Fraud, Ethics, And Internal Control Test Bank Answers Ch.3 - Accounting Info Systems Controls 3e Complete Test Bank by Leslie Turner. DOCX document preview.
ACCOUNTING INFORMATION SYSTEMS/3e
TURNER / WEICKGENANNT/COPELAND
Test Bank: CHAPTER 3: Fraud, Ethics, and Internal Control
NOTE: New questions are identified by the letter A as part of the question number; adjusted questions are identified by the letter X as part of the question number.
End of Chapter Questions:
- The careful and responsible oversight and use of the assets entrusted to management is called:
- Control environment
- Stewardship
- Preventive control
- Security
- Which of the following is not a condition in the fraud triangle?
- Rationalization
- Incentive
- Conversion
- Opportunity
- There are many possible indirect benefits to management when management fraud occurs. Which of the following in not an indirect benefit of management fraud?
- Delayed exercise of stock options.
- Delayed cash flow problems.
- Enhanced promotion opportunities.
- Increased incentive-based compensation.
- Which of the following is not an example of employee fraud?
- Skimming
- Larceny
- Kickbacks
- Earnings management
- Which of the following is not a common form of employee fraud?
- Inventory theft
- Expense account fraud
- Payroll fraud
- Refund fraud
- Segregation of duties is a fundamental concept in an effective system of internal controls. Nevertheless, the effectiveness of this control can be compromised through which situation?
- A lack of employee training
- Collusion among employees
- Irregular employee reviews
- The absence of an internal audit function
- The most difficult type of misstatement to discover is fraud that is concealed by:
- Over-recording the transactions
- Nonrecorded transactions
- Recording the transactions in subsidiary records
- Related parties
- The review of amounts charged to the company from a seller that it purchased from is called a:
- Vendor audit
- Seller review
- Collusion
- Customer review
- Which of the following is generally an external computer fraud, rather than an internal computer fraud?
- Spoofing
- Input manipulation
- Program manipulation
- Output manipulation
- Which control activity is intended to serve as a method to confirm the accuracy or completeness of data in the accounting system?
- Authorization
- Segregation of duties
- Security of assets
- Independent checks and reconciliations
- COSO describes five components of internal control. Which of the following terms is best described as “policies and procedures that help ensure management directives are carried out and management objectives are achieved”?
- Risk assessment
- Information and communication
- Control activities
- Control environment
- Proper segregation of functional responsibilities calls for separation of the functions of:
- Authorization, execution, and payment
- Authorization, recording, and custody
- Custody, execution, and reporting
- Authorization, payment, and recording
- AICPA Trust Principles identify five categories of risks and controls. Which category is best described by the statement, “Information process could be inaccurate, incomplete, or not properly authorized”?
- Security
- Availability
- Processing integrity
- Confidentiality
- A company’s cash custody function should be separated from the related cash recordkeeping function in order to:
- Physically safeguard the cash
- Establish accountability for the cash
- Prevent the payment of cash disbursements from cash receipts
- Minimize opportunities for misappropriations of cash
TEST BANK – CHAPTER 3 – MULTIPLE CHOICE
- The chance for fraud or ethical lapses will not be reduced if management:
- Emphasizes ethical behavior
- Models ethical behavior
- Hires ethical employees
- Is unethical
- The Phar-Mor fraud began when management:
- Forgot to change the budgeted figures that had been incorrectly computed.
- Attempted to make the actual net income match the budgeted amounts.
- Overstated their expenses to cover amounts embezzled from the company.
- Understated the revenue in order to reduce the tax payable to the IRS.
- Each of the following companies was involved in fraudulent financial reporting during 2001 and 2002, except:
- Adelphia Communications Corp.
- Microsoft Corporation
- Enron Corp.
- Xerox Corporation
- In addition to ethical practices, management has an obligation to maintain a set of processes and procedures to assure accurate financial reporting and protection of company assets. This obligation arises because:
- Many groups have expectations of management.
- Management has a stewardship obligation to investors.
- Management has an obligation to provide accurate reports to non-investors.
- All of the above are reasons for the obligation.
- The careful and responsible oversight and use of the assets entrusted to management is referred to as:
- Ethics
- Internal Control
- Stewardship
- Confidentiality
- A process, effected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives related to the effectiveness and efficiency of operations, reliability of financial reporting, and compliance with applicable laws and regulations is:
- COSO’s definition of internal control
- AICPA’s definition of stewardship
- ACFE’s definition of confidentiality
- IMA’s definition of competency
- If an organization’s IT systems are not properly controlled, they may become exposed to the risks of:
- Unauthorized access
- Erroneous processing
- Service interruption
- All of the above
- A set of documented guidelines for moral and ethical behavior within an organization is termed a(n):
- Accounting Information System
- Code of Ethics
- Internal Control
- Sarbannes-Oxley
- Which individual or group has the responsibility to establish, enforce, and exemplify the principles of ethical conduct within an organization?
- Board of Directors
- Securities and Exchange Commission
- Management
- Audit Committee
- The theft, concealment, and conversion of personal gain of another’s money, physical assets, or information is termed:
- Defalcation
- Skimming
- Larceny
- Fraud
- An example of concealment would include:
- Changing the payee on a check improperly paid by the organization.
- Selling a piece of inventory that has been stolen
- Stealing money from an organization before the related sale and cash receipt has been recorded.
- All of the above are examples of concealment.
- Changing the accounting records to hide the existence of a fraud is termed:
- Theft
- Conversion
- Collusion
- Concealment
- The definition of fraud includes the theft of:
- Assets
- Money
- Information
- All of the above
- The theft of any item of value is referred to as:
- Fraudulent financial reporting
- Misappropriation of assets
- Misstatement of financial records
- Earnings management
- Financial pressures, market pressures, job-related failures, and addictive behaviors are all examples of which condition of the Fraud Triangle?
- Opportunity
- Conversion
- Incentive
- Rationalization
- Circumstances that provide access to the assets or records that are the objects of the fraudulent activity describes which condition of the Fraud Triangle?
- Rationalization
- Incentive
- Concealment
- Opportunity
- Fraudsters typically try to justify their behavior by telling themselves that they intend to repay the amount stolen or that they believe the organization owes them the amount stolen. This justification is referred to as:
- Opportunity
- Rationalization
- Incentive
- Concealment
- According to the authors of this textbook, which of the following is not one of general categories of people who commit fraud?
- Employees
- Government Agencies
- Customers
- Management
- Which of the following types of fraud is the most common, according to the Association of Certified Fraud Examiners?
- Corruption Schemes
- Asset Misappropriation
- Earnings Management
- Financial Statement Misstatement
- Which of the following is the most common method of detecting occupational fraud?
- Financial Statement Audit
- Management Review
- Internal Audit
- Tip from an employee, customer, or vendor
- The falsification of accounting reports is referred to as:
- Defalcation
- Internal Theft
- Misappropriation of Assets
- Earnings Management
- Management fraud may involve:
- Overstating expenses
- Understating assets
- Overstating revenues
- Overstating liabilities
- Internal controls can be effective in preventing or detecting all of the following types of fraud except:
- Customer Fraud
- Management Fraud
- Vendor Fraud
- Employee Fraud
- Management misstatement of financial statements often occurs in order to receive indirect benefits such as:
- Decreased income taxes
- Delayed cash flows
- Increased stock prices
- Increased dividends
- Management circumvention of systems or internal controls that are in place is termed:
- Management override
- Management collusion
- Management stewardship
- Management manipulations
- The theft of assets by a non-management employee is termed:
- Inventory theft
- Employee fraud
- Expense account fraud
- Skimming
- A situation where the organization’s cash is stolen before it is entered in the accounting records is termed:
- Kickback
- Larceny
- Collusion
- Skimming
- A kickback is an example of which type of fraud?
- Cash Receipts Fraud
- Accounts Payable Fraud
- Accounts Receivable Fraud
- Expense Account Fraud
- An example of Cash receipts fraud would include:
- an employee steals checks collected from customers.
- an employee overstates hours worked on a timecard.
- management understates accounts payable amounts .
- an employee steals checks before being paid to vendors.
- A situation where the organization’s cash is stolen after it is entered in the accounting records is termed:
- Kickback
- Larceny
- Collusion
- Skimming
- A cash payment made by a vendor to an organization’s employee in exchange for a sale to the organization by the vendor is termed:
- Bribery
- Collusion
- Kickback
- Payment Fraud
- When two or more people work together to commit a fraud, it is called:
- Collusion
- Larceny
- Skimming
- Override
- Jamie Stark, a sales employee, stole merchandise from her employer, and Frank Adams, the accounting clerk, covered it up by altering the inventory records. This is an example of:
- Inventory theft
- Financial journal fraud
- Skimming
- Collusion
- The theft of proprietary company information, by digging through the trash of the intended target company is called what?
- Information Manipulation
- Proprietary Reconnaissance
- Industrial Information theft
- Industrial Espionage
- When a customer improperly obtains cash or property from a company, or avoids liability through deception, it is termed:
- Check fraud
- Customer fraud
- Credit card fraud
- Refund fraud
- Examples of customer fraud include all of the following except:
- Credit Card Fraud
- Check Fraud
- Cash Fraud
- Refund Fraud
- Which of the following would be considered a vendor fraud?
- The submission of duplicate or incorrect invoices.
- A customer tries to return stolen goods to collect a cash refund.
- The use of stolen or fraudulent credit cards.
- Inflating hours worked.
- The theft of proprietary company information is called:
- Vendor fraud
- Customer fraud
- Espionage
- Management fraud
- Which of the following is a characteristic of computer fraud?
- A computer is used in some cases to conduct a fraud more quickly and efficiently.
- Computer fraud can be conducted by employees within the organization.
- Computer fraud can be conducted by users outside an organization.
- All of the above are characteristics
- A fraudster uses this to alter a program to slice a small amount from several accounts, crediting those small amounts to the perpetrator’s benefit.
- Trap door alteration
- Salami technique
- Trojan horse program
- Input manipulation
- A small, unauthorized program within a larger legitimate program, used to manipulate the computer system to conduct a fraud is referred to as a(n):
- Trap door alteration
- Salami technique
- Trojan horse program
- Input manipulation
- When a person alters a system’s checks or reports to commit fraud it is referred to as:
- Input manipulation
- Output manipulation
- Program manipulation
- Collusion
- This type of external computer fraud is intended to overwhelm an intended target computer system with so much bogus network traffic so that the system is unable to respond to valid traffic.
- DoS Attack
- Hacking
- Spoofing
- Phishing
- When a person, using a computer system, pretends to be someone else, it is termed:
- DoS Attack
- Hacking
- Spoofing
- Phishing
- Which of the following is NOT one of the three critical actions that a company can undertake to assist with fraud prevention and fraud detection?
- Maintain and enforce a cost of ethics.
- Maintain an accounting information system
- Maintain a system of accounting internal controls
- Maintain a system of information technology controls
- The Sarbanes-Oxley act was passed in 2002 as a Congress’s response to the many situations of fraudulent financial reporting discovered during 2001. The intention of the Act was:
- Police the accounting firms responsible for auditing the corporations.
- Punish the companies that had been involved in the cases of fraudulent financial reporting.
- Establish accounting standards that all companies are to follow.
- Reform accounting, financial reporting, and auditing functions of companies that are publicly traded.
- The types of concepts commonly found in a code of ethics would not include:
- Obeying applicable laws and regulations that govern business.
- Avoiding all conflicts of interest.
- Operating at a profit in all reporting periods.
- Creating and maintaining a safe work environment.
- The objectives of an internal control system include all of the following except:
- Maintain ongoing education
- Safeguard assets
- Maintain accuracy and integrity of accounting data
- Ensure compliance with management directives
- The authors presented their “picture” of internal control as a series of umbrellas which represent different types of controls. Which of the following is not one of those types of controls?
- Prevention
- Investigation
- Detection
- Correction
- This type of control is designed to avoid errors, fraud, or events not authorized by management.
- Prevention
- Judicial
- Detection
- Correction
- This type of control is included in the internal control system because it is not always possible to prevent all frauds. They help employees to discover or uncover errors, fraud, or unauthorized events.
- Investigation
- Judicial
- Detection
- Correction
- Establishing and maintaining a culture where ethical conduct is recognized, valued, and exemplified by all employees can be accomplished by doing all of the following except:
- Obeying applicable laws and regulations that govern business
- Protecting the Environment
- Avoiding some conflicts of interest
- Conducting business in a manner that is honest, fair and trustworthy
- The accounting profession has accepted this report as the standard definition and description of internal control.
- Sarbanes-Oxley Report
- FCPA Report
- ERI Report
- COSO Report
- The COSO report is also known as:
- Fraud Triangle
- Internal Control Integrated Framework
- Code of Ethical Behavior
- Report to the Nation
- All of the following are reasons why it is not possible to eliminate all fraud risks, except
- Human Error
- Human Behavior
- Opportunity
- May not be cost effective
- According to the COSO report, there are five different interrelated components of internal control. Which of the following is not one of those five components?
- Code of Ethics
- Control Environment
- Information and Communication
- Monitoring
- Which of the following statements related to the COSO report is ?
- The COSO report provided the standard definition of internal control accepted be the accounting industry.
- The COSO report is commonly known as the Internal Control Integrated Framework.
- The COSO report has not been updated since it was issued in 1992.
- The COSO report was the result of a comprehensive study of interest control.
- The component of internal control, identified in the COSO report, that sets the tone of an organization and includes the consciousness of its employees is:
- Risk Assessment
- Control Activities
- Control Environment
- Information and Communication
- The control environment component of internal control was identified to have a number of different factors. Which of the following is NOT one of those factors?
- Management’s oversight responsibility, including its philosophy and operating style
- The identification of sources of risk
- The integrity and ethical values of the entity’s people
- The attention and direction provided by the board of directors
- One of the components of internal control identified by COSO required that management must be considering threats and the potential for risks, and stand ready to respond should these events occur. This component is referred to as:
- Control Environment
- Control Activities
- Risk Assessment
- Communication
- The process of risk assessment would include all of the following actions, except:
- Identify sources of risk, both internal and external
- Determine the impacts of identified risks
- Develop and execute an action plan to reduce the impact and probability of identified risks
- Report the risks to the audit committee
- The COSO report identified a component of internal control as the policies and procedures that help ensure that management directives are carried out and that management directives are achieved The component is:
- Control activities
- Risk assessment
- Monitoring
- Information and communication
- The range of actions that make up the component of internal control referred to as control activities includes each of the following, except:
- Segregation of duties
- Risk assessment
- Independent checks and reconciliations
- Authorization of transactions
- The approval or endorsement from a responsible person or department of an organization that has been sanctioned by top management is the process of:
- Securing assets
- Segregating duties
- Authorizing transactions
- Adequate recording
- Which of the following statements is related to the authorization of transactions?
- Every transaction that occurs must be properly authorized in some manner.
- General authorization is the set of guidelines that allows transactions to be completed as long as they fall within established parameters.
- It is not possible, nor is it important, to try to ensure that an organization engage only in transactions that are authorized.
- Specific authorization that explicit approval is needed for that single transaction to be completed.
- The category of control activities referred to as segregation of duties requires that certain activities should be the responsibility of different person or department. The three duties that are to be separated are:
- Authorizing, recording, and paying
- Recording, custody, and disposition
- Authorizing, paying, and custody
- Authorizing, recording, and custody
- If an accounting supervisor were allowed to hire employees, approve the hours worked, prepare the paychecks, and deliver the paychecks, which of the categories of control activities would be violated?
- Adequate records
- Segregation of duties
- Authorization of transactions
- Independent checks
- A good system of internal control includes many types of documentation. Which of the following types of documentation is not part of the adequate records and documents category of internal control?
- Schedules and analyses of financial information
- Supporting document for all significant transactions
- Accounting cycle reports
- All of the following are types of documentation
- The existence of verifiable information about the accuracy of accounting records is called a(n):
- Audit trail
- Internal control
- Risk assessment
- Supporting documentation
- When discussing the security of assets and documents, there are many actions that can be taken. Which of the following would not be related to this category of internal control?
- Securing the assets and records so that they are not misused or stolen.
- Limiting access to certain assets to the extent that is practical.
- Identifying sources of risk and estimating the possibility of that risk.
- Enacting physical safeguards, such as security cameras, to protect some assets.
- Independent checks on the performance of others is one of the categories of internal control. These independent checks would include all of the following, except:
- Reviewing batch totals
- Reconciliation
- Comparison of physical assets with records
- Use of appropriate ID to enter restricted areas
- This activity serves as a method to confirm the accuracy and completeness of data in the accounting system:
- Compensating control
- Independent checks
- Audit trail
- Supporting documentation
- Which of the following was NOT listed as a procedure to accomplish independent checks?
- Recalculation of amounts
- Analysis of reports
- Review of auditing procedures
- Reconciliation
- Which of the following objectives were not identified as necessary to be provided by an effective accounting system?
- Prepare the appropriate documents
- Identify all relevant financial events
- Capture the important data
- Proper recording and processing of the data
- The ongoing review and evaluation of a system of internal control is referred to as:
- Risk assessment
- Monitoring
- Segregating
- Communication
- This level of assurance means that controls achieve a sensible balance of reducing risk when compared with the cost of the control.
- Absolute assurance
- Probable assurance
- Reasonable assurance
- Convincing assurance
- Factors that limit the effectiveness of internal controls include all of the following except:
- Flawed judgment applied in decision making
- Human error
- Controls can be circumvented or ignored
- All of the above are factors that limit the effectiveness of internal controls
- In order to have the segregation of duties recommended by COSO, it would be necessary for a small organization to hire two additional individuals. At this time, there is not enough work for the one office employee to stay busy. The reason for not hiring the additional people would have to do with:
- Human error
- Cost versus benefit
- Collusion
- Authorization
- In response to the need for internal controls above and beyond what was described by COSO, the Information Systems Audit and Control Association developed an extensive framework of IT controls entitled:
- Trust Principles
- Control Objectives for Information Technology (COBIT)
- Control Instrument for Certified Accountants (CICA)
- American Internal Control Practice Association (AICPA)
- The Trust Services Principles document divided the risks and controls in IT into five categories. Which of the following is not one of those categories?
- Certification
- Security
- Processing Integrity
- Confidentiality
- The main risk related to this category of Trust Services Principles is unauthorized access.
- Online privacy
- Confidentiality
- Processing integrity
- Security
- The risk related to this category of Trust Services Principles could be inaccurate, incomplete, or improperly authorized information.
- Online privacy
- Confidentiality
- Processing integrity
- Security
- The risk related to this category of Trust Services Principles is that personal information about customers may be used inappropriately or accessed by those either inside or outside the company.
- Confidentiality
- Online privacy
- Security
- Availability
- The risk related to this category of Trust Principles is system or subsystem failure due to hardware or software problems.
- Availability
- Security
- Integrity
- Confidentiality
TEST BANK – CHAPTER 3 – TRUE /
- When management does not act ethically, fraud is more likely to occur.
- In the Phar-Mor fraud case, management did not write or adopt a code of ethics.
Phar-Mor did write and adopt a code of ethics, but most officers of the organization were not aware that it existed.
- Maintaining high ethics can help prevent fraud but will not help to detect fraud.
Maintaining high ethics can help to detect fraud.
- Due to management’s responsibility to monitor operations by examining reports that summarize the results of operations, it is necessary that the system provide timely and accurate information.
- In order to fulfill the obligations of stewardship and reporting, management has to create a code of ethics.
Management must create AND enforce a code of ethics.
- In most cases, a fraud will include altering accounting records to conceal the fact that a theft has occurred.
- According to the 2010 Report to the Nation by the Association of Certified Fraud Examiners, the estimate of global losses due to fraud would total approximately $650 billion.
The amount is $2.9 Trillion
- The most common method for detecting occupational fraud is a tip – from an employee, a customer, vendor, or anonymous source.
- Small businesses, those having fewer than 100 employees, are less vulnerable to fraud and abuse than are larger businesses.
Small business is more vulnerable to fraud.
- According to the ACFE 2010 Report to the Nation, fraudulent financial statements account for less than 5% of the cases, and were the least costly form of fraud.
Fraudulent financial statements were the most costly form of fraud.
- Defalcation and internal theft are names that refer to the misstatement of financial records.
They are names that refer to the misappropriation of assets.
- The three conditions that make up the fraud triangle are theft, concealment, and conversion.
The three conditions are incentive (pressure), opportunity, and rationalization.
- A good set of internal controls may not be as effective in reducing the chance of management fraud as it would be in reducing the chance of fraud committed by an employee.
- The most effective measure to prevent management fraud is to establish a professional internal audit staff that periodically checks up on management and reports directly to the audit committee of the board of directors.
- Collusion between employees is one of the easiest frauds to detect and prevent.
Collusion is one of the most difficult frauds to detect and prevent.
- Collusion can make it much easier to commit and conceal a fraud or theft, even when proper internal controls are in place.
- Customer fraud is a common problem for companies that sell merchandise online.
- Collusion can occur only when two employees who work for the same firm conspire to circumvent the internal controls to commit fraud or theft.
Collusion can also occur when two employees who work for different firms conspire to circumvent internal controls.
- A vendor audit occurs when a vendor examines the books and records of a customer.
Vendor audits involve the examination of vendor records in support of amounts charged to the company.
- Industrial espionage can occur with or without the use of a computer.
- It is necessary to use a computer to accomplish software piracy.
- A hacker is someone who has gained unauthorized access to the computer and must be someone outside the organization.
A hacker could be someone inside the organization.
- If an organization has the policy of allowing employees to work from home via telecommunications, they could be opening themselves up to an opportunity for a hacker to break-in to their network.
- E-mail spoofing is more of an irritation to an organization that a fraud threat.
- In order for a code of ethics to reduce opportunities for managers and employees to commit fraud, it is necessary that management emphasizes this code. Punishment related to violations of the code are not necessary.
The punishment of violators is necessary.
- It is not always possible to avoid all mistakes and frauds because there will always be human error, human nature, and it is not always cost-effective to close all the holes.
- The risk assessment is the foundation for all other components of internal control and provides the discipline and structure of all other components.
The description above applies to the control environment
- Companies that reward management with incentives to achieve a growth in earnings is running the risk that management will also have more motivation and pressure to falsify the financial statements to show the higher amounts.
- The tone at the top of the organization tends to flow through the entire organization and affects behavior at all levels.
- A poor control environment can be overcome if the remaining components of internal control are strong.
If the control environment is week, it is likely to be the cause of errors and irregularities occurring in an organization, regardless of the strength of the other components.
- The difference between a general authorization and a specific authorization is that with a general authorization, a transaction is allowed if it falls within specified parameters, whereas with a specific authorization, explicit authorization is needed for that singe transaction to be completed.
- When safeguarding assets, there is no trade-off between access and efficiency.
There is a trade-off. The more limited the access, the less efficient is operations.
- Independent checks can serve as a preventive control in that they uncover problems in the data or the processing.
The description has to do with detective controls, not preventive.
- Feedback needed by management to assess, manage, and control the efficiency and effectiveness of the operations of an organization relates to both financial and operational information.
- A sophisticated accounting system will provide the necessary accurate and effective feedback needed by management to assess, manage and control the operations of an organization.
Sophisticated is not the proper “adjective” – effective should be used.
- Auditing, a monitoring activity, takes place only on a periodic basis.
Auditing takes place on both a continuing basis and on a periodic basis.
- It is not possible to have an internal control system that will provide absolute assurance.
- Computer systems increase the efficiency and effectiveness of an organization but also increase their vulnerability.
- The risks related to computerized systems are adequately covered by the COS internal control report.
The extra risks require that internal controls related to the computer system go beyond those stated in COSO.
- The acronym COBIT stands for Control Objectives for Information Technology, an extensive framework of information technology controls developed by Information Systems Audit and Control Association.
- The AICPA and the Canadian Institute of Chartered Accountants worked together to develop IT guidelines, commonly referred to as COBIT.
The guidelines created were referred to as Trust Service Principles
- The risk related to confidentiality category of Trust Principles is that confidential information about the company or its business partners may be subject to unauthorized access during its transmission or storage in the IT system.
In order for a fraud to be perpetrated, three conditions must exist. List and define the three conditions.
- SO 3 Management Fraud
Explain the term management fraud and outline specific examples of management fraud and the
- SO 5 Customer fraud
Explain and outline specific examples of customer fraud
Customer fraud occurs when a customer improperly obtains cash or property from a company, or avoids a liability through deception. Credit card fraud and check fraud involve the customer’s use of stolen or fraudulent credit cards and checks. Refund fraud occurs when a customer tries to return stolen goods to collect a cash refund.
- SO 6 Vendor Fraud
Explain and outline specific examples of vendor fraud
- SO 7 Computer Fraud
Explain and outline specific examples of computer fraud
- SO 11 Risk and controls in IT Systems
Risk and controls in IT are divided into five categories in the Trust Services Principles. Match the risk below with corresponding definition of that risk:
- SO 11 Risk and controls in IT Systems
Risk and controls in IT are divided into five categories in the Trust Services Principles. Match the risk below with corresponding definition of that risk:
Document Information
Connected Book
Accounting Info Systems Controls 3e Complete Test Bank
By Leslie Turner