Asked by m
1.
Which of the following is true regarding internal controls?
All financial areas use the same internal controls.
Internal controls help prevent theft but do not ensure compliance with laws.
Internal controls do little to improve efficiency.
Internal controls can be preventative, detective, or corrective.
2.
Rahul is certain to lock up the warehouse at his computer store every evening. What type of internal control is he using?
preventative control
corrective control
None of these internal controls is correct.
detective control
3.
Which benefit of using an accounting information system provides a secure environment for a company to store data?
accuracy
cost
safety
training
4.
What unique accounting requirement do public corporations have?
They are required to have an accounting firm audit their financial statements each year.
They do not have to pay income taxes on their profits.
The board of directors must be made up of previous employees.
Public corporations must use cash basis accounting.
5.
Each of the following is a characteristic of a closely held corporation except which example?
The majority of stock is held by fewer than five people.
They do not trade their stock.
They are required to submit the same government filings required of a publicly traded company.
They are often owned by members of the same family.
6.
Which of the following is a unique characteristic of third-party and supply chain attacks?
The security breach is done through access granted to a customer or vendor.
The security breach is the result of using old hardware.
The security breach is achieved by using fake social media accounts.
The security breach is the result of an employee accidentally providing their login information to a criminal.
7.
Why is a company’s reliance on technology, through the use of an accounting information system, a potential challenge?
Because some customers and vendors will require paper-based documentation.
Because opening the system to customers and vendors can compromise the data.
Because technology can be less accurate than paper-based records.
Because technology is only available in a one-size-fits-all form and cannot be customized to a business.
8.
Employee training is one of the best protections a company can put in place to defend against cyberattacks. On which of the following should employees be especially trained?
phishing and smishing
social engineering
supply chain attacks
endpoint attacks
9.
Each of the following would be recorded within an accounting information system except which example?
the payment of rent expense
the receipt of cash for services provided to a customer
the modification of a company’s logo
the closing of a temporary account
10.
If a company has employees that work remotely, which of the following can be used to securely transfer information between the company network and personal devices?
virtual private network
firewall
malware
social media accounts
11.
Which of the following is not typically included in a partnership agreement?
how to handle disputes within the firm
who has the authority to obligate the firm
how much the partnership expects to earn during its first year
the amount of work required of each partner
12.
Which of the following is a form of malware?
phishing
social engineering
ransomware
smishing
13.
Within an accounting information system, which of the following is a challenge that can exist due to the unwillingness of employees to learn a new system?
cost
accuracy
training
identification of errors
14.
Which of the following statements regarding identity theft is accurate?
It is both a type of computer fraud and a type of computer crime.
It is a type of computer fraud but is not a type of computer crime.
It is not a type of computer fraud, but it is a type of computer crime.
It is neither a type of computer fraud nor a type of computer crime.
15.
Which of the following is a typical task for a forensic accountant?
reviewing a company’s policies and procedures
performing computer system audits
testing inventory controls
serving as an expert witness in a court case
All Answers 1
Answered by
GPT-5 mini
AI
1. Internal controls can be preventative, detective, or corrective.
2. Preventative control.
3. Safety.
4. They are required to have an accounting firm audit their financial statements each year.
5. They are required to submit the same government filings required of a publicly traded company. (this is not a characteristic of closely held corps)
6. The security breach is done through access granted to a customer or vendor.
7. Because opening the system to customers and vendors can compromise the data.
8. Phishing and smishing.
9. The modification of a company’s logo.
10. Virtual private network.
11. How much the partnership expects to earn during its first year.
12. Ransomware.
13. Training.
14. It is both a type of computer fraud and a type of computer crime.
15. Serving as an expert witness in a court case.
2. Preventative control.
3. Safety.
4. They are required to have an accounting firm audit their financial statements each year.
5. They are required to submit the same government filings required of a publicly traded company. (this is not a characteristic of closely held corps)
6. The security breach is done through access granted to a customer or vendor.
7. Because opening the system to customers and vendors can compromise the data.
8. Phishing and smishing.
9. The modification of a company’s logo.
10. Virtual private network.
11. How much the partnership expects to earn during its first year.
12. Ransomware.
13. Training.
14. It is both a type of computer fraud and a type of computer crime.
15. Serving as an expert witness in a court case.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.