Beruflich Dokumente
Kultur Dokumente
10. How are data sources and destinations 7. Which of the following is a software program that
represented in a data flow diagram? runs a database system?
a. as a square a. DQL
b. as a curved arrow b. DBMS
c. as a circle c. DML
d. as two parallel lines d. DDL
e. none of the above
8. The constraint that all primary keys must have
nonnull data values is referred to as which
1. The relational data model portrays data as being of the following?
stored in __________. a. referential integrity rule
a. hierarchies b. entity integrity rule
b. tables c. normalization rule
c. objects d. relational data model rule
d. files
9. The constraint that all foreign keys must have
2. How a user conceptually organizes and either null values or the value of a primary key in
understands data is referred to as the __________. another table is referred to as which of the following?
a. physical view a. referential integrity rule
b. logical view b. entity integrity rule
c. data model view c. foreign key value rule
d. data organization view d. null value rule
3. What is each row in a relational database table 10. Which of the following attributes in the Cash
called? Receipts table (representing payments received from
a. relation customers) would most likely be a foreign key?
b. attribute a. cash receipt number
c. anomaly b. customer check number
d. tuple c. customer number
d. cash receipt date
4. Which of the following is an individual users
view of the database? 1. Which of the following is a fraud in which later
a. conceptual-level schema payments on account are used to pay off
b. external-level schema earlier payments that were stolen?
c. internal-level schema a. lapping
d. logical-level schema b. kiting
c. Ponzi scheme
5. Which of the following would managers most d. salami technique
likely use to retrieve information about
sales during the month of October?
2. Which type of fraud is associated with 50% of all 8. Which of the following control procedures is most
auditor lawsuits? likely to deter lapping?
a. kiting a. encryption
b. fraudulent financial reporting b. continual update of the access control matrix
c. Ponzi schemes c. background check on employees
d. lapping d. periodic rotation of duties
3. Which of the following statements is false? 9. Which of the following is the most important,
a. The psychological profiles of white-collar basic, and effective control to deter fraud?
criminals differ from those of violent criminals. a. enforced vacations
b. The psychological profiles of white-collar b. logical access control
criminals are significantly different from those of the c. segregation of duties
general public. d. virus protection controls
c. There is little difference between computer fraud
perpetrators and other types of white-collar criminals. 10. Once fraud has occurred, which of the following
d. Some computer fraud perpetrators do not view will reduce fraud losses? (Select all correct answers.)
themselves as criminals. a. insurance
b. regular backup of data and programs
4. Which of the following conditions is/are usually c. contingency plan
necessary for a fraud to occur? (Select all correct d. segregation of duties
answers.)
a. pressure 1. A set of instructions to increase a programmers
b. opportunity pay rate by 10% is hidden inside an authorized
c. explanation program. It changes and updates the payroll file.
d. rationalization What is this computer fraud technique called?
a. virus
5. Which of the following is not an example of b. worm
computer fraud? c. trap door
a. theft of money by altering computer records d. Trojan horse
b. obtaining information illegally using a computer
c. failure to perform preventive maintenance on a 2. Which computer fraud technique involves a set of
computer instructions hidden inside a calendar utility that
d. unauthorized modification of a software program copies itself each time the utility is enabled until
memory is filled and the system crashes?
6. Which of the following causes the majority of a. logic bomb
computer security problems? b. trap door
a. human errors c. virus
b. software errors d. Trojan horse
c. natural disasters
d. power outages 3. Interest calculations are truncated at two decimal
places, and the excess decimals are put into an
7. Which of the following is not one of the account the perpetrator controls. What is this fraud
responsibilities of auditors in detecting fraud called?
according to SAS No. 99? a. typosquatting
a. evaluating the results of their audit tests b. URL hijacking
b. incorporating a technology focus c. chipping
c. discussing the risks of material fraudulent d. round-down fraud
misstatements
d. catching the perpetrators in the act of committing 4. A perpetrator attacks phone systems to obtain free
the fraud phone line access or uses telephone lines to transmit
viruses and to access, steal, and destroy data. What is
this computer fraud technique called?
a. phishing b. phishing
b. phreaking c. pharming
c. pharming d. phreaking
d. vishing
5. Fraud perpetrators threaten to harm a company if it 1. Which activity is part of the sales order entry
does not pay a specified amount of money. What is process?
a. setting customer credit limits
this computer fraud technique called?
b. preparing a bill of lading
a. cyber-terrorism c. checking customer credit
b. blackmailing d. approving sales returns
c. cyber-extortion
d. scareware 2. Which document often accompanies merchandise
shipped to a customer?
6. Techniques used to obtain confidential a. picking ticket
b. packing slip
information, often by tricking people, are referred to
c. credit memo
as what? d. sales order
a. pretexting
b. posing 3. Which method is most likely used when a
c. social engineering company offers customers discounts for prompt
d. identity theft payment?
a. open-invoice method
b. balance-forward method
7. What type of software secretly collects personal
c. accounts receivable aging method
information about users and sends it to someone else d. cycle billing method
without the users permission?
a. rootkit 4. Which of the following techniques is the most
b. torpedo software efficient way to process customer payments and
c. spyware update accounts receivable?
a. EFT
d. malware
b. UPIC
c. FEDI
8. What type of software conceals processes, files, d. ACH
network connections, memory addresses, systems
utility programs, and system data from the operating 5. Which of the following revenue cycle activities
system and other programs? can potentially be eliminated by technology?
a. rootkit a. sales order entry
b. shipping
b. spyware
c. billing
c. malware d. cash collections
d. adware
6. The integrated database underlying an ERP system
9. Which type of computer attack takes place results in which of the following general
between the time a software vulnerability is threats to the revenue cycle?
discovered and the time software developers release a a. inaccurate or invalid master data
b. unauthorized disclosure of sensitive information
software patch that fixes the problem?
c. loss or destruction of data
a. posing d. all of the above
b. zero-day attack
c. evil twin 7. Which document is used to authorize the release of
d. software piracy merchandise from inventory control (warehouse) to
shipping?
a. picking ticket
10. Someone redirects a websites traffic to a bogus
b. packing slip
website, usually to gain access to personal and c. shipping order
confidential information. What is this computer fraud d. sales invoice
technique called?
a. vishing
8. Which of the following provides a means both to d. A voucher package usually includes a debit memo.
improve the efficiency of processing customer
payments and also to enhance control over those 4. Which document is used to establish a contract for
payments? the purchase of goods or services from a supplier?
a. CRM a. vendor invoice
b. lockboxes b. purchase requisition
c. aging accounts receivable c. purchase order
d. EDI d. disbursement voucher
9. For good internal control, who should approve 5. Which method would provide the greatest
credit memos? efficiency improvements for the purchase of non
a. credit manager inventory items such as miscellaneous office
b. sales manager supplies?
c. billing manager a. bar-coding
d. controller b. EDI
c. procurement cards
10. For good internal control over customer d. EFT
remittances, the mailroom clerk should separate
the checks from the remittance advices and send the 6. Which of the following expenditure cycle activities
customer payments to which can be eliminated through the use of IT or
department? reengineering?
a. billing a. ordering goods
b. accounts receivable b. approving vendor invoices
c. cashier c. receiving goods
d. sales d. cash disbursements
1. Which of the following inventory control methods 8. For good internal control, who should sign checks?
is most likely to be used for a product for which sales a. cashier b. accounts payable
can be reliably forecast? c. purchasing agent d. controller
a. JIT b. EOQ
c. MRP d. ABC 9. Which of the following procedures is designed to
prevent the purchasing agent from receiving
2. Which of the following matches is performed in kickbacks?
evaluated receipt settlement (ERS)? a. maintaining a list of approved suppliers and
a. the vendor invoice with the receiving report requiring all purchases to be made from
b. the purchase order with the receiving report suppliers on that list
c. the vendor invoice with the purchase order b. requiring purchasing agents to disclose any
d. the vendor invoice, the receiving report, financial investments in potential suppliers
and the purchase order c. requiring approval of all purchase orders
d. prenumbering and periodically accounting for all
3. Which of the following is true? purchase orders
a. It is easier to verify the accuracy of invoices for
purchases of services than invoices for purchases of 10. Which document is used to record adjustments to
raw materials. accounts payable based on the return of
b. Setting up petty cash as an imprest fund violates unacceptable inventory to the supplier?
segregation of duties. a. receiving report b. credit memo
c. The EOQ formula is used to identify when to c. debit memo d. purchase order
reorder inventory.