21) Which is NOT a component of comparisons and compliance monitoring?
A) control environment
B) budgets
C) audits
D) all of the above
22) The rule that all major groups of transactions should be supported by hard copy documents or electronic records is part of the control procedure of:
A) limited access.
B) segregation of duties.
C) adequate records.
D) proper approvals.
23) A company has a policy that all checks over $5,000 need to have the signature of the owner in addition to the signature of the bookkeeper. This is an example of:
A) limited access.
B) proper approvals.
C) adequate records.
D) encryption.
24) A malicious program that enters program code without consent and performs destructive actions in the victim's computer files or programs is a(n):
A) encryption device.
B) phishing expedition.
C) computer virus.
D) fidelity bond.
25) E-commerce pitfalls include all of the following EXCEPT:
A) stolen credit card numbers.
B) phishing expedition.
C) encryption.
D) trojan horses.
26) Creating bogus websites for the purpose of stealing unauthorized data is a(n):
A) encryption device.
B) phishing expedition.
C) computer virus.
D) Trojan horse.
27) ________ rearranges messages by a mathematical formula making the message impossible to read by someone who does not know the code.
A) Encryption
B) Firewall
C) Security wall
D) Access device
28) An internal control system can be circumvented by:
A) collusion, encryption and management override.
B) collusion, management override and segregation of duties.
C) collusion, management override and human limitations.
D) nothing, if it is a good internal control system.
29) Internal control procedures do NOT include:
A) smart hiring practices.
B) adequate records.
C) limited access.
D) control environment.
30) The objectives of internal control do NOT include:
A) safeguard assets.
B) encourage employees to follow company policy.
C) ensure accurate, reliable accounting records.
D) strong control environment.