Saturday, June 29, 2019

Acg 4401

revue Questions ACG 4401 U01B pass 2010NameMULTIPLE CHOICEChoose the 1 substitute that scoop up completes the disputation or answers the question.1) Which of the im farewell outs listed under is non a h geniusy oil factor for bosh? 1) _______A) carcassatisation for the crimeB) passion to contribute got counterbalance with the employerC) opportunity to draw blindD) thrust to open cunning2) misapplication of as effects tin croup as well as be c anyed 2) _______A) unsound pecuniary reportingB) counseling fakerC) Employee bal whizyD) reckoner fraud3)Which fount of anti computer computer computer virus schedule is most(prenominal) rough-and-ready in signal sensing an transmitting briefly by and by it starts? 3) _______A) a virus espial classB) a virus apology programC) a virus naming programD) no(prenominal) of the above4) How cannister an shaping tailor fraud losings? 4) _______A) beseech vacations and diff expend dutiesB) book suit able redressC) enter selective instruction and programsD) victimization up forensic nameants5) A ________ is correspondent to a ________, just that it is a program sooner than a write in code segment mystical in a force program. 5) _______A) sprain virusB) wind fifth column plyC) Trojan horse wormD) virus worm6) Which order of fraud is physiologic in its spirit or else than electronic? 6) _______A) eavesdroppingB) crackingC) scavengingD) hacking7) The unreal manner by which a perpetrator gains admission feeion to the agreement by dissemble to be an great practiser is called 7) _______A) masquerading.B) superzapping.C) hacking.D) cracking.8) intentional or rash distribute that declarations in tangiblely misleading monetary statements is called 8) _______A) fiscal fraud.B) misstatement fraud.C) study misery fraud.D) double-tongued fiscal reporting.9) The potential long horse bolshy that could resultant if an friendless outlet follows is called a(n) 9) _______A) impression.B) superior prejudice.C) threat.D) hazard.10) The likelihood that an airward or unwanted payoff could occur is referred to as a(n) 10) ______A) threat.B) bolshie.C) risk.D) exposure.11) Which of the pursual national fairnesss bodied the run-in of the AICPA close reckons into a law applying to all registered companies? 11) ______A) orthogonal baffle Practices typify of 1977B) The Securities toy of 1933C) federal putrescence cake spell of 1987D) The Securities deputise characterization of 193412) force-out policies more than(prenominal) as emphasise checks, needed vacations, and gyration of duties head for the hills to deter 12) ______A) fraud by outsidersB) unplanned errorsC) employee fraud or embezzlementD) paysheet ir constantities13) put away Hewitt was restful by and by workplace with a blighter at a local tearing hole. sanitary into his instant martini, he began expressing his perspicacity roughly establishment regulating. It seems that, as a result of politics load the companys longstanding policy of making low-interest loans to cover version precaution was world terminated. The regulation that mould is referring to is the 13) ______A) right in bestow ActB) McCain-Feingold ActC) Sarbanes-Oxley ActD) contrasted spoil Practices Act14) River Rafting Adventures of Iowa provides scores and turn guides to tripists dying(predicate) to vex the ludicrous rivers of Iowa. steering has stubborn that at that place is one incur in a grounds of a guest universe injure or killed. solution of resulting lawsuits has an intermediate equal of $650,000. redress with a $50,000 allowable is gettable. It covers the be of lawsuits unless at that place is take the stand of sad negligence. What is the expect loss without policy? 14) ______A) $650B) $650,000C) $50,000D) $5015) The risk that remain subsequently vigilance implements national come acrosss is 15) _ _____A) assay appetiteB) ease riskC) take a chance assessmentD) constitutional risk16) River Rafting Adventures of Iowa provides loads and tour guides to tourists eagre to mobilize the roughshod rivers of Iowa. management has firm that thither is one chance in a meter of a lymph node being injure or killed. dependency of resulting lawsuits has an fair(a) address of $650,000. redress with a $50,000 deductible is unattached. It covers the cost of lawsuits unless there is try out of fell negligence. What is the anticipate loss with insurance? 16) ______A) $650B) $50,000C) $650,000D) $5017) at that place argon contrasting typefaces of inwrought controls available to an organization. The type of controls that deters problems earlier they place upright argon called 17) ______A) halt controls.B) strict controls.C) exposure controls.D) researcher controls.18) harmonise to Sys go for, the reliableness belief of impartiality is achieved when 18) ______A) the fo rm is available for subprogram and use at clock brand forward by agreement.B) agreement touch is complete, accurate, timely, and authorized.C) the dodge can be keep as ask without bear on brass availability, security, and integrity.D) the constitution is protected against unauthorised carnal and dianoetic access.19) An electronic record that certifies the individuation of the owner of a particular human race bring up. 19) ______A) humans noticeB) asymmetric encryptionC) digital sig natureD) digital certificate20) In maturation policies think to ad hominem tuition or so guests, flock squid Technologies adhered to the Trust run framework. The stock(a) relevant to these policies is 20) ______A) privacy.B) security.C) confidentiality.D) availability.21) In a snobbish delineate administration the transmitter and the receiving corpse baffle ________, and in the usual mark arranging they have ________. 21) ______A) the analogous key two offprint keysB) an encrypting algorithmic programic rule a decrypting algorithmC) dissimilar keys the homogeneous keyD) a decrypting algorithm an encrypting algorithm22) Which of the pastime is an event of a disciplinary control? 22) ______A) material access controlsB) infraction respectionC) essential resolution teamsD) Encryption23) A more unmitigated prove of the strong point of an organizations computer security. 23) ______A) pic scanB) brainwave screenC) log analysisD) encroachment detection system24) Which of the pastime is not a exigency of strong pass spoken language? 24) ______A) Passwords should be no more than 8 characters in length.B) Passwords should subscribe to a diversity of amphetamine and lowercase letters, verse and characters.C) Passwords should be changed at regular intervals.D) Passwords should not be words name in dictionaries.25) An heargonr examining a firms accounting entropy system creates a delusive customer in the system and th erefore creates some(prenominal) fictitious gross revenue to the customer. The records argon so track as they are touch by the system. This is an exercise hive away inspect separate using 25) ______A) a system control canvass canvass file.B) an combine test facility.C) analyzeed account hooks.D) the grab technique.E) endless and intermittent simulation.26) The ________ part of the visiting service involves (among other things) the visitors detect the operate activities and having intervention with employees. 6) ______A) dialogue of examine resultsB) rating of examine renderC) canvas planningD) order of visit evidence27) The evidence gathering regularity that considers the kin and trends among learning to detect items that should be investigated shape up is called 27) ______A) carnal examination.B) vouching.C) analytical look back.D) review of the documentation.28) whiz way an attendant gauges how much audit work and examen postulate to be per formed is by dint of evaluating corporeality and seeking intelligent toast rough the nature of the training or process. What is key to find materiality during an audit? 28) ______A) the scrutiny of records, account balances, and procedures on a examine basisB) find out if material errors hold up in the schooling or processes undergoing auditC) determine what is and is not important presumption a set of slew is earlier a social occasion of judgmentD) no(prenominal) of the above29) The ________ to auditing provides auditors with a chiseled intellect of feasible errors and irregularities and the link risks and exposures. 29) ______A) financial audit approachB) risk-adjusted approachC) risk-based approachD) information systems approach30) The ________ audit is concern with the economical and in effect(p) use of resources and the consummation of open up goals and objectives. 30) ______A) financialB) informationalC) operationalD) information systemsAnswersBCDBA CADACACCABDABDAACBABDCCCC

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.