Student Exam Questions - AIS

Student Exam Questions - AIS - 1Vipul Agrawal Chapter 5 1....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
1Vipul Agrawal Chapter 5 1. Which of the following is a fraud in which later payments on account are used to pay off earlier payments that were stolen? a. Lapping b. Kiting c. Ponzi Scheme d. Salami technique A is correct answer 2. Which type of fraud is associated with as many as 50% of all lawsuits against auditors? a. Kiting b. Fraudulent financial reporting. c. Ponzi scheme d. Lapping B is correct answer 3. Which of the following statement is false? a. The psychological profiles of white-collar criminals differ from those of violent criminals b. The psychological profiles of white-collar criminals are significantly different from those of the general public c. There is no difference between computer fraud perpetrators and other types of white-collar criminals d. Computer fraud perpetrators often do not view themselves as criminals B is correct answer Chapter 6 4. COSO identified five interrelated components of internal controls. Which of the following is not one of those five? a. Risk assessment b. Internal control policies c. Monitoring d. Information and communication B is correct answer 5. In the ERM model, COSO specified four types of objectives that management must meet to achieve company goals. Which of the following is not one of those types? a. Responsibility objectives b. Strategic objectives c. Compliance objectives d. Reporting objectives e. Operations objectives A is correct answer 6. Which of the following statements is true? a. The COSO report on enterprise risk management is narrow in scope and is limited to financial controls. b. COSO=s internal control integrated framework report has been widely accepted as the authority on internal controls. c. The Foreign Corrupt Practices Act had no impact on internal accounting control systems. d. It is easier to add controls to an already designed system than to include them during the initial design stage. B is correct answer Chapter 7 7. Which of the following statements is true? a. The concept of defense in-depth reflects the fact that security involves the use of few, sophisticated technical controls b. Computer security is primarily a management issue c. The time-based model of security can be expressed in the following formula: P< D+C d. All the above are true 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
B is correct answer 8. Firewalls are an example of: a. Preventative controls b. Detective controls c. Corrective controls d. Reactive controls A is correct answer 9. The control procedure designed to verify a user=s identity is called? a. Authorization b. authentication c. Intrusion prevention systems d. Intrusion detection systems B is correct answer Chapter 8 10. Back-up procedures are relevant to which Trust Services framework principle? a.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 87

Student Exam Questions - AIS - 1Vipul Agrawal Chapter 5 1....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online