Test 1 Quizzes Flashcards

1
Q

Cycle: Payoff mortgage on factory

A

financing cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cycle: Hire a new assistant controller

A

human resources/payroll cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cycle: Pay for raw materials

A

expenditure cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cycle: Disburse payroll checks to factory workers

A

HR/payroll cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cycle: Record goods received from vendor

A

expenditure cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cycle: Decide how many units to make next month

A

production cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cycle: Collect payment on customer accounts

A

revenue cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control Account

A

The gen. ledger account corresponding to a subsidiary ledger, where the sum of all sub ledger entries should equal the amount in the gen ledger account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Group code

A

two or more subgroups of digits are used to code items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transaction File

A

Contains records of individual business transactions that occur during a specific time period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data differs from information in which way?

  • Information is output and data is input.
  • Data is output and information is input
  • Data is meaningful bits of information
  • There is no difference
A

Info is output and data is input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not a characteristic that makes information useful?

  • It is relevant
  • It is reliable
  • It is timely
  • It is inexpensive
A

It is inexpensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not a means by which information improves decision making?

  • increasing information overload
  • reducing uncertainty
  • providing feedback about the effectiveness of prior decisions
  • identifying situations requiring management action
A

increasing information overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not an advantage of an ERP system?

  • better access control
  • simplicity and reduced costs
  • standardization of procedures and reports
  • improved monitoring capabilities
A

simplicity and reduced cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a function of an AIS?

  • transforming data into useful information
  • reducing the need to identify a strategy and strategic position
  • allocating organizational resources
  • automating all decision making
A

transforming data into useful information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
All of the information (name, gpa, major, etc.) about a particular student is stored in which of the following?
attribute
file
record
field
A

record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following would contain the total value of all inventory owned by an organization?
general ledger
source document
cash budget
subsidiary ledger
A

general ledger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is most likely to be a general ledger control account?

  • accounts receivable
  • petty cash
  • prepaid rent
  • retained earnings
A

accounts receivable

19
Q
In which cycle does a company ship goods to customers?
expenditure cycle
production cycle
financing cycle
revenue cycle
A

revenue cycle

20
Q
Which of the following is NOT one of the three conditions necessary for fraud to occur (hint: these three conditions form the sides of the fraud triangle)?
Attitude
Opportunity
Rationalization
Pressure
A

Attitude

21
Q
Which of the following causes the majority of computer security problems?
power outages
natural disasters
software errors
human errors
A

human errors

22
Q
The three C’s of perpetrating a successful fraud are nestled among the following list. Identify the three C’s that are necessary for a successful fraud.
Communicate
Collusion
Commit
Convert
Contribute
Conceal
Convict
Correct
Cover
A

Commit

Convert

Conceal

23
Q

Segregation of Duties functions

A

Authorization - approving transactions and decisions
Recording - preparing, entering data
Custody - handling

24
Q

Which SOD conflicts occurs in the following situation:

A purchasing agent received a 10% kickback of the invoice amount for all purchases made form a specific vendor.

A

Recording and Authorization

25
Q

Which SOD conflicts occurs in the following situation:
A payroll clerk recorded a 40-hour week for an employee who had quit the previous week. He then prepared a paycheck for this employee, forged her signature, and cashed the check.

A

Custodial and Recording Conflict

26
Q

A(n) ________ control is associated with making sure an organization’s control environment is stable, while a(n) ________ control prevents, detects, and corrects transaction errors and fraud.

  • application, general
  • general, application
  • diagnostic, interactive
  • interactive, diagnostic
A

general, application

27
Q

Which of the following is NOT included in the COSO Enterprise Risk Management (ERM) model?

  • Control Activities
  • Event Identification
  • Information & Communication
  • Internal Environment
  • Monitoring
  • Objective Setting
  • Risk Assessment
  • Risk Response
  • All of the above are part of the COSO ERM model
A

All of the above are part of the COSO ERM model

28
Q

The COBIT5 framework primarily relates to

  • best practices and effective governance and management of private companies.
  • best practices and effective governance and management of public companies.
  • best practices and effective governance and management of information technology (IT).
  • all of the above
A

best practices and effective governance and management of information technology (IT).

29
Q

At a movie theater you buy a movie ticket at a ticket window. The clerk gives you a pre-numbered movie ticket once you pay. As you enter the theater an usher takes your ticket and tears it in half, keeping his/her half. The ticket stubs are later reconciled with the tickets sold. Cash is reconciled with tickets sold.

  1. True or False: The controls implemented in the scenario successfully mitigate the risk that the usher can let people in without a ticket.
  2. True or False: The controls implemented in the scenario successfully mitigate the risk the clerk will pocket cash when selling a ticket for cash.
  3. True or False: The controls implemented in the scenario successfully mitigate the risk that the clerk will give tickets away to friends
  4. True or False: The controls implemented in the scenario successfully mitigate the risk that the cashier and usher could collude to collect cash and issue fictitious tickets, splitting the money and throwing away the fictitious tickets.
A
  1. False
  2. True
  3. True
  4. False
30
Q
Identify the primary means of protecting data stored in a cloud from unauthorized access.
authentication
authorization
virtualization
securitization
A

authentication

31
Q

True or False: Cloud computing is generally more secure than traditional computing.
True
False

A

False

32
Q

________ is/are an example of a preventive control.

  • Emergency response teams
  • Encryption
  • Log analysis
  • Intrusion detection
A

encryption

33
Q

Which of the following preventive controls are necessary to provide adequate security for social engineering threats?

  • controlling remote access
  • encryption
  • host and application hardening
  • awareness training
A

awareness training

34
Q

A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization’s information system, is known as a(n)

  • demilitarized zone.
  • intrusion detection system.
  • intrusion prevention system.
  • firewall.
A

firewall

35
Q

This batch processing data entry control sums a non-financial numeric field.

  • Financial total
  • Hash total
  • Record count
  • Sequence check
A

Hash Total

36
Q

This determines if all required data items have been entered.

  • Completeness check
  • Field check
  • Limit check
  • Range check
A

Completeness Check

37
Q

This protects records from errors that occur when two or more users attempt to update the same record simultaneously.

  • Concurrent update controls
  • Cross-footing balance test
  • Data conversion controls
  • Echo check
A

Concurrent update controls

38
Q

This enables a system to continue functioning in the event that a particular hardware component fails,

  • Backup procedures
  • Fault tolerance
  • Preventive maintenance
  • None of the above
A

Fault Tolerance

39
Q

A comparison of debits and credits in related control accounts is referred to as a

  • Cross-footing balance test
  • Parity test
  • Zero-balance test
  • Size check
A

Zero-balance test

40
Q
Forms design is an example of this type of control.
Data entry controls
Data transmission controls
Output controls
Input controls
A

INput controls

41
Q

While this type of backup process takes longer than the alternative, restoration is easier and faster.

  • archive
  • cloud computing
  • differential backup
  • incremental backup
A

Differential backup

42
Q
Which of the following measures the amount of data that might be potentially losts as a result of a system failure?
RTO (Recovery Time Objective)
RPO (Recovery Point Objective)
ROLO (The anit-Twixt)
BCP (Business Continuity Plan)
DRP (Disaster Recovery Plan)
A

RPO

43
Q

If you choose to update two copies of your database in real-time at two separate data centers, you are

  • setting up a detective control
  • doing a live cold site
  • doing real-time mirroring
  • doing repetitive checkpoints
A

doing real-time mirroring

44
Q

Which of the following provides detailed procedures to resolve the problems resulting from a flash flood that completely destroys a company’s data center?

  • disaster recovery plan (DRP)
  • backup plan
  • business continuity plan (BCP)
  • archive plan
A

DRP