Acct 360 exam 2 review fall2020 Flashcards
) Duplicate checking of calculations and preparing bank reconciliations and monthly trial balances are examples of what type of control? A) Preventive control B) Detective control C) Corrective control D) Authorization control
) Detective control
2) Identify the preventive control below.
A) Reconciling the bank statement to the cash control account.
B) Approving customer credit prior to approving a sales order.
C) Maintaining frequent backup records to prevent loss of data.
D) Counting inventory on hand and comparing counts to the perpetual inventory records.
B) Approving customer credit prior to approving a sales order.
3) Internal controls are often segregated into
A) detective controls and preventive controls.
B) general controls and application controls.
C) process controls and general controls.
D) system controls and application controls
B) general controls and application controls.
4) Duplicate checking of calculations is an example of a \_\_\_\_\_\_\_\_ control, and procedures to resubmit rejected transactions are an example of a \_\_\_\_\_\_\_\_ control. A) corrective; detective B) detective; corrective C) preventive; corrective D) detective; preventive
B) detective; corrective
5) Which type of control prevents, detects, and corrects transaction errors and fraud? A) general B) application C) detective D) preventive
B) application
6) Which internal control framework is widely accepted as the authority on internal controls? A) COBIT. B) ISACA framework. C) COSO Integrated Control. D) Sarbanes-Oxley control framework
C) COSO Integrated Control.
7) Applying the COBIT5 framework, monitoring is the responsibility of A) the CEO. B) the CFO. C) the board of directors. D) all of the above
D) all of the above
9) Melissa is a staff accountant for Quality Paper Company, which has strict corporate policies on appropriate use of corporate resources. The first week of March, Melissa saw Kent, the branch manager putting printer paper and toner into his briefcase on his way out the door. This situation best reflects a weakness in which aspect of internal environment, as discussed in the COSO Enterprise Risk Management Framework?
A) Integrity and ethical values.
B) Risk management philosophy.
C) Restrict access to assets.
D) Methods of assigning authority and responsibility.
A) Integrity and ethical values.
10) Reducing management layers, creating self-directed work teams, and emphasizing continuous improvement are all related to which aspect of internal environment?
A) Organizational structure.
B) Methods of assigning authority and responsibility.
C) Management philosophy and operating style.
D) Commitment to competence.
A) Organizational structure.
8) The principle of identifying and assessing changes that could significantly impact the system of internal control belongs to which of the COSO's Internal Control Model's component? A) Control environment. B) Risk assessment. C) Control activities. D) Information and communication.
B) Risk assessment.
11) If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is A) effective. B) ineffective. C) overdone. D) undermanaged.
A) effective.
12) The steps that criminals take to identify potential points of remote entry is called A) scanning and mapping the target. B) social engineering. C) research. D) reconnaissance.
A) scanning and mapping the target.
13) The steps that criminals take to find known vulnerabilities and learn how to take advantage of those vulnerabilities is called A) scanning and mapping the target. B) social engineering. C) research. D) reconnaissance.
C) research.
14) \_\_\_\_\_\_\_\_ is/are an example of a preventive control. A) Emergency response teams B) Encryption C) Log analysis D) Intrusion detection
B) Encryption
15) Which of the following is an example of a detective control? A) Physical access controls. B) Encryption. C) Continuous monitoring. D) Incident response teams.
C) Continuous monitoring.
16) An access control matrix
A) is the process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform.
B) is used to implement authentication controls.
C) matches the user’s authentication credentials to his authorization.
D) is a table specifying which portions of the system users are permitted to access.
D) is a table specifying which portions of the system users are permitted to access.