2 - Assessing Risk and Developing a Planned Response (25-35%) Flashcards
Hash total
Hash totals are an input control. They are a nonsense total; for example, the sum of the digits of an invoice number. A hash total is similar to a control total and is used to verify processing (or output) compared to input.
Completeness check
A completeness check is a verification that all data required to process a given type of transaction has been entered in the required data fields. If missing data is detected, the operator is generally prompted to enter or complete the submission before it will be accepted for processing.
Obtaining and understanding the entity’s system of internal control
Evaluating the DESIGN of a control and determining whether it has been IMPLEMENTED.
Using test data
When using test data, the auditor is looking for controls that are built into the system, not controls that operate outside of the computer. Thus, the auditor would not be testing controls concerning control over and distribution of unclaimed paychecks.
IT provides potential benefits
consistently apply predefined business rules and perform complex calculations in processing large volumes of transactions,
enhance timeliness, availability, and accuracy of information,
facilitate additional analysis of information,
enhance the ability to monitor performance of policies and procedures,
reduce the risk of controls being circumvented, and
enhance the ability to achieve effective segregation of duties.
Integrated test facility
An integrated test facility involves the use of a set of transactions belonging to a dummy entity. These transactions have a predetermined result against which the computer processing will be compared. These transactions are run during the regular processing of data and often without the computer operator’s knowledge.
A design deficiency
A deficiency in design exists when a control necessary to meet the control objective is missing or an existing control is not properly designed so that, even if the control operates as designed, the control objective would not be met.
If employees can change their time after the timecards have been approved, then that deficiency is considered to be a design deficiency.
Parallel simulation
The use of parallel simulation requires the auditor to use a computer simulation that mimics the client’s production programs. The auditor processes actual client data through the simulated program and compares the results with the client’s processed data.
Controls in an electronic data interchange (EDI) system
It is generally more important to have preventive controls in place for those benefits to be recognized.
Preventing vs Detective Controls
Preventive controls have the objective of preventing errors or fraud that could result in a misstatement of the financial statements from occurring.
Detective controls have the objective of detecting errors or fraud that has already occurred that could result in a misstatement of the financial statements.
Detection Risk vs Control Risk
Detection risk is the risk that audit procedures will fail to detect a material misstatement in the financial statements. Detection risk is within the auditor’s control
Control risk is the risk that a company’s internal controls will fail to prevent or detect material misstatements in financial statements. It is not within the auditor’s direct control
Online inquiry
Online inquiry is an interactive procedure that allows an auditor or other authorized personnel to select and view individual records or transactions.
The auditor is most likely to use online inquiry to confirm whether operating personnel had corrected several errors in transaction files discovered during a recent audit.
Mapping
Monitors the execution of a program. It would not be used to confirm whether operating personnel had corrected errors in transaction files discovered during a recent audit.
Tracing
Tracing provides an audit trail of the instructions that are executed when a program is run. It would not be used to confirm whether operating personnel had corrected errors in transaction files discovered during a recent audit.
Embedded audit module
An embedded audit module is able to identify and report specific transactions. Therefore, the module is used by the auditor to continuously audit transactions and capture those transactions of specific interest to the auditor.