company’s accounting subsystem.It is not proper for internal auditors to perform a fraud investigation within any part of their company’s system.Because of the independence of external auditors, they should never accept previous work of evaluating controls performed by a company’s internal auditors.Within a company’s system, it is preferable to establish the internal audit function as a separate subsystem.Question 7. 7.An approach used by many companies to reduce the risk of loss caused by the theft of assets by employees is to: (Points : 4)utilize polygraphs.acquire arbitrage loss protection.acquire fidelity bond coverage.institute punitive management.Question 8. 8.Which of the following is not a processing control? (Points : 4)Record countsControl totalsHash totalsCheck digitsQuestion 9. 9. Which of these is an acronym for computer crime legislation? (Points : 4)ACLBARTCFAADDoSQuestion 10. 10. At present, we think that computer crime is: (Points : 4)falling.random.rising.flat.Saint acc303 quiz 5 (100%)

Citation preview

Page 1: Saint Acc303 Quiz 5 (100%)

10/12/2015 TheAceStudent: Saint acc303 quiz 5 (100%)

data:text/html;charset=utf­8,%3Ch3%20class%3D%22post­title%20entry­title%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B… 1/2

Saint acc303 quiz 5 (100%)

Question 1.1. Almost all computer criminals can be described as: (Points : 4)professional criminals.technical hackers possessing strong computer skills.white collar professional criminals.amateurs who describe themselves as relatively honest.Question 2. 2. Logical access to the computer system would be best controlled by: (Points : 4)intrusion alarm systems.complex operating systems.restrictions on physical access to online terminals.password codes.Question 3. 3. Hacking involves: (Points : 4)stealing carbons of credit cards.destroying computer hardware.gaining illegal entry to computer files from remote locations.inserting a logic bomb in a computer programQuestion 4. 4. An ideal control is: (Points : 4)a control procedure that reduces to practically zero the risk of an error or an irregularity taking placeand not being detected.a control procedure that is anticipated to have the lowest possible cost in relation to its benefits.a control procedure that should always be implemented into a company’s system due to theefficiency and effectiveness that will result from its implementation.a control procedure that is always cost effective.Question 5. 5. Which of the following statements is true? (Points : 4)The COSO report failed to define internal control.The COSO report emphasized that an internal control system is a tool of management.SAS 78 rejected the definition of internal control provided in the COSO report.COBIT concluded that a company’s management is not responsible for establishing and monitoringa company’s internal control system.Question 6. 6.Regarding the internal audit function, which of the following statements is true?(Points : 4)Since many internal auditors have accounting backgrounds, the internal audit function should ideallybe included within a company’s accounting subsystem.It is not proper for internal auditors to perform a fraud investigation within any part of theircompany’s system.Because of the independence of external auditors, they should never accept previous work ofevaluating controls performed by a company’s internal auditors.Within a company’s system, it is preferable to establish the internal audit function as a separatesubsystem.Question 7. 7.An approach used by many companies to reduce the risk of loss caused by the theftof assets by employees is to: (Points : 4)utilize polygraphs.acquire arbitrage loss protection.acquire fidelity bond coverage.institute punitive management.

Saint acc303 quiz 5 (100%)

Page 2: Saint Acc303 Quiz 5 (100%)

10/12/2015 TheAceStudent: Saint acc303 quiz 5 (100%)

data:text/html;charset=utf­8,%3Ch3%20class%3D%22post­title%20entry­title%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B… 2/2

Question 8. 8.Which of the following is not a processing control? (Points : 4)Record countsControl totalsHash totalsCheck digitsQuestion 9. 9. Which of these is an acronym for computer crime legislation? (Points : 4)ACLBARTCFAADDoSQuestion 10. 10. At present, we think that computer crime is: (Points : 4)falling.random.rising.flat.

Saint acc303 quiz 5 (100%)