Академический Документы
Профессиональный Документы
Культура Документы
1. Which of the following is not one of the five components of internal control according to
COSO?
a. materiality
b. control environment
c. control activities
d. monitoring
2. Which of the following controls would be most effective in controlling unauthorized access to
information communicated on the Internet?
a. terminal access controls
b. encryption
c. biometric controls
d. firewalls
3. Which of the following elements of computer control includes separation of incompatible
duties?
a. processing controls
b. output controls
c. general control
d. application controls
4. Risk assessment described by COSO associates risk with change including all but:
a. slow growth.
b. new CEO.
c. new technology.
d. new products or services.
5. To assess the effectiveness of an audit committee, the auditor evaluates all of the following
characteristics of the committee except:
a. independence
b. character
c. resolve
d. diligence
6. Control activities are policies and procedures that pertain to:
a. a commitment to competence.
b. a proper organizational structure.
c. verifying input data.
d. maintaining effective human resource policies.
7. In an audit of financial statements in accordance with generally accepted auditing standards
(GAAS), an auditor is required to:
a. perform test of controls.
b. search for control weaknesses that could permit fraud to occur.
c. make suggestions for improvements in internal control to the client.