OBJECTIVES 7-11 Flashcards

1
Q

means that the controls achieve a sensible balance of reducing risk when compared with the cost of the control.

A

REASONABLE ASSURANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

involves the ongoing review and evaluation of the system.

A

MONITORING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To assess, manage, and control the efficiency and effectiveness of operations of an organization, management must have access to feedback information and reports.

A

INFORMATION AND COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is an independent check to assure the accuracy and completeness of transactions processed in a batch.

A

Review Of Batch Totals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is the examination of a report to assess the accuracy and reliability of the data in that report.

A

Analysis Of Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The theft of proprietary company information, by digging through the trash of the intended target company.

A

INDUSTRIAL ESPIONAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The unlawful copying of software programs.

A

SOFTWARE PIRACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When an employee of an organization attempts to conduct fraud through the misuse of a computer-based system, it is called

A

INTERNAL COMPUTER FRAUD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

usually involves altering data that is input into the computer.

A

INPUT MANIPULATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Occurs when a program is altered in some fashion to commit a fraud. Examples of program manipulation include the salami technique, Trojan horse programs, and trap door alterations.

A

PROGRAM MANIPULATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A fraudster uses the _______ to alter a program to slice a small amount from several accounts and then credit those small amounts to the perpetrator’s benefit.

A

SALAMI TECHNIQUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a small, unauthorized program within a larger, legitimate program, used to manipulate the computer system to conduct a fraud

A

TROJAN HORSE PROGRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a valid programming tool that is misused to commit fraud. These entrance ways can be thought of as hidden entrances, or trap doors.

A

TRAP DOOR ALTERATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a person alters the system’s checks or reports to commit fraud. This kind of fraud is often successful simply because humans tend to trust the output of a computer and do not question its validity or accuracy as much as they might if the output were manually produced.

A

OUTPUT MANIPULATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

are conducted by someone outside the company who has gained unauthorized access to the computer.

A

EXTERNAL COMPUTER FRAUDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the term commonly used for computer network break-ins

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A particular kind of hacking that has increased dramatically in recent years is

A

denial of service (DoS) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is intended to overwhelm an intended target computer system with so much bogus network traffic that the system is unable to respond to valid network traffic.

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Occurs when a person, through a computer system, pretends to be someone else.

A

SPOOFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is the most dangerous to the accounting and control systems, because a spoofer fools a computer into thinking that the network traffic arriving is from a trusted source

A

Internet spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

might flood employees’ e-mail boxes with junk mail but usually does not result in defrauding their company

A

E-MAIL SPOOFING

22
Q

usually used in an attempt to scam consumers.

A

E-MAIL SPOOFING

22
Q

The Act was intended to reform accounting, financial reporting, and auditing functions of companies that are publicly traded in stock exchanges.

A

SARBANES–OXLEY ACT OF 2002

23
Q

Are designed to avoid errors, fraud, or events not authorized by management. Intend to stop undesirable acts before they occur.

A

Preventive Controls

24
Q

Help employees to uncover or discover errors, fraud, or unauthorized events. Examples include matching physical counts to inventory records

A

Detective Controls

25
Q

are those steps undertaken to correct an error or problem uncovered via detective controls.

A

CORRECTIVE CONTROLS

26
Q

Has provided the standard definition and description of internal control accepted by the accounting industry

A

COSO (Committee of Sponsoring Organizations) REPORT

27
Q

Sets the tone of an organization and influences the control consciousness of its employees. Is the foundation for all other components of internal control, and it provides the discipline and structure of all other components.

A

control environment

28
Q

In order for management to maintain control over these threats to its business, it must constantly be engaged in risk assessment, whereby it considers existing threats and the potential for additional risks and stands ready to respond should these events occur.

A

RISK ASSESSMENT

29
Q

The COSO report identifies _______ as the policies and procedures that help ensure that management directives are carried out and that management objectives are achieved.

A

Control Activities

30
Q

In any organization, it is important to try to ensure that the organization engage only in transactions which are authorized.

A

Authorization of transactions

31
Q

Refers to an approval, or endorsement, from a responsible person or department in the organization that has been sanctioned by top management.

A

AUTHORIZATION

32
Q

is a set of guidelines that allows transactions to be completed as long as they fall within established parameters.

A

General authorization

33
Q

b)means that explicit approval is needed for that single transaction to be completed.

A

Specific authorization

34
Q

When management delegates authority and develops guidelines as to the use of that authority, it must assure that the authorization is separated from other duties. This separation of related duties is called segregation of duties

A

Segregation of Duties

35
Q

Supervision is a ___________that lessens the risk of negative effects when other controls are lacking. Supervision as a compensating control is appropriate in larger organizations, too, where there may be situations in which it is difficult to fully segregate duties.

A

Compensating Control

36
Q

When management is conscientious and thorough about preparing and retaining documentation in support of its accounting transactions, internal controls are strengthened.

A

Adequate Records and Documents

37
Q

Which presents verifiable information about the accuracy of accounting records.

A

Audit Trail

38
Q

Organizations should establish control activities to safeguard their assets, documents, and records. These control activities involve securing and protecting assets and records so that they are not misused or stolen.

A

Security of assets and documents

39
Q

Serve as a method to confirm the accuracy and completeness of data in the accounting system.

A

Independent checks and reconciliations

40
Q

is a procedure that compares records from different sources.

A

RECONCILIATION

41
Q

occurs when a company takes a physical count of inventory and compares the results to the inventory records.

A

Comparison Of Physical Assets With Records

42
Q

can help uncover math or program logic errors.

A

Recalculation Of Amounts

43
Q

is the examination of a report to assess the accuracy and reliability of the data in that report.

A

Analysis Of Reports

44
Q

which is merely a summation of key items in the batch (such as hours worked), and compare this batch total along various stages of processing.

A

Batch Totals

45
Q

is extremely important guidance for those who design or audit IT systems

A

COBIT (Control Objectives for Information Technology)

46
Q

are designed to be the written guidance for CPAs who provide assurance services for organizations.

A

TRUST SERVICES PRINCIPLES

47
Q

The risk related to ________Vis unauthorized access, which may be both physical access and logical access. An example of unauthorized physical access would be a person breaking into the computer room and damaging computer equipment.

A

security

48
Q

The risk related to______ is system or subsystem failure due to hardware or software problems.

A

availability

49
Q

The risk related to _______ _______ could be inaccurate, incomplete, or improperly authorized information

A

processing integrity

50
Q

The risk in this area is that personal information about customers may be used inappropriately or accessed by those either inside or outside the company.

A

ONLINE PRIVACY

51
Q

The risk related to _________________ is that confidential information about the company or its business partners may be subject to unauthorized access during its transmission or storage in the IT system.

A

Confidentiality