<< Prev Question Next Question >>

Question 44/96

Which of the following controls BEST describes the safeguards an organization implements to provide protection for computing resources by increasing security policies and awareness, conducting security audits and tests, and properly classifying data?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (96q)
Question 1: Which of the following situations describes a red flag that ...
Question 2: ___________ is to allow the owner, investors, creditors and ...
Question 3: Which of the following scenarios BEST describes an electroni...
Question 4: Theft of incoming checks usually occurs when ________ is (ar...
Question 5: When expenses used to produce income- all of them- should be...
Question 6: Accounting records are designed to be kept on subjective rat...
Question 7: Which of the following search is used for unusually high inc...
Question 8: Financial statement fraud is BEST described as the intention...
Question 9: Which of the following is an example of a corruption scheme?...
Question 10: Which of the following is NOT the method for stealing invent...
Question 11: Every bribe is a two-sided transaction, in which where a ven...
Question 12: Asset misappropriations have an effect on the liabilities an...
Question 13: Which of the following statements regarding new account frau...
Question 14: Which of the following would NOT be considered a conflict of...
Question 15: Which of the following statements is MOST ACCURATE regarding...
Question 16: Not having any accounts receivable that are overdue is a com...
Question 17: Warner is part of management at ABC Corporation. He has been...
Question 18: A ____________ can be very costly for an organization to und...
Question 19: An analytical review reveals that XYZ Company's cost of good...
Question 20: The amount of cash on hand in a register may be compared to ...
Question 21: John is a salesperson whose job requires him to entertain po...
Question 22: ______________ is required not only for theft, but for proce...
Question 23: The heart of book keeping system is the ___________....
Question 24: Which of the following is a common way that dishonest contra...
Question 25: A person is said to be in ________ act, when the business wh...
Question 26: Which of the following is a reason why prepaid debit and gif...
Question 27: Once the expense account is closed, it becomes a historical ...
Question 28: All the following are basic methods used to prove corrupt pa...
Question 29: In ____________ scheme, a supplier pays an employee of the p...
Question 30: ____________ corrupt employees can cause inventory to be fra...
Question 31: Which of the following is a method of identity theft prevent...
Question 32: Which of the following statements is TRUE regarding the prev...
Question 33: Which of the following ratios can be used to determine the e...
Question 34: How many accounts are affected in fraudulent accounting entr...
Question 35: According to Hollinger and Clark for Policy development, man...
Question 36: Pilar had to purchase computer equipment for ABC Corporation...
Question 37: The more power a person has over the bidding process, the mo...
Question 38: According to the recommended methodology for responding to c...
Question 39: Which of the following scenarios is an example of an economi...
Question 40: Which of the following is a TRUE statement regarding check f...
Question 41: Which of the following is NOT the example of bribery prevent...
Question 42: Depreciation is especially applicable when companies try to ...
Question 43: A fraudster creates a fictitious identity by combining a per...
Question 44: Which of the following controls BEST describes the safeguard...
Question 45: Black, an accounts receivable clerk, stole Customer A's mont...
Question 46: A running count that records how much inventory should be on...
Question 47: Which of the following methods would NOT be helpful in detec...
Question 48: Which of the following would be helpful in detecting a cash ...
Question 49: ___________ and __________ are used to increase (or decrease...
Question 50: The excess credits (or debits) on the income statement are u...
Question 51: Which of the following is NOT a red flag of register disburs...
Question 52: Which of the four basic measures, if properly installed and ...
Question 53: Which of the following is a recommended method for safeguard...
Question 54: ________, one of the Fraud synonyms implies that deceiving s...
Question 55: According to a survey, in principal perpetrator, males in a ...
Question 56: Which of the following is NOT a distinguishing characteristi...
Question 57: Which of the following is a red flag that might indicate tha...
Question 58: Which of the following statements about skimming is CORRECT?...
Question 59: Georgina works for TAK Intelligence, a competitive intellige...
Question 60: Which of the following is TRUE regarding ghost employee sche...
Question 61: Which of the following is the MOST ACCURATE statement about ...
Question 62: Which of the following is not the skimming scheme?...
Question 63: Which of the following statements describes a best practice ...
Question 64: Antonia, a Certified Fraud Examiner (CFE), discovers that a ...
Question 65: The fraudsters' interest lies with an employer other than a ...
Question 66: Which of the following scenarios describes a card skimming o...
Question 67: Organizations that had external audits actually had higher m...
Question 68: The most common method of detection in corruption cases is:...
Question 69: __________ inventory and other assets is relatively common w...
Question 70: __________ means that traditional bribery statutes proscribe...
Question 71: The principal way to detect omitted credits from books of ac...
Question 72: To prevent expense reimbursement fraud, it is recommended th...
Question 73: When an incorrect total is carried from the journal to the l...
Question 74: In what type of fraud scheme does an employee steal cash aft...
Question 75: A special scheme in which employees know their employer is s...
Question 76: People commit financial statement fraud to:...
Question 77: In which of the following process, all bidders are legally s...
Question 78: ___________ allows the fraud examiner to inspect key attribu...
Question 79: The difference between assets and liabilities is called:...
Question 80: Which of the following statements about competitive intellig...
Question 81: A tangible asset is one which is:...
Question 82: Placing any restriction in the solicitation documents that t...
Question 83: Which of the following is a method that a fraudster might us...
Question 84: Which of the following is a red flag of a Ponzi scheme?...
Question 85: What can make it easy for an employee to skim sales or recei...
Question 86: Financial statement fraud is committed by:...
Question 87: Which of the following is FALSE regarding electronic payment...
Question 88: Assets that are long-lived and that differ from property, pl...
Question 89: In Cressey's fraud triangle, its three of the legs are Oppor...
Question 90: Collusion or bid-rigging between bidders is called...
Question 91: Which of the following is NOT the phase of the bidding proce...
Question 92: Persuasive evidence of an arrangement does not exist when:...
Question 93: Which of the following is MOST ACCURATE concerning common me...
Question 94: Larceny by Fraud or deception means that:...
Question 95: Which of the following is NOT a measure that is commonly tak...
Question 96: Which of the following is NOT a medium that commonly causes ...