Question details

CIS430 All Self Quies latest 2017
$ 40.00

CIS430 Unit 2 Self Quiz C2

Question 1

Directing work-in-process through its various stages of manufacturing is part of the conversion cycle.

True

False

Question 2

Real time systems process transactions individually at the moment the event occurs. There are no time lags between occurence and recording.

True

False

Question 3

Management is responsible for evaluating and reporting on a company's controls.

True

False

Question 4

Bat Batch processing of non-critical accounts improves operational efficiency.

True

False

Question 5

Which system is not part of the expenditure cycle?

Cash Disbursements

Cash Receipts

Payroll

Cash Disbursements

Fixed Assets

Question 6

Which of the following is NOT an advantage of real-time processing files over batch processing?

Incorrect

shorter transaction processing time

reduction of inventory stocks

improved customer service

all are advantages

Question 7

Which of the following is NOT a true statement?

Infrequent transactions are recorded in the general journal.

An audit trai is provided to trace transactions from source documents to the financial statements.

Transactions are recorded in journals and are posted to ledgers.

Infrequent transactions are recorded in the general journal.

Frequent transactions are recorded in special journals.

Correct All of the above are true.

Question 8

The principal advantage of a hashing system is access speed.

True

False

Question 9

Real time systems processes transactions in batches.

True

False

Question 10

In contrast to a batch processing system, in a real-time system

a lag occurs between the time of the economic event and when the transaction is recorded

relatively fewer hardware, programming, and training resources are required

a lesser resource commitment per unit of output is required

processing takes place when the economic event occurs

Question 11

In contrast to a real-time system, in a batch processing system

there is a lag between the time when the economic event occurs and the financial records are updated

relatively more resources are required

a greater resource commitment per unit of output is required

processing takes place when the economic event occurs

Question 12

The type of transaction most suitable for batch processing is

airline reservations

credit authorizations

payroll processing

adjustments to perpetual inventory

Question 13

Sequential storage means

data is stored on tape

access is achieved through an index

access is direct

reading record 100 requires first reading records 1 to 99

Question 14

The most important advantage of an alphabetic code is that

meaning is readily conveyed to users

sorting is simplified

the capacity to represent items is increased

missing documents can be identified

 

 

 

 

CIS430 Unit 2 Self Quiz C3

Question 1

All the following are factors in the fraud triangle except

Ethical behavior of an individual (rationalization)

Pressure exerted on an individual at home and job related

Materiality of the assets

Opportunity to gain access to assets

Question 2

0 out of 0 points

Which of the following best describes lapping?

applying cash receipts to a different customer’s account in an attempt to conceal previous thefts of funds

inflating bank balances by transferring money among different bank accounts

expensing an asset that has been stolen

creating a false transaction

Question 3

Skimming involves

Stealing cash from an organization before it is recorded

Stealing cash from an organization after it has been recorded

A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.

Manufacturing false purchase orders, receiving reports, and invoices

Question 4

Who is responsible for establishing and maintaining the internal control system?

internal auditor

accountant

management

external auditor

Question 5

Which of the following is not a limitation of the internal control system?

errors are made due to faulty judgement

fraud occurs because of collusion between two employees

the industry is inherently risky

management override when management instructs the bookkeeper to make fraudulent journal entries

Question 6

Cash larceny involves

Stealing cash from an organization before it is recorded

stealing cash from an organization after it has been recorded

manufacturing false purchase orders, receiving reports, and invoices

A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.

Question 7

What are the five internal control components described in SAS78/COSO?

Control environment

Risk assessment

Information and communication

Monitoring such as an effective internal audit function

Control activities which include separation of duties and a well designed accounting system

Question 8

A key modifying assumption in internal control is that the internal control system is the responsibility of management.

True

False

Question 9

The Sarbanes-Oxley Act requires the audit committee to hire and oversee the external auditors.

True

False

Question 10

Managers that perpetrate fraud often do so by overriding the internal control system.

True

False

Question 11

The control environment is the foundation for an organization's internal control.

True

False

 

CIS430 Unit 5 Self Quiz C8

Question 1

FRS is an acronym for Federal Reporting System.

True

False

Question 2

MRS is an acronym for Management Reporting System.

True

False

Question 3

Management reporting is often called discretionary reporting because it is not mandated as is financial reporting.

True

False

Question 4

A company with a wide span of control tends to have relatively more layers of management.

True

False

Question 5

The FRS is the Futures Recognition System.

True

False

Question 6

The employee who maintains the cash receipts journal also records transactions in the accounts receivable subsidiary ledger. This would be considered a control weakness.

True

False

Question 7

A fundamental principle of responsibility accounting is that

managers are accountable only for items they control

a manager’s span of control should not exceed eight people

structured reports should be prepared weekly

the information flow is in one direction, top-down

 

CIS430 Unit 5 Self Quiz C11

Question 1

The big bang approach involves converting from old legacy systems to the new ERP in one implementation step.

True

False

Question 2

The implementation of a centralized ERP system creates a disaster risk that must be controlled by having an effective contingency plan.

True

False

Question 3

Most ERP systems are developed and implemented by in house personnel.

True

False

Question 4

The process of managing the access control to the ERP system to include the process of creating, modifying and deleting who has access to what has been identified as a major control problem in the use of an ERP system.

True

False

 

CIS430 Unit 5 Self Quiz C12

Question 1

The rules that make it possible for users of networks to communicate are called protocols

True

False

Question 2

EDI is the inter-company exchange of computer processible business information in standard format.

True

False

Question 3

Which one of the following statements is correct?

Cookies always contain encrypted data.

Cookies are text files and never contain encrypted data.

Cookies contain the URLs of sites visited by the user.

Web browsers cannot function without cookies

Question 4

An IP Address:

defines the path to a facility or file on the web.

is the unique address that every computer node and host attached to the Internet must have.

is represented by a 64-bit data packet.

is the address of the protocol rules and standards that governing the design of internet hardware and software.

none of the above is true.

Question 5

A digital signature is

the encrypted mathematical value of the message sender’s name

derived from the digest of a document that has been encrypted with the sender’s private key

the computed digest of the sender’s digital certificate

allows digital messages to be sent over analog telephone lines

Question 6

HTTP

controls Web browsers that access the Web.

is used to connect to Usenet groups on the Internet

is used to transfer text files, programs, spreadsheets, and databases across the Internet.

is a low-level encryption scheme used to secure transmissions in higher-level format.

 

 

 

CIS430 Unit 6 Self Quiz C13

Question 1

When implementing a new system, the costs associated with transferring data from one storage medium to another is an example of a data conversion cost.

True

False

Question 2

All of the following are reasons why new systems fail except

The user is not involved in the development of the system.

The system requirements are not clearly specified.

The systems analysts rely on prototyping models.

The systems analyst did not fully understand the business problem.

Question 3

The degree of compatibility between the firm’s existing procedures and personnel skills and the requirements of the new system is called

technical feasibility

operational feasibility

schedule feasibility

legal feasibility

Question 4

Reasons that a new systems implementation may be unsuccessful include all of the following except

organizational restructuring required by the new system results in displaced workers

end users do not understand the strategic merits of the new system

employees are not trained to use the system

system development team members include representatives from end-user departments

Question 5

A disadvantage of surveying the current system is it constrains the generation of ideas about the new system.

True

False

Question 6

The role of the internal auditor as a member of the systems development team includes evaluating that adequate internal controls are built into the system.

True

False

Question 7

Which of the following is not a step in the cost benefit analysis?

Identify costs

Pay vendors

Identify benefits

Compare costs to benefits

 

 

 

CIS430 Unit 7 Self Quiz C16

Question 1

A software program that allows access to a system without going through the normal logon procedures is called back door.

True

False

Question 2

A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.

True

False

Response Feedback:

It is called a worm.

Question 3

The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.

True

False

Question 4

Encryption is the conversion of data into a secret code for storage in databases and transmission over networks. For transmissions, the message is coded at the sending end using an encryption algorithm and is decoded at the receiving end.

True

False

Question 5

Which of the following is not a form of contra password security behavior?

Using a simplistic password.

Failing to change your password on a frequent basis.

Not backing up files are according to policy.

Forgetting your password.

Writing your password down and displaying it so others can see it.

Question 6

In an electronic data interchange environment, customers routinely access the vendor's price list.

True

False

Question 7

In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing the audit objective that authorized trading partners have access only to approved data.

True

False

Question 8

Audit objectives in the electronic data interchange (EDI) environment include all of the following except

all EDI transactions are authorized

unauthorized trading partners cannot gain access to database records

a complete audit trail of EDI transactions is maintained

backup procedures are in place and functioning properly

Question 9

In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except

the policy on the purchase of software only from reputable vendors

the policy that all vendor software upgrades are checked for viruses before they are implemented

the policy that current versions of antivirus software should be available to all users

the policy that permits users to take files home to work on them

Question 10

Which of the following is not an audit procedure for access privileges?

Review the organization's policies regarding incompatible functions to insure that they promote reasonable security.

Review employee's privileges to determine if their access rights are appropriate for their job.

Review data back up procedures to determine if they are adequate.

Review employee personnel records to determine whether privileged employees have a security check in compliance with company policy.

 

CIS430 Unit 8 Self Quiz C17

Question 1

A check digit is a method of detecting incorrectly account numbers that are entered incorrectly.

True

False

Question 2

Tracing is a method used to verify the logical operations executed by a computer.

True

False

Question 3

Generalized audit software packages are owned by the auditor's client.

True

False

Question 4

In parallel simulation a program is created that does what the application program does. Transactions are reprocessed and the parallel simulation results are compared to the actual application results.

True

False

Question 5

The integrated test facility involves an audit module designed into the application with dummy or test records integrated among legitimate records. An example would be a dummy company or account against which transactions could be tested.

True

False

Question 6

A salami fraud affects a large number of victims, but the harm to each appears to be very small.

True

False

Question 7

Check digits are designed to detect transcription and transposition errors.

True

False

Question 8

The program maintenance change authorization should be approved by either the computer services management or the user department management.

True

False

Question 9

An example of a hash total is

total payroll checks–$12,315

total number of employees–10

sum of the social security numbers–12,555,437,251

none of the above

Question 10

Which input control check would detect a payment made to a nonexistent vendor?

Incorrect numeric/alphabetic check

missing data check

numeric/alphabetic check

range check

validity check

Question 11

Transaction data should never be used to update a master file until it is tested for validity, accuracy and completeness.

True

False

Question 12

The employee entered "40" in the "hours worked per day" field. Which check would detect this unintentional error?

numeric/alphabetic data check

sign check

limit check

missing data check

Question 13

The integrated test facility (ITF) uses dummy records integrated with legitimate records.

True

False

Question 14

The white box approach audits through the computer and tests the application logic directly.

True

False

Question 15

Organizations must insure that there is adequate control in regard to report distribution.

True

False

Question 16

An example of a limit check is having a payroll system test the number of hours worked. For example, if the company’s policy is that no worker works more than 50 hours, than the system can test the hours worked field and either reject the transaction or show it on an exception report.

True

False

Question 17

Which of the following is not one of the audit objectives relating to systems development?

Ensure that the systems development activities are applied consistently and in accordance with management’s policy to all systems development projects.

Ensure that the system as originally implemented is free from material errors and fraud.

Ensure that system documentation is sufficiently accurate and complete.

Ensure that the system was judged necessary and justified at various checkpoints throughout the SDLC.

All of the above are audit objectives relating to systems development.

Question 18

The black box approach to testing application controls is essentially auditing around the computer.

True

False

 

 

Available solutions
  • CIS430 All Self Quies latest 2017
    $40.00

    CIS430 Unit 2 Self Quiz C2 Question 1 Directing work-in-process through its various stages of manufacturing is part of the conversion cycle. True False Question 2 Real time systems process transactions individually at the moment the event occurs. There are no time lags between occurence and recording. True False Question 3 Management is responsible for evaluating and reporting on a company's controls. True False Question 4 Bat Batch processing of non-critical accounts improves operational efficiency. True False Question 5 Which system is not part of the expenditure cycle? Cash Disbursements Cash Receipts Payroll Cash Disbursements Fixed Assets Question 6 Which of the following is NOT an advantage of real-time processing files over batch processing? Incorrect shorter transaction p

    Submitted on: 03 Mar, 2018 02:43:43 This tutorial has not been purchased yet .