____ Which of the following is not a document that is part of the cash collection process? A. Remittance advice B. Cash receipts journal C. Bank deposit slip D. Packing slip ____ Pre-numbering of source documents helps to verify that a) all transactions have been recorded since the numerical sequence serves as a control. b) no inventory has been misplaced. c) documents have been used in order. d) all cash has been collected. ____ Which control activity is intended to serve as a method to confirm the accuracy or completeness of data in the accounting system? A. authorization B. segregation of duties C. security of assets D. independent checks and reconciliations ____ When a company sells items over the Internet, there are many IT risks. The risk of hardware and software failures that prevent website sales would be a(n): A. Availability risk. B. Processing integrity risk. C. Security risk. D. Confidentiality risk. ____ The most difficult type of misstatement to discover is fraud that is concealed by: A. Over-recording the transactions B. Non-recorded transactions C. Recording the transactions in subsidiary records D. Related parties ____ Which of the following is not a condition in the fraud triangle? A. rationalization B. incentive. C. conversion D. opportunity. ____ According to the COSO report, there are five different interrelated components of internal control. Which of the following is not one of those five components? A. Code of Ethics B. Control Environment C Information and Communication D. Monitoring ____ The process of user identification to ensure that only authorized users are accessing the IT system, which occurs through the use of user ID, password, and other unique identifiers, is called: A. Processing Integrity B. Virtualization C. Availability D. Authentication