Which of the following procedures would be most effective in detecting fraud in
electronically-submitted claims to insurance companies?
According to the International Professional Practices Framework, which of the following are allowable activities for an internal auditor?
1. Advocating the establishment of a risk management function.
2. Identifying and evaluating significant risk exposures during audit engagements.
3. Developing a risk response for the organization if there is no chief risk officer.
4. Benchmarking risk management activities with other organizations.
5. Documenting risk mitigation strategies and techniques.
A charitable organization provides substantial grants for important medical research.
Assuming marginal controls are in place, which of the following possible frauds or misuses of organization assets should be considered the area of greatest risk?
In addition to data protection,which of the following is a control that is typically used by companies to safeguard the privacy rights of their customers?
I.End-user computing. II.Encryption of data. III.Spyware. IV.Intrusion detection.