Describe an internal control that would prevent an employee from removing a computer and then reporting it as scrapped.
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: PREVENTIVE CONTROLS : 1. IF THERE IS ANY INFORMATION ABOUT THE COMPANY'S CUSTOMERS THAT COULD…
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: The internal control is a process of assuring that all the assets are safe and all the recorded…
Q: As the client support supervisor for FarFar construction, you noticed that some site workers are…
A: The above scenario is called as buddy punching and is a common type of fraud that exists in the…
Q: Which of the following is NOT an example of application control?* a. Pre-filled forms are already…
A: Control Activities - The policies, tactics, methods, and processes known as control activities are…
Q: What is the purpose of installing firewalls on bridges, routers, and gateways? O Detecting…
A: Solution: Firewalls provide protection against hacking by protecting your computer or network from…
Q: 1. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be…
A: Introduction: Internal controls are policies and procedures framed by companies to ensure that the…
Q: Describe an internal control that would prevent the acquisition of office equipment that the firm…
A: Internal controls is a mechanism in which it is assured that objectives of the organisation are…
Q: Passwords for microcomputer software programs are designed to prevent: A. Inaccurate processing of…
A: Passwords are alphanumeric code that required to enter into a program of computer or files.
Q: What is the purpose of the following control procedures (i.e., what threats is it designed to…
A: • The purpose of scanning the fingerprint of each employee in an organization is used to collect…
Q: How audit programs that need to be made to detect vulnerabilities in the firewall?
A: Auditing for security is very important and requires frequent and strict auditing that covers…
Q: Your organisation is disturbed that some staff members are clocking on for others who do not report…
A: Accounting Information System: AIS collects, records, stores and processes accounting and other data…
Q: Determine whether each procedure described below is an internal control strength or weakness; then…
A: Weakness or strength along with IC Principle :- 1 Weakness - Apply technological controls 2 Weakness…
Q: Listed here are four scenarios. For each scenario, discuss the potential consequences and give a…
A:
Q: What internal control or procedure(s) would provide protection against the following threats? A…
A:
Q: Listed here are five scenarios. For each scenario, discuss the possible damages that can occur.…
A: Note: Since you have posted a question with multiple sub-parts, we will solve the first three…
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: (e) The company should apply a preventive and detective control mechanism to remove internal control…
Q: Which of the following would reduce the effectiveness of internal control in an…
A: Internal auditing is a mechanism for ensuring organizational performance and quality goals, a…
Q: Which of the following procedures would an entity most likely include in its disaster recovery plan?…
A: The requirement is to identify the most likely procedure to be included in a disaster recovery plan…
Q: Provide information whether depending on the integrity of company employees are the most effective…
A:
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: A criminal remotely accessed a sensitive database using the authentication credentials (user ID…
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: Internal Controls The Internal controls are written procedures that are introduced to ensure that…
Q: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses…
A:
Q: The ABC Company is switching from its legacy centralized system to a fully distributed system. Under…
A: The IT functions are divided into small units that are allocated to various end users and put under…
Q: In an automated payroll processing environment, a department manager substituted the time card for a…
A: Internal Controls: Internal controls are the controls established within an organization to check…
Q: Controls used in the management of a computer center to minimize the possibility of using an…
A: Auditing is the process by which assertions made by management about financial transactions of a…
Q: Computer Internal Control Questionnaire Evaluation. Assume that, when conductingprocedures to obtain…
A:
Q: The purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b.…
A: The purpose of a checkpoint procedure is to facilitate restarting after data processing errors.
Q: What tests may be conducted for identifying unauthorized program changes?
A:
Q: Which of the following is NOT a general control?* a. Backup of live data b. Use of passwords c.…
A: For data protection and IT security, various types of internal controls is implemented by the…
Q: How can an organisation use their information system to prevent employees from making inappropriate…
A: Here discuss about the details about find out of the fraudulent purchases which are related with the…
Q: 1. _____ are controls that do not rely on the client's information technology (IT) environment for…
A: Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: Which of the following is NOT a data communications control objective?a. maintaining the critical…
A:
Q: Keeping supplies in a locked room with access allowed only to authorize personal is an example of…
A: Introduction: Internal controls: Certain internal controls are used to eliminate the frauds in the…
Q: What are the computer ethical issues regarding misuse of computers?
A: Ethics is an internal mechanism of an individual which can be applied to various situations to…
Q: The management of an organisation with a remote workforce is concerned that employees are clocking…
A: Definition: Internal control: Internal control involves the norms and rules which is followed by…
Q: Why is it risky to allow programmers to create user subschemas and assign access authority to users?…
A:
Q: Controls over data management systems fall into two categories: access controls and backup controls.…
A: Data Management System: It is a software program that is used to create, modify, retrieve, and…
Q: In the event of payroll fraud, discuss the suggestion that the human elements of control systems are…
A: Employee payroll fraud is a complex problem for small company owners in the United States. The…
Q: The capability for computers to communicate with physically remote terminals is an important feature…
A: Answer is A
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: The preventive controls made the management follow up procedures that protect the control system…
Q: An employee in the receiving department keyed in a shipment from a remote terminal and inadvertently…
A: System Control: System control can be defined as a set of procedures used for controlling and…
Q: rom home, an employee installed a modem on his office workstation. An attacker successfully…
A: Internal ControlsThe Internal controls are written procedures which are introduced to ensure that…
Q: General Controls. Indicate the benefits of each of the following examples of general controls. a.…
A: a) Echo checks are designed and built in to the computer by the manufacturer. This enables the…
Describe an internal control that would prevent an employee from removing a computer and then reporting it as scrapped.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.In auditing program change control, the IT auditor will: a. Not need to inspect program authorization forms for signatures b. Ensure an organization is following the process described in their documentation for program change control c. Make sure that only computer programmers move their own changes into a production environment d. Make sure that only computer programmers have tested the changes they made to programs
- The IT Audit Director is responsible for monitoring and approving network-related changes to the company's production network. This is an appropriately designed preventive control. a) True b) FalseWhich of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.As the client support supervisor for FarFar construction, you noticed that some site workers are clocking on for friends who are not present. Discuss controls you could implement to address this concern.
- Assumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.When is more frequent monitoring of internal controls not required?* When employees are poorly trained. When the control activity and risk being managed are important. When a department is making changes to an application being used in that department. When internal controls have recently been changed to reduce the frequency of errors.General Controls. Indicate the benefits of each of the following examples of general controls. a. Echo checks are designed and built into the computer by the manufacturer.b. The company schedules regular maintenance on its computer hardware.c. The company involves users in its design of programs and selection of prepackaged software and programs.d. New programs are tested and validated prior to being implemented.e. Documentation is required prior to modifying existing programs using “emergency”change orders.f. The duties of system analysts, programmers, and computer operators are appropriatelyseparated.g. Appropriate backup and data retention policies are implemented.h. The access rights granted to employees are periodically reviewed and evaluated, giving consideration to known changes resulting from promotions and transfers within the company.
- Given the information below, Marco only issues accounts and passwords to employees with jobs requiring computer data entry or access to file information and reports. Passwords are required to enter the system. Access is limited such that employees only have access to the information they need to perform their duties. Access is also limited in nature such that some employees who do not have the authority to enter data have read-only access while those whose jobs require data entry have both read and write access. Normal access to the files takes place via the software, which subjects any input to various logical and numerical tests. What is the: a) potential control strength and (b) potential mistatement detected or corrected.Which of the following is NOT an example of application control?* a. Pre-filled forms are already sent to users to minimize input errors b. After processing, the daily sales summary are reconciled with the individual sales invoices processed c. Reasonableness tests on acceptable working hours are embedded in the payroll software d. An equipment failure causes an error message on the monitorExplain how internal control can be enhanced through the proper installation of Information Technology Identify the risks for accounting systems that rely heavily on IT functions. Distinguish between general controls and application controls and give examples at least five Which duties should be segregated in a computer department? Describe the typical duties of computer personnel. What aspects of documentation, file security and retention control procedures are unique to computer systems? What are the responsibilities of the database administrator (DBA) function? Compare the risks associated with network environment to those associated with centralized IT functions.