The most effective internal control procedure to prevent or detect the creation of fictitious credit memoranda for sales returns is to
A. supervise the accounts receivable department
B. limit access to credit memoranda
C. prenumber and sequence check all credit memoranda
D. require management approval for all credit memoranda
Answer: D
You might also like to view...
Match each term with the correct statement below.
A. The most common form of joint review activity B. Should drive the execution of the security function throughout the conventional lifecycle of the development and maintenance process. C. The evaluation of the likelihood and impact of a given threat D. Include both the functional requirements for security as well as the security properties that the applications and systems should possess E. Allows the producer and the customer to reach a common understanding concerning the security status and progress of an ongoing project F. The purpose is to conceptualize and communicate the precise structure of the product G. Rational control of change based on a formal process H. Uses a team approach to define, design, and evaluate work products I. The set of formal processes used to ensure confidence in software and systems
A _________ in an intermediary that provides connectivity and transport of cloud services from CP’s to cloud consumers.
Fill in the blank(s) with the appropriate word(s).
Which of the following cannot be seen in the documents properties screen?
A) Statistics about the presentation B) File size C) Author's name D) Themes chosen
A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.
A. low B. normal C. moderate D. high