This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ng off unnecessary features in the system or application software
________ Employing multiple layers of internal controls to avoid having a single point of failure 2 9) Below is a list of control procedures. Match the control with the threat. (2 points)
A. Closed - loop verification
C. Document inventory transfers
E. Off- site data storage of backup files
G. Prepare and review performance reports
H. Segregate shipping and billing functions B. Credit sales approved by credit manager
D. Maintain an updated inventory master file...
View Full Document
- Spring '14