Question

Which of the following is NOT a control over the risk of unauthorized inventory purchases? a....

Which of the following is NOT a control over the risk of unauthorized inventory purchases?

a. Transaction authorization

b. Automated purchase approval

c. Scanner technology

d. All of the above are controls over the risk of unauthorized inventory purchases.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution:

Scanner technology is NOT a control over the risk of unauthorized inventory purchases.

Hence option c is correct.

Add a comment
Know the answer?
Add Answer to:
Which of the following is NOT a control over the risk of unauthorized inventory purchases? a....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 5. Which of the following control procedures is designed to reduce the risk of check altera-tion...

    5. Which of the following control procedures is designed to reduce the risk of check altera-tion fraud? a. ACH blocks on accounts not used for payments b. Use of dedicated computer and browser for online banking c. Establishing “Positive Pay” arrangements with banks d. Access controls for EFT terminals e. Prenumbering all checks 6. Which of the following control procedures is designed to reduce the risk of theft of inventory? a. Restriction of physical access to inventory b. Periodic physical...

  • 24. Given the risk that a receiving clerk might steal inventory when it arrives, which control...

    24. Given the risk that a receiving clerk might steal inventory when it arrives, which control would best alleviate that risk? a. Appropriately maintained standing data b. Cancelling documents c. Proper authorization d. Video surveillance equipment e. Pre-numbered documents

  • 1. Which of the following is not a control that is designed to protect investment securities?...

    1. Which of the following is not a control that is designed to protect investment securities? a. custody over securities should be limited to individuals who have record-keeping responsibility over the securities b. securities should be properly controlled physically in order to prevent unauthorized usage c. access to securities should be vested in more than one individual d. securities should be registered in the name of the owner 2. A control that involves reprocessing transactions that are rejected during initial...

  • MULTIPLE CHOICE QUESTIONS! 1)In obtaining an understanding of an entity's internal control relevant to audit planning,...

    MULTIPLE CHOICE QUESTIONS! 1)In obtaining an understanding of an entity's internal control relevant to audit planning, an auditor is required to obtain knowledge about the a) Controls related to each principal transaction class and account balance. b) Consistency with which controls are currently being applied. c) Effectiveness of controls that have been implemented. d) Design of the controls pertaining to internal control components. 2) In a good system of segregation of duties, which of the following duties should be segregated?...

  • 1. The programmed verification of a customer number is a ____ control. a. preventive    b....

    1. The programmed verification of a customer number is a ____ control. a. preventive    b. detective c. corrective d. application 2. In general, material irregularities perpetrated by which of the following are most difficult to detect? a. cashier b. key-punch operator c. internal auditor d. controller 3. Which of the following is least likely to be evidence the auditor examines to determine whether operations are in compliance with the internal control systems? a. records documenting usage of EDP programs...

  • 1. Consider the following statements:        I. Per COSO, Control Activities are the policies and procedures...

    1. Consider the following statements:        I. Per COSO, Control Activities are the policies and procedures that help insure that management’s          directives are carried out.       II. A Reliance Strategy is used when control risk is considered High.       a. I is true; II is true       b. I is true;   II is false       c. I is false; II is true       d. I is false; II is false 2. Management's attitude toward aggressive financial reporting and its...

  • 3. Which of the following is NOT considered an overview aspect of risk management? 2. Know...

    3. Which of the following is NOT considered an overview aspect of risk management? 2. Know yourself identify, examine, and understand the information and systems currently in place b. Know the enemy identify examine, and understand threats facing the organization c. Responsibility of each community of interest within an organization to manage risks that are encountered d. All of the above are considered to be an overview aspect of risk management 4. Communities of interest are responsible for which of...

  • Which of the following should an auditor do when control risk is assessed at the maximum...

    Which of the following should an auditor do when control risk is assessed at the maximum level? Multiple Choice A. Document the control structure more extensively. B. Perform fewer substantive tests of details. C. Document the assessment. D. Perform more tests of controls.

  • Internal controls can be categorized using the following framework: 1. Control environment 2. Risk assessment 3....

    Internal controls can be categorized using the following framework: 1. Control environment 2. Risk assessment 3. Information and communication 4. Control activities 4.1. Authorization 4.2. Performance reviews 4.3. Information-processing controls 4.3.1. IT general controls 4.3.2. IT application controls 4.3.3. IT-dependent manual controls 4.4 Physical controls 4.5 Segregation of duties 5. Monitoring Following is a list of controls implemented by Waterfront, Inc. a. Management established a code of conduct that includes rules regarding conflicts of interest for purchasing agents. b. Waterfront's...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT