ACC 6113 - QUIZ 2 - INTERNAL CONTROL

ACC 6113 - QUIZ 2 - INTERNAL CONTROL

University

10 Qs

quiz-placeholder

Similar activities

Module 3 -  Internal Control Systems

Module 3 - Internal Control Systems

University

15 Qs

THE ROLES OF INTERNAL AUDIT IN THE RISK MANAGEMENT

THE ROLES OF INTERNAL AUDIT IN THE RISK MANAGEMENT

University

15 Qs

RTV 36 The Seven Core Elements and Your Home Studio

RTV 36 The Seven Core Elements and Your Home Studio

University - Professional Development

12 Qs

RISK ASSOCIATED E-BANKING TECHNOLOGIES

RISK ASSOCIATED E-BANKING TECHNOLOGIES

University

10 Qs

External Examination-CNC

External Examination-CNC

University

10 Qs

Chapter 7 Quick Check

Chapter 7 Quick Check

University

11 Qs

FCS QUIZ

FCS QUIZ

University

10 Qs

ACC 6113 - QUIZ 2 - INTERNAL CONTROL

ACC 6113 - QUIZ 2 - INTERNAL CONTROL

Assessment

Quiz

Other

University

Medium

Created by

Farah Nabihah Rahman

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which type of fraud is associated with 50% of all auditor lawsuits?

Kiting

Ponzi schemes

Lapping

Fraudulent financial reporting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are the conditions which usually necessary for a fraud to occur?

Pressure

Explanation

Opportunity

Rationalization

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following is NOT an example of computer fraud?

Theft of money by altering computer records

Obtaining information illegally using a computer

Failure to perform preventive maintenance on a computer

Unauthorized modification of a software program

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following causes the majority of computer security problems?

Software errors

Human errors

Natural disasters

Power outages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most important, basic, and effective control to deter fraud?

Enforced vacations

Logical access control

Segregation of duties

Virus protection controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Techniques used to obtain confidential information, often by tricking people, are referred to as what?

Pretexting

Social engineering

Posing

Identity theft

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A set of instructions to increase a programmer's pay rate by 10% is hidden inside an authorized program. It changes and updated the payroll file. What is this computer fraud technique called?

Trojan horse

Virus

Worm

Trap door

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?