Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Match each threat in the first column to an appropriate control procedure in the second column. Choose the most relevant control for each threat. Only
Match each threat in the first column to an appropriate control procedure in the second column. Choose the most relevant control for each threat. Only one control for each threat is allowed. Threat Control Procedures 1) Sending incorrect merchandise a) File invoice by due date 2) Crediting customer payment to wrong b) Credit sales approved by credit manager account 3) Giving goods away for free c) Reconcile sales orders to packing slips d) Periodically review lists of approved vendors 4) Sales made to customers with poor credit for unapproved changes 5) Data entry errors by warehouse staff e) Use bar-code scanners 6) Theft of customer payments f) Document inventory transfers 7) Fire damage to computer centre regate shipping and billing functions 8) Inventory shrinkage due to theft by staff site data storage of backup files 9) Failing to take advantage of purchase discounts i) Closed-loop verification 10) Purchasing goods from unauthorised suppliers j) Install a surveillance CCTV system
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started