Internal auditors want to increase the likelihood of identifying very small control and transaction anomalies in their testing that could potentially be exploited to cause material breaches. Which of the following techniques would best meet this objective?
A. Analysis of the full population of existing data.
B. Verification of the completeness and integrity of existing data.
C. Continuous monitoring on a repetitive basis.
D. Analysis of the databases of partners, such as suppliers.
An organization accomplishes its goal to obtain a 40 percent share of the domestic market, but is unable to get the desired return on Investment and output per hour of labor. Based on this information, the organization is most likely focused on which of the following?
A. Capital investment and not marketing
B. Marketing and not capital investment
C. Efficiency and not input economy
D. Effectiveness and not efficiency
A retail organization mistakenly did have include $10,000 of Inventory in the physical count at the end of the year. What was the impact to the organization's financial statements?
A. Cost of sales and net income are understated.
B. Cost of sales and net income are overstated.
C. Cost of sales is understated and not income is overstated.
D. Cost of sales is overstated and net Income is understated.
Which of the following is a characteristic of using a hierarchical control structure?
A. Less use of policies and procedures.
B. Less organizational commitment by employees.
C. Less emphasis on extrinsic rewards.
D. Less employee’s turnover.
Which of the following is an effective preventive control for data center security?
A. Motion detectors.
B. Key card access to the facility.
C. Security cameras.
D. Monitoring access to data center workstations
Page 1 out of 6 Pages |