Question
A collection of related characters that comprise an attribute such as a customer number or name is known as a a. Character b. Field c.
A collection of related characters that comprise an attribute such as a customer number or name is known as a a. Character b. Field c. Record d. Table
The general term for software that connects third-party modules to ERP systems is known as a. DreamWeaver b. Middleware c. Microsoft d. NetWeaver
A manager of a manufacturing plant alters production reports to provide the corporate office with an inflated perception of the plant's cost effectiveness in an effort to keep the inefficient plant from being closed. This action would be classified as a(n): a. risk b. hazard c. fraud d. exposure
The ERM framework addresses four categories of management objectives. Which category addresses the reliability of the financial statements? a. compliance b. operations c. reporting d. strategic
Which component of the ERM framework is best described here: Internal and external events affecting achievement of an entity's objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management's strategy or objectivesetting processes. a. control activities b. event identification c. risk assessment d. risk response
This component of the ERM framework that encompasses the tone of an organization and sets the basis for how risk is viewed and addressed by an entity's people, including risk management philosophy and risk appetite, integrity and ethical values and the environment in which they operate. a. control activities b. internal environment c. risk assessment d. risk response
Approvals, authorizations, verifications, reconciliations, reviews of operating performance, security procedures, supervision, audit trails, and segregation of duties are examples of: a. control activities b. event identification c. monitoring d. risk response
The major reasons for exercising control of the organization's business processes include: a. to provide reasonable assurance that the goals of the business are being achieved b. to mitigate risks of fraud and other intentional and unintentional acts c. to provide reasonable assurance that the company is in compliance with applicable legal and regulatory obligations d. all of the above
This framework was issued in 1996 (and updated in 2007) by the Information Systems Audit and Control Association (ISACA) because of the influence of IT over information systems, financial reporting and auditing. a. COBIT b. COSO c. ERM d. All of the above.
____ are the policies and procedures that help ensure that the risk responses are effectively carried out. a. Control environment b. Risk assessment c. Control activities d. Monitoring
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started