Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

Saint acc303 quiz 5

Question 1.1. Almost all computer criminals can be described as: (Points : 4)

professional criminals.

technical hackers possessing strong computer skills.

white collar professional criminals.

amateurs who describe themselves as relatively honest.

Question 2. 2. Logical access to the computer system would be best controlled by: (Points : 4)

intrusion alarm systems.

complex operating systems.

restrictions on physical access to online terminals.

password codes.

Question 3. 3. Hacking involves: (Points : 4)

stealing carbons of credit cards.

destroying computer hardware.

gaining illegal entry to computer files from remote locations.

inserting a logic bomb in a computer program

Question 4. 4. An ideal control is: (Points : 4)

a control procedure that reduces to practically zero the risk of an error or an irregularity taking place and not being detected.

a control procedure that is anticipated to have the lowest possible cost in relation to its benefits.

a control procedure that should always be implemented into a company’s system due to the efficiency and effectiveness that will result from its implementation.

a control procedure that is always cost effective.

Question 5. 5. Which of the following statements is true? (Points : 4)

The COSO report failed to define internal control.

The COSO report emphasized that an internal control system is a tool of management.

SAS 78 rejected the definition of internal control provided in the COSO report.

COBIT concluded that a company’s management is not responsible for establishing and monitoring a company’s internal control system.

Question 6. 6.Regarding the internal audit function, which of the following statements is true? (Points : 4)

Since many internal auditors have accounting backgrounds, the internal audit function should ideally be included within a company’s accounting subsystem.

It is not proper for internal auditors to perform a fraud investigation within any part of their company’s system.

Because of the independence of external auditors, they should never accept previous work of evaluating controls performed by a company’s internal auditors.

Within a company’s system, it is preferable to establish the internal audit function as a separate subsystem.

Question 7. 7.An approach used by many companies to reduce the risk of loss caused by the theft of assets by employees is to: (Points : 4)

utilize polygraphs.

acquire arbitrage loss protection.

acquire fidelity bond coverage.

institute punitive management.

Question 8. 8.Which of the following is not a processing control? (Points : 4)

Record counts

Control totals

Hash totals

Check digits

Question 9. 9. Which of these is an acronym for computer crime legislation? (Points : 4)

ACL

BART

CFAA

DDoS

Question 10. 10. At present, we think that computer crime is: (Points : 4)

falling.

random.

rising.

flat.


You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes