x
Info
x
Warning
x
Danger

Accounting Expert Answers & Study Resources : Page 228

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Expert Answers

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
150245 Resources
0 Students Benefited

11) ISO 27000 family of standards defines standards for building, operating, and maintaining ISMSs. 12) ISO27001 includes 132 general security controls, organized under 11 topics and further broken down into over 5000 detailed controls. 13) Passive threats include information systems fraud and computer sabotage. 14) System faults represent component equipment failures such as.

Homework Answers
19 Views
  • 11) ISO 27000 family of standards defines standards for building,
  • Accounting
Homework Answers
View Answer

54) The use of ________ control over the entire data processing input-process-output sequence is fundamental to organizational independence. 55) The use of programmed edit checks to discriminate among acceptable data is called ________ ________ auditing. 56) Using ________ ________ can compensate for the loss of manual internal controls. 57) ________ ________ input sales.

Homework Answers
19 Views
  • 54) The use of ________ control over the entire data
  • Accounting
Homework Answers
View Answer

130) Describe the similarities and differences between financial statement fraud and financial statement manipulation. 131) Describe procedures or activities that a company can implement to minimize financial statement fraud. 132) You have been hired by your client to investigate an alleged fraud case. Due to the complex nature of your client's transactions,.

Homework Answers
22 Views
  • 130) Describe the similarities and differences between financial statement fraud
  • Accounting
Homework Answers
View Answer

157) Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms. Required: Match the letter next to each definition with the appropriate term. Each answer will be used only once. ________ 1. Biometric hardware authentication ________ 2. Archive bit ________ 3. Trapdoor ________ 4. Consensus-based protocol ________ 5..

Homework Answers
14 Views
  • 157) Presented below a list of terms relating to accounting
  • Accounting
Homework Answers
View Answer

  1) Fraud examination and fraud investigation both refer to the application of accounting and other specialized skills to the prevention, detection, investigation, correction, and reporting of fraud. 2) Fraud prevention requires implementing control checklists that contain items such as firewalls and anti-virus software. 3) The ISO 27000 family of standards has over.

Homework Answers
31 Views
  •   1) Fraud examination and fraud investigation both refer to the
  • Accounting
Homework Answers
View Answer

146) In general, ________ arise from improperly installed or configured software and from unforeseen defects or deficiencies in the software. A) exploits B) virtualizations C) vulnerabilities D) exposures 147) Sabotage is a(n) ________ threat. A) active B) passive C) direct D) second layer 148) Input ________ is an example of a system attack method. A) vector B) manipulation C) hacking D) buffer 149) ________ involves.

Homework Answers
17 Views
  • 146) In general, ________ arise from improperly installed or configured
  • Accounting
Homework Answers
View Answer

53) ________ ________ ________ typically involves an employee pocketing cash but not recording its collection. 54) The solution in preventing lapping of accounts receivable is ________ ________ ________ ________. 55) ________ ________ typically involves using a stolen customer check to make a payment on account. 56) ________ ________ ________ ________ may occur when.

Homework Answers
12 Views
  • 53) ________ ________ ________ typically involves an employee pocketing cash
  • Accounting
Homework Answers
View Answer

116) Which of the following procedures would deter the lapping of accounts receivable? A) Segregation of accounting duties B) Training cashiers to follow strict procedures for making change C) Performing reconciliations on a register-by-register basis and separately for each cashier shift D) Limiting employee after-hours access to company resources 117) The fraud scheme that involves.

Homework Answers
16 Views
  • 116) Which of the following procedures would deter the lapping
  • Accounting
Homework Answers
View Answer

31) Few manual processing systems are batch oriented. 32) Batch processing is economical when large numbers of transactions must be processed. 33) Batch processing can only be performed using random-accessed (i.e., direct or indexed) file updating. 34) A sequentially organized master file commonly resides on a direct-access storage device. 35) When preparing the transaction.

Homework Answers
11 Views
  • 31) Few manual processing systems batch oriented. 32) Batch processing economical
  • Accounting
Homework Answers
View Answer

31) In the health insurance sector, the Gramm-Leach-Bliley Act, requires federal agencies that oversee the health insurance sector to implement regulatory standards aimed at protecting the security of critical information resources. 32) GASB statement #34 requires utility companies to maintain business continuity plans. 33) Criminal Code 301.2(1) makes it a federal crime.

Homework Answers
13 Views
  • 31) In the health insurance sector, the Gramm-Leach-Bliley Act, requires
  • Accounting
Homework Answers
View Answer

128) Presented below is a list of terms relating to the different types of evidence and the evidence collection process, followed by definitions of those terms. Required: Match the letter next to each definition with the appropriate term. Each answer will be used only once. ________ 1. Observation ________ 2. Invigilation ________ 3. Surveillance ________.

Homework Answers
17 Views
  • 128) Presented below a list of terms relating to the
  • Accounting
Homework Answers
View Answer

55) The information security management system is an organizational ________ ________ ________ that controls special risks associated with computer-based information systems. 56) The method of risk assessment for computer systems where system vulnerabilities and threats are listed and subjectively ranked is known as the ________ approach. 57) The Treadway Commission has linked.

Homework Answers
18 Views
  • 55) The information security management system an organizational ________ ________
  • Accounting
Homework Answers
View Answer

31) Invigilation is a technique used by fraud investigators to authenticate documentation. 32) A well-prepared interview conducted by a skilled interviewer can sometimes result in a confession that completely unwinds a complicated case. 33) Calibration is part of the fraud triangle. 34) Polygraphs may sometimes be used to detect dishonesty in fraud investigations. 35).

Homework Answers
16 Views
  • 31) Invigilation a technique used by fraud investigators to authenticate
  • Accounting
Homework Answers
View Answer

129) Presented below is a list of terms relating to fraud schemes, followed by definitions of those terms. Required: Match the letter next to each definition with the appropriate term. Each answer will be used only once. ________ 1. Sales skimming ________ 2. Bid rigging frauds ________ 3. Payroll fraud ________ 4. Fraudulent cost-plus billing ________.

Homework Answers
18 Views
  • 129) Presented below a list of terms relating to fraud
  • Accounting
Homework Answers
View Answer

68) Fundamental controls over data transfer between user departments and data processing include A) batch control totals. B) data transfer registers. C) activity file totals. D) Answers A and B are both correct. 69) Input data should be accompanied by the completion of a(n) A) data transfer log. B) input document control form. C) data transfer register. D) key.

Homework Answers
20 Views
  • 68) Fundamental controls over data transfer between user departments and
  • Accounting
Homework Answers
View Answer

41) Expert qualifications include things such as race, gender, and social status. 42) Earnings management is always illegal and can never be justified by GAAP. 43) Managers can legally manipulate or manage reported financial statement figures within GAAP. 44) Stock option is an executive mechanism to prevent financial statement fraud. 45) Internal auditors should.

Homework Answers
11 Views
  • 41) Expert qualifications include things such as race, gender, and
  • Accounting
Homework Answers
View Answer

121) Listed below are various controls found in a system of internal control. Required: Label each of the following controls as preventive (P), detective (D), or corrective (C). ________ 1. Transaction trail ________ 2. Rotation of duties ________ 3. Reconciliation ________ 4. Visual verification ________ 5. Batch controls ________ 6. Endorsement ________ 7. Redundant processing ________ 8. Training of.

Homework Answers
13 Views
  • 121) Listed below various controls found in a system of
  • Accounting
Homework Answers
View Answer

86) Information security management systems (ISMS) have which of the following objectives? A) Confidentiality B) Integrity C) Availability D) All of the above are correct. 87) A well-known standard for information security management systems development is A) SOX. B) ISO 27000. C) COBIT. D) both B and C 88) An example of fraud indicators is A) mismatch in an inventory count. B).

Homework Answers
18 Views
  • 86) Information security management systems (ISMS) have which of the
  • Accounting
Homework Answers
View Answer

21) Malware can be hidden in email, downloaded software, disk or Web browser. 22) Hacker methods include social engineering, direct observation, electronic interception, and exploits. 23) Direct observation includes shoulder surfing and piggybacking. 24) Direct observation includes shoulder surfing and dumpster diving. 25) In general, vulnerabilities arise from improperly installed or configured software and.

Homework Answers
15 Views
  • 21) Malware can be hidden in email, downloaded software, disk
  • Accounting
Homework Answers
View Answer

136) The information security management system life cycle includes analysis, design, implementation, and A) operation, evaluation, and management. B) operation, evaluation, and control. C) operation, management, and continuity. D) operation, control, and continuity. 137) Guidelines and standards that are important to Information Security Management Systems include all the following except A) COSO. B) COBIT. C) ERM. D) ISO 27000.

Homework Answers
16 Views
  • 136) The information security management system life cycle includes analysis,
  • Accounting
Homework Answers
View Answer

116) Disaster risk management is concerned with A) the prevention of disasters. B) the layered-access approach to security. C) contingency planning. D) Answers A and C are both correct. 117) The first step in managing disaster risk is A) to obtain business interruption insurance. B) disaster prevention. C) contingency planning. D) to analyze and list recovery priorities. 118) Which of.

Homework Answers
19 Views
  • 116) Disaster risk management concerned with A) the prevention of disasters. B)
  • Accounting
Homework Answers
View Answer

96) Physical and document evidence include A) fingerprints. B) trace evidence. C) forged document. D) all of the above 97) A signed confession is A) a court-admissible evidence. B) protected under the umbrella of attorney-client privilege. C) a physical evidence. D) not admissible in court. 98) Evidence is collected in the following order: A) Observations, physical and document evidence, and interviews. B).

Homework Answers
17 Views
  • 96) Physical and document evidence include A) fingerprints. B) trace evidence. C) forged
  • Accounting
Homework Answers
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*