ACCT 432 ch. 13

Ace your homework & exams now with Quizwiz!

Chain of Custody

A ____ provides a record on who handles the data and how collected electronic data is handled during an investigation

SWAP

A _____file is a virtual extension of RAM and thus acts as if a computer has more active computer storage than is really necessary

No. 31

AICPA Statement on Auditing Standards (SAS) No. _____ states that an auditor should perform a test of system controls to show they are strong enough to mitigate the risks inherent in electronic audit evidence.

Timestamp

It is relatively easy to change the ________ information associated with a file on your computer.

Continually investigate the changing cycle of cyberattacks that are being launched and make sure their network is secure

One important step managers can take to deter cybercrime attacks against their organization is to: 1. have a statement on their websites to let hackers know that any attacks will be immediate 2. Hire former hackers to prevent attackers from accessing their networks 3. continually investigate the changing cycle of cyber attacks that are being launched and make sure their network is secure 4. Maintain relationships with Cyber Crime Patrol (CCP) to ensure that CCP personnel

Are mobile

One of the biggest changes in recent years regarding a company's digital assets is that they: 1. can be stolen easily 2. are unidentifiable 3. are mobile 4. decay if not used regularly

Both b and c

Software programs, such as Encase, are used to investigate: 1. transactions 2. metadata 3. e-evidence 4. both b and c

Transactions

Software programs, such as IDEA, are largely used to investigate: 1. transactions 2. metadata 3. e-evidence 4. both b and c

E&Y

The "clueless auditor" in the textbook case was from which firm: 1. BDO 2. KPMG 3. E&Y 4. B&W

PCAOB

The _____ Board was created by Sarbanes-Oxley Act

COSO or Committee of Sponsoring Organizations of the Treadway Commission.

The _____ framework has been identified by the SEC as the best model for internal control practices.

COBIT

The ______ guidelines expand the general guidelines found in the COSO requirements (recommended by the SEC) and provide a specific framework for evaluation and reducing high technology fraud risks present in a networked environment.

Link

The underlaying assumption in _______ analysis is there are some fundamental correlations or associations between items in a database.

False

True or False: Auditors and forensic accountants have the same accounting objectives toward preventing financial fraud

True

True or False: Company managers have more responsibility for preventing cybercrime than do the company's auditors.

False

True or False: Copying digital evidence allows more forensics investigators to analyze the data.

False

True or False: Identifying cybersecurity risks is a top priority in an audit engagement

True

True or False: Imaging is a noninvasive step in the collection of e-evidence.

False

True or False: Paper evidence is more likely to vanish than is digital evidence

False

True or False: SSDs are making it easier for forensic investigators to collect e-evidence from these drives

False

True or False: SSDs still need to use mechanical drive arms to record data

True

True or False: Solid State Drives are beginning to replace traditional mechanical hard drives in PCs.

False

True or False: replicating security measures among similar businesses/companies creates a stronger security shield against cyberattacks.

False

True or False: the information in RAM cannot be captured

True

True or false: solid state drives are similar to regular chips but with more maintenance features

IDEA

Which is not an imaging software tool that collects digital data without affecting data integrity? 1. encase 2. safeback 3. Ontrack's Easy Recovery 4. IDEA 5. All of the above do not affect data integrity

Fraud Detection

Which is not one of the general information technology eight guidelines under the COSO framework? 1. internal control environment 2. risk assessment 3. fraud detection 4. control activities 5. all of the above are guidelines under the framework

Internal Auditors

Which of the following groups is more concerned about cybercrime attacks against a company? 1. external auditors 2. internal auditors 3. cost accountants 4. tax accountants

MD6

Which of the following is not a hash algorithm? 1. SHA1 2. MD5 3. MD6 4. SHA2

Due to a cyberattack, there may be a material misstatement in the financial reports

Which of the following would be the best example to make an auditor become concerned about cybercrime or a cybersecurity risk: 1. the company's website has been defaced. 2. it is clear that the company has not implemented proper security measures to prevent 3. Due to a cyberattack, there may be a material misstatement in the financial reports. 4. the company's network has been hacked

Sarbanes-Oxley

________Act makes management directly responsible for the integrity of a company's financial statements.

Sequence

_________analysis might uncover large purchases on a credit card shortly after a small purchase was made


Related study sets

SIE Practice Exam #1 (score: 84%)

View Set

Pediatric Exam 2: School Age Child/Adolescent Developmental Notes, Acute Pediatric Illnesses Notes: Respiratory, Cardiac, GI, GU

View Set

Anatomy Week #3: Upper Limb II - Forearm, Wrist Joint & Hand

View Set

Bio172 TopHat Questions Section 2

View Set