【多选题】
过度依赖风险和误受风险都是将错误判断为正确的风险,此类风险不与___
A. 审计效果相关
B. 审计效率相关
C. 审计结论相关
D. 审计报告相关
E. 审计证据相关
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
BCDE
解析
暂无解析
相关试题
【多选题】
下列属于库存材料审查内容的是___
A. 要求会计人员将要盘存材料的已发生经济业务全部入账,结出余额
B. 检查材料盘点记录
C. 定期盘点
D. 监督盘点工作的进行
E. 查验库存材料质量
【多选题】
审计人员为核实企业列示于资产负债表上的固定资产价值的真实性和正确性.应审查的内容包括___
A. 固定资产采购的审批手续
B. 固定资产的入账价值
C. 固定资产的增加与减少
D. 固定资产的盘盈与盘亏
E. 固定资产的预算制度
【多选题】
社会审计组织的审计业务具体有___
A. 审查企业会计报表,出具有关的报告
B. 验证企业资本,出具验资报告
C. 办理企业合并、分立、清算及其他事项中的审计业务,出具有关报告
D. 协助拟定合同、章程和其他经济文件
E. 法律行政法规规定的其他审计业务
【多选题】
内部审计机构的主要权限是___
A. 提出改进管理、提高经济效益的建议及纠正违反财经法规行为的意见
B. 监督财政预算的执行和财政决策
C. 对审计涉及的有关事项进行调查,并索取有关文件、资料等证明材料
D. 对严重违反财经法规和造成严重损失浪费的直接责任人员,提出处理的建议,并按有关的规定,向上级内部审计机构或者审计机关反映
E. 审查企业会计报表,对外出具审计报告
【多选题】
以下属于内部审计范围的有___
A. 财务计划或者单位预算的执行和决策
B. 财政财务收支及其有关的经济活动
C. 经济效益和内部控制制度
D. 经济责任和建设项目预(概)算、决算
E. 财经法规和部门、单位规章制度的执行
【多选题】
按照国家规定,必须设立内部审计机构的有___
A. 国家大型建设项目的建设单位
B. 县级以上的国有金融机构
C. 除外商投资企业以外的所有企业
D. 财务收支范围较大的集体所有制企业
E. 国有大中型企业
【多选题】
根据法律法规的规定,国家审计机关对依法属于审计机关监督对象的单位的内部审计工作负有的职责是___
A. 领导
B. 检查
C. 考核
D. 业务指导和监督
E. 审计业务质量监督
【多选题】
列有关审计作用的表述中,正确的有___
A. 国家审计可以促进宏观调控政策的贯彻执行
B. 内部审计可以促进本单位加强管理和提高效益
C. 社会审计可以确保被审计单位财务信息真实可靠
D. 国家审计和内部审计的作用是完全相同的
E. 因所处地位和检查范围不同,国家审计、内部审计和社会审计的具体作用有所不同
【多选题】
下列各项中,属于审计机关基本任务的有___
A. 制定审计规章制度
B. 办理政府交办的审计事项
C. 任免下级审计机关负责人
D. 指导监督内部审计工作
E. 研究、制定审计工作的方针、政策
【多选题】
下列各项中,属于对审计作业过程进行控制的措施有___
A. 建立严格的聘用制度
B. 建立严格的晋升制度
C. 制定切实可行的审计丁作方案
D. 建立审计工作底稿复核制度
E. 对审计报告、审计决定进行复核
【多选题】
下列有关审计证据的表述中,正确的有___
A. 审计证据的客观性越强,证明力越强
B. 审计证据与审计目标的相关性越强,证明力越强
C. 审计证据来源不同,则证明力强弱不同
D. 审计证据需依照法定程序取得
E. 审计意见必须建立在足够的审计证据的基础上,可见审计证据越多越好
【多选题】
国家审计人员运用函证方法收集审计证据时,下列做法中,正确的有___
A. 对整个函证过程加以控制,以保证函证的质量
B. 采取积极函证取得书面证据,提高审计证据的可信性
C. 使用积极函证一直未得到回复,采取其他替代方法
D. 对重要事项采取消极函证,提高审计效率
E. 要求收函单位将询证函回函直接寄回审计机关
【多选题】
下列各项中,属于内部控制作用的有___
A. 保护财产物资的安全完整
B. 增加会计资料的可信性
C. 杜绝错误和舞弊的发生
D. 促进经营目标的实现
E. 保证审计人员将控制风险降低为零
【多选题】
下列有关审计管理的说法中,正确的有___
A. 审计管理包括审计业务管理、审计行政管理、审计组织管理等
B. 审计管理的目的是提高审计工作的质量和效率
C. 审计管理贯穿于审计业务活动的始终
D. 审计管理要服从审计目标
E. 审计管理主要是对审计业务活动的管理,不包括对审计人员的管理
【多选题】
下列审计风险中,属于审计机关可控风险的有___
A. 由于审计人员工作态度不认真导致的审计风险
B. 由于审计方法选用不当导致的审计风险
C. 由于被审计单位内部控制不健全导致的审计风险
D. 由于审计人员专业水平不高导致的审计风险
E. 由于重要性水平确定不当带来的审计风险
【多选题】
审计人员在确定应收账款函证范围和对象时,应考虑的因素有___
A. 应收账款内部控制的可靠性
B. 函证方式
C. 被审计单位的意见
D. 应收账款的重要性
E. 以前函证的结果
【多选题】
针对长期挂账的应付款项,审计人员分析可能存在的原因有___
A. 被审计单位偿债能力弱
B. 被审计单位隐匿收入
C. 被审计单位隐匿负债
D. 债权人已破产清算
E. 被审计单位与债权人存在争议
【多选题】
下列各项中,影响被审计单位存货周转率的因素有___
A. 存货数量发生变动
B. 存货期末余额发生变动
C. 存货发出的计价方法发生变动
D. 销售总成本发生变动
E. 应收账款周转率发生变动
【多选题】
为了核实银行存款收付的截止期,审计人员可以实施的审计程序有___
A. 对资产负债表日前后数天发生的银行存款收付业务进行审查
B. 向开户银行进行函证
C. 审阅支票收入与送存记录,检查年终未送存银行的支票及其收入的记录日期
D. 查阅资产负债表日后银行对账单第一周的银行存款收入,核实银行存款日记账,检查是否将资产负债表日后的收入提前人账
E. 检查被审计单位资产负债表日签发的最后一张支票序号,并检查该序号前的支票是否均已寄出并人账
【多选题】
下列有关审计分类的表述中,正确的有___
A. 按执行审计的地点,可以将审计划分为就地审计和报送审计
B. 按实施审计的范围,可以将审计划分为详细审计和抽样审计
C. 按实施审计的周期,可以将审计划分为定期审计和不定期审计
D. 按审计的组织方式,可以将审计划分为国家审计、社会审计和内部审计
E. 按审计的内容,可以将审计划分为财政财务审计、财经法纪审计和效益审计
【多选题】
下列各项中,属于我国审计机关职责的有___
A. 对本级政府各部门预算执行情况进行审计监督
B. 对国有金融机构的资产、负债、损益,进行审计监督
C. 对政府投资和以政府投资为主的建设项目预算执行情况和决算进行审计监督
D. 对内部审计工作进行领导与监督
E. 对社会审计机构出具的所有审计报告进行核查
【多选题】
下列各项中,属于审计组织审计质量控制措施的有___
A. 对审计工作底稿进行分级复核
B. 对审计人员进行定期培训
C. 对审计报告进行复核
D. 对被审计单位提出完善内部控制的建议
E. 对审计人员的独立性进行监督
【多选题】
下列有关审计目标的提法中,正确的有___
A. 审计目标是审计行为的出发点
B. 审计目标在不同历史时期是相同的
C. 根据审计目标的不同可将审计业务划分为不同的类型
D. 审计目标包括总体审计目标与具体审计目标两个层次
E. 审计目标对审计全过程都有影响
【多选题】
下列有关审计证据充分性的表述中,正确的有___
A. 充分性是审计证据的质量特征之一
B. 充分性就是要求审计证据越多越好
C. 充分性是指审计证据的数量足以证明审计事项并支持审计意见
D. 充分性是指审计证据本身的真实性
E. 充分性就是要求审计证据与审计目标之间紧密相关
【多选题】
下列关于审计管理的表述中,正确的有___
A. 审计管理是对审计活动进行的计划、组织、指挥、协调和控制
B. 审计管理的主体是国家审计机关
C. 审计管理贯穿于审计业务活动的始终
D. 审计管理的内容因审计管理对象的不同而不同
E. 审计管理包括审计业务管理、审计行政管理、审计组织管理等
【多选题】
对应收款项进行审计时,其审计目标有___
A. 证实应收款项的真实性
B. 证实应收款项计价与分类的正确性
C. 证实应收款项记录截止期的正确性
D. 确认坏账损失的真实性
E. 证实营业收入过账和汇总的正确性
【多选题】
审计人员对应付账款进行审计时,为揭示应付账款期末余额变动的合理性,有效的分析性复核方法有___
A. 将本期各主要应付账款账户余额与上期比较,分析变动原因
B. 计算并比较分析各期营业收入的变动趋势
C. 计算并比较分析各期应付账款占流动负债的比率
D. 计算并比较分析各期应付账款占采购金额的比率
E. 计算并比较分析各期毛利率的变动幅度
【多选题】
对应付账款明细账进行审计时,下列各项中,应重点审查的有___
A. 积欠已久而突然全部结清的账户
B. 长期未能结清的账户
C. 业务发生频繁的账户
D. 债权人不明确的账户
E. 函证回函证明余额相符的账户
【多选题】
在审查固定资产业务时,发现被审计单位调整了某项设备的人账价值,对此审计人员认为合理的解释有___
A. 该设备已提足折旧但仍在使用
B. 根据国家规定对设备重新估价
C. 增加补充设备和改良装置
D. 调整原计固定资产价值的错误
E. 根据实际价值调整原来的暂估价值
【多选题】
下列关于审计风险的说法,正确的有___
A. 审计风险可能是由审计人员非故意的不恰当行为所引发
B. 审计风险不可以控制
C. 审计风险具有潜在性
D. 审计风险是客观存在的
E. 审计风险是指被审计单位存在舞弊的风险
推荐试题
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently