Question

A company hires an audit program design firm to create a continuous auditing program for their...

  1. A company hires an audit program design firm to create a continuous auditing program for their company. After six months the project is behind schedule and is costing more than expected. This is an example of:
  1. Selection risk
  2. Development/acquisition and deployment risk
  3. Availability risk
  4. Hardware/software risk
  1. A manager of an investment fund reports annual fund performance as higher than actual returns, so that he can obtain new investors. This action would be classified as a(n):
  1. Risk
  2. Hazard
  3. Fraud
  4. Exposure
  1. This logs and monitors who is on or trying to access an organization’s network
  1. Biometrics
  2. Electronic vaulting
  3. Intrusion detection systems (IDS)
  4. Firewall
  1. A hurricane destroys a building containing backup computer systems. This is an example of
  1. Selection risk
  2. Development/acquisition and deployment risk
  3. Availability risk
  4. Hardware/software risk
  1. A manager in the sales department of a company buys software to handle job costing, but the program cannot handle some of the custom order features of the products they sell. This is an example of:
  1. Selection risk
  2. Development/aquistion and deployment risk
  3. Availability risk
  4. Hardware/software risk
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.

A company hires an audit program design firm to create a continuous auditing program for their company. After six months the project is behind schedule and is costing more than expected. This is an example of:

(b) Development/acquisition and deployment risk.

2.

A manager of an investment fund reports annual fund performance as higher than actual returns so that he can obtain new investors. This action would be classified as a:

(c) fraud

3.

This logs and monitors who is on or trying to access an organization’s network is:

(c) Intrusion detection systems (IDS)

4.

A hurricane destroys a building containing backup computer systems. This is an example of:

(d) Hardware/software risk

5.

A manager in the sales department of a company buys software to handle job costing, but the program cannot handle some of the custom order features of the products they sell. This is an example of:

(a) Selection risk

Add a comment
Know the answer?
Add Answer to:
A company hires an audit program design firm to create a continuous auditing program for their...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Case 2: Going to The X-Stream Gil Reihana is the chief executive officer of X-Stream, an...

    Case 2: Going to The X-Stream Gil Reihana is the chief executive officer of X-Stream, an Auckland-based company that assembles personal computers for the New Zealand and Australian markets, and sells them through a number of chain stores and independent retailers. He started the company six years ago, at the age of 25, after graduating from university with a Bachelor’s degree in Information Technology and Management. To establish the company, Reihana invested $300 000 he had inherited and persuaded various...

  • The administration of President Barack Obama has made Patient Protection and Affordable Care Act, often called...

    The administration of President Barack Obama has made Patient Protection and Affordable Care Act, often called “Obamacare”, its chief domestic accomplishment and the centerpiece of Obama’s legacy. Essential to Obama’s health care reform plan is Healthcare.gov, a health insurance exchange Web site that facilitates the sale of private health insurance plans to U.S. residents, assists people eligible to sign up for Medicaid, and has a separate marketplace for small businesses. The site allows users to compare prices on health insurance...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT