【多选题】
为了核实银行存款收付的截止期,审计人员可以实施的审计程序有___
A. 对资产负债表日前后数天发生的银行存款收付业务进行审查
B. 向开户银行进行函证
C. 审阅支票收入与送存记录,检查年终未送存银行的支票及其收入的记录日期
D. 查阅资产负债表日后银行对账单第一周的银行存款收入,核实银行存款日记账,检查是否将资产负债表日后的收入提前人账
E. 检查被审计单位资产负债表日签发的最后一张支票序号,并检查该序号前的支票是否均已寄出并人账
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ACDE
解析
暂无解析
相关试题
【多选题】
总结国内外审计实践经验,审计的独立性主要体现在___
A. 组织上的独立性
B. 方法上的独立性
C. 人员上的独立性
D. 工作上的独立性
E. 经费上的独立性
【多选题】
下列有关审计分类的表述中,正确的有___
A. 按执行审计的地点,可以将审计划分为就地审计和报送审计
B. 按实施审计的范围,可以将审计划分为详细审计和抽样审计
C. 按实施审计的周期,可以将审计划分为定期审计和不定期审计
D. 按审计的组织方式,可以将审计划分为国家审计、社会审计和内部审计
E. 按审计的内容,可以将审计划分为财政财务审计、财经法纪审计和效益审计
【多选题】
下列各项中,属于我国审计机关职责的有___
A. 对本级政府各部门预算执行情况进行审计监督
B. 对国有金融机构的资产、负债、损益,进行审计监督
C. 对政府投资和以政府投资为主的建设项目预算执行情况和决算进行审计监督
D. 对内部审计工作进行领导与监督
E. 对社会审计机构出具的所有审计报告进行核查
【多选题】
下列各项中,属于审计组织审计质量控制措施的有___
A. 对审计工作底稿进行分级复核
B. 对审计人员进行定期培训
C. 对审计报告进行复核
D. 对被审计单位提出完善内部控制的建议
E. 对审计人员的独立性进行监督
【多选题】
下列有关审计目标的提法中,正确的有___
A. 审计目标是审计行为的出发点
B. 审计目标在不同历史时期是相同的
C. 根据审计目标的不同可将审计业务划分为不同的类型
D. 审计目标包括总体审计目标与具体审计目标两个层次
E. 审计目标对审计全过程都有影响
【多选题】
下列有关审计证据充分性的表述中,正确的有___
A. 充分性是审计证据的质量特征之一
B. 充分性就是要求审计证据越多越好
C. 充分性是指审计证据的数量足以证明审计事项并支持审计意见
D. 充分性是指审计证据本身的真实性
E. 充分性就是要求审计证据与审计目标之间紧密相关
【多选题】
下列关于审计管理的表述中,正确的有___
A. 审计管理是对审计活动进行的计划、组织、指挥、协调和控制
B. 审计管理的主体是国家审计机关
C. 审计管理贯穿于审计业务活动的始终
D. 审计管理的内容因审计管理对象的不同而不同
E. 审计管理包括审计业务管理、审计行政管理、审计组织管理等
【多选题】
对应收款项进行审计时,其审计目标有___
A. 证实应收款项的真实性
B. 证实应收款项计价与分类的正确性
C. 证实应收款项记录截止期的正确性
D. 确认坏账损失的真实性
E. 证实营业收入过账和汇总的正确性
【多选题】
审计人员对应付账款进行审计时,为揭示应付账款期末余额变动的合理性,有效的分析性复核方法有___
A. 将本期各主要应付账款账户余额与上期比较,分析变动原因
B. 计算并比较分析各期营业收入的变动趋势
C. 计算并比较分析各期应付账款占流动负债的比率
D. 计算并比较分析各期应付账款占采购金额的比率
E. 计算并比较分析各期毛利率的变动幅度
【多选题】
对应付账款明细账进行审计时,下列各项中,应重点审查的有___
A. 积欠已久而突然全部结清的账户
B. 长期未能结清的账户
C. 业务发生频繁的账户
D. 债权人不明确的账户
E. 函证回函证明余额相符的账户
【多选题】
在审查固定资产业务时,发现被审计单位调整了某项设备的人账价值,对此审计人员认为合理的解释有___
A. 该设备已提足折旧但仍在使用
B. 根据国家规定对设备重新估价
C. 增加补充设备和改良装置
D. 调整原计固定资产价值的错误
E. 根据实际价值调整原来的暂估价值
【多选题】
下列关于审计风险的说法,正确的有___
A. 审计风险可能是由审计人员非故意的不恰当行为所引发
B. 审计风险不可以控制
C. 审计风险具有潜在性
D. 审计风险是客观存在的
E. 审计风险是指被审计单位存在舞弊的风险
【多选题】
按审计主体,可以将审计划分为___
A. 国家审计
B. 内部审计
C. 社会审计
D. 财政审计
E. 财务审计
【多选题】
根据《中华人民共和国审计法》的规定,审计机关在审计过程中具有的监督检查权包括___
A. 要求被审计单位按照审计机关规定的期限和要求报送与财政财务收支有关的资料
B. 就审计事项的有关问题向相关单位和个人进行调查取证
C. 制止被审计单位转移、隐匿、篡改、毁弃与财政财务收支有关的资料
D. 在被审计单位违规转移、隐匿违法取得的资产时自行采取保全措施
E. 向社会公布审计结果
【多选题】
审计证据的质量特征包括___
A. 重要性
B. 相关性
C. 客观性
D. 一贯性
E. 充分性
【单选题】
审计证据是审计人员判断审计事项是非、优劣的准绳。___
A. 对
B. 错
【单选题】
对审计中发现的重大问题,没有明确的审计标准的,应当请示本机人民政府或上级审计机关。___
A. 对
B. 错
【单选题】
运用外部调查审计取证方法所获得的审计证据可靠性较高___
A. 对
B. 错
【单选题】
总体项目差异不影响审计抽样样本量。___
A. 对
B. 错
【单选题】
被审计对象在接到审计组的审计报告之日起15日内,将其书面意见送交审计组。___
A. 对
B. 错
【单选题】
审计组组长对审计项目实施结果承担最终责任。___
A. 对
B. 错
【单选题】
核对借方余额合计和贷方余额合计是否相符的会计核对方法是账账核对。___
A. 对
B. 错
【单选题】
核对借方余额合计和贷方余额合计是否相符的会计核对方法是账表核对。___
A. 对
B. 错
【单选题】
审计部门编制年度行业审计计划应以风险防控为导向,把握轻重缓急。___
A. 对
B. 错
【单选题】
审计部门编制年度行业审计计划可以采取文字、表格或者两者相结合的形式。___
A. 对
B. 错
【单选题】
年度行业审计计划的执行情况应定期报告省联社总审计师和审计委员会。___
A. 对
B. 错
【单选题】
审计部应定期或不定期自查本单位审计计划的执行情况,年度终了对当年审计计划完成情况进行总结。___
A. 对
B. 错
【单选题】
现场审计组在分配审计资源时,应当为重要审计事项分派有经验的审计人员和安排充足的审计时间。___
A. 对
B. 错
【单选题】
审计进点会参加人员一般为:审计组成员、被审计单位负责人及其有关人员。___
A. 对
B. 错
【单选题】
审计记录是审计人员根据实施审计全过程编写成的工作记录。___
A. 对
B. 错
【单选题】
在获取审计证据时,审计人员应当组织审计测试、确定审计抽样,采用适当的方式方法收集和分析各类审计证据,确保证据适当、相关、充分,足以支持审计结论。___
A. 对
B. 错
【单选题】
审计报告是指在对审计项目实施必要的审计程序后,以审计证据和相关资料为依据,组织编写的审计报告。___
A. 对
B. 错
【单选题】
任何部门或个人查阅审计档案资料时,不得损毁、涂改或圈划,不得转借他人或遗失。___
A. 对
B. 错
【单选题】
审计部门要对被审计单位的整改落实情况,按照省联社审计委员会的要求进行后续审计监督。后续审计监督可对整改情况进行全面检查,也可根据实际情况进行一定比例的抽查。___
A. 对
B. 错
【单选题】
审计立项是指审计部门从提出审计项目需求到项目批准,并对实施审计项目作出计划和安排的全过程。___
A. 对
B. 错
【单选题】
编制和调整审计方案可以采取文字、表格或者两者相结合的形式。___
A. 对
B. 错
【单选题】
现场审计组组长主持审计项目的组织实施工作,按审计程序认真完成审计项目的全过程,并对审计结果负责。___
A. 对
B. 错
【单选题】
现场审计组审计人员对分工范围内审计事项的全面性负责,对审计工作底稿的真实性、完整性负责。___
A. 对
B. 错
【单选题】
审计实施是指审计组按照审计方案对被审计单位实施审计的全过程。___
A. 对
B. 错
【单选题】
在审计责任划分时被审计单位现任领导为第一责任人。___
A. 对
B. 错
推荐试题
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall