ACC 576 TUTOR Learn by Doing/acc576tutor.com ACC 576 TUTOR Learn by Doing/acc576tutor.com | Page 27
11. Maintenance of the backup files is an example of
12. Review of the audit (also called transaction) log is an example of
which of the following types of security control?
13. Which of the following statements presents an example of a
general control for a computerized system?
14. Controls in the information technology area are classified into the
categories of preventive, detective, and corrective. Which of the
following is a preventive control?
15. A company's new time clock process requires hourly employees to
select an identification number and then choose the clock-in or clockout button. A video camera captures an image of the employee using
the system. Which of the following exposures can the new system be
expected to change the least?
16. Which of the following is an example of a detective control?
17. In the COSO "cube" model, each of the following is a control
objective except
18. In the COSO "cube" model, this component of internal control
enables an organization's people to identify, process, and exchange the
information needed to manage and control operations.
19. This component of internal control c oncerns the policies and
procedures that ensure that actions are taken to address the risks
related to the achievement of management's objectives.
20. This fundamental component of internal control is the core or
foundation of any system of internal control.
21. This component of internal control concerns testing the system
and its data.