BEC 1 Flashcards
Which of the following is not true regarding the information and communication component of internal control?
The information system captures both internal and external sources of data.
The information and communication component involves developing channels for communication from external stakeholders.
A whistleblower hotline is an important aspect of the information and communication component.
An important aspect of the information and communication component is assessment of information about fraud.
An important aspect of the information and communication component is assessment of information about fraud.
This item is related to the risk assessment component.
Control Environment—Five Principles (Part of 17 COSO Control Principles)
- The organization demonstrates a commitment to integrity and ethical values.
- The board of directors demonstrates independence of management, and oversees the development and monitoring of internal control including:
- Clear board of directors oversight and independence
- Evidence and application of relevant expertise - Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities to achieve objectives, including integrating organizational structures and services including outsourced service providers.
- Competence—The organization demonstrates a commitment to attract, develop, and retain competent individuals consistent with achieving organizational objectives
- Accountability—The organization holds individuals accountable for their internal control responsibilities
Risk Assessment—Four Principles (Part of 17 COSO Control Principles)
- Objectives—The organization specifies objectives with sufficient clarity to enable the identification and assessment of risks that threaten the achievement of objectives.
- Assessment—The organization identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risk should be managed.
- Fraud—The organization considers the potential for fraud in assessing risks to the achievement of objectives.
- Change management—The organization identifies and assesses changes in the external environment (regulatory, economic, and physical environment of operation), assessing changes in the business model (new or existing business lines, rapid growth, new technologies, or acquisitions/divestitures) and changes in leadership.
Control Activities—Three Principles (Part of 17 COSO Control Principles)
- Risk reduction—Organizational control activities mitigate (i.e., reduce) the risks to the achievement of objectives to acceptable levels.
- Technology controls—The organization selects and implements general controls over technology, which support the achievement of its objectives.
- Policies—The organization deploys control activities through policies and procedures that establish stakeholder expectations. Established procedures ensure the implementation of these policies.
Information and Communication—Three Principles (Part of 17 COSO Control Principles)
- Quality—Relevant, high-quality information supports the internal control processes.
- Internal—Internal communication supports internal control processes.
- External—Communication with outsiders supports internal control processes.
Monitoring Activities—Two Principles (Part of 17 COSO Control Principles)
- Ongoing and periodic—Ongoing and separate evaluations evaluate internal control functioning.
- Address deficiencies—Parties responsible for taking corrective action, including senior management and the board of directors, receive timely communication of internal control deficiencies.
Jiffy Grill has an ERP system. It has assigned responsibility for determining who has what access rights within the ERP system. This assignment mostly likely was to:
Internal auditors.
Other personnel.
Management
Support functions
Support functions
(Correct!) This answer is correct because support functions are mostly likely to have responsibility for determining system access.
According to COSO, the use of ongoing and separate evaluations to identify and address changes in internal control effectiveness can best be accomplished in which of the following stages of the monitoring‐for‐change continuum?
Control baseline.
Change identification.
Change management.
Control revalidation/update.
Change identification.
Change Identification is the monitoring for change process that would include ongoing and separate evaluations intended to identify and address changes in internal control effectiveness.
In the COSO enterprise risk management framework, the term risk tolerance refers to
The level of risk an organization is willing to accept.
The acceptable variation with respect to a particular objective.
The risk of an event after considering management’s response.
Events that require no risk response.
The acceptable variation with respect to a particular objective.
This answer is correct because the COSO ERM framework defines risk tolerance as the acceptable variation with respect to a particular organizational objective.
Which of the following is most useful when risk is being prioritized?
Low and high probability exposures.
Low and high‐degree loss exposures.
Expected value.
Uncontrollable risks.
Expected value.
This is the best answer of the choices given. An expected value calculates (and integrates) the likelihood of losses with the amount of losses. Hence, an expected value combines the information in low and high probability exposures and low and high‐degree loss exposures into a decision‐relevant, single, valuable (for decision analysis) number.
Recognizing potential impediments to communication between system user and system designer can be useful in
monitoring control effectiveness.
the tone at the top.
complying with Sarbanes‐Oxley section 404.
managing change in the system of internal control.
managing change in the system of internal control.
This is the best answer because user and design communication issues are more important to managing changes in the system of internal control than to the processes mentioned in any of the other answers.
CFO Mar has been complicit in her public company’s accounting fraud. She consults a lawyer as it the time nears for filing her firm’s 10‐K with the SEC. She is a little uncomfortable about what she might have to do. The lawyer will likely tell her that she will have to certify (and be potentially criminally liable for lying about these matters) that:
She has reviewed the 10‐K.
To her knowledge, the 10‐K does not contain any materially untrue statements.
She, along with the CEO, is responsible for establishing and maintaining her company’s internal controls.
She has recently evaluated the effectiveness of the firm’s internal controls.
She has recently evaluated the effectiveness of the firm’s internal controls.
Correct! All three of the other choices are examples, and not the only examples, of things that CFO Mar must certify when her firm files a 10‐K.
This component of internal control concerns the policies and procedures that ensure that actions are taken to address the risks related to the achievement of management’s objectives.
Control activities.
Control environment.
Monitoring.
Risk assessment.
Control activities.
Control activities are, “…the policies and procedures that ensure that actions are taken to address the risks related to the achievement of management’s objectives.”
According to the 17 COSO control principles, risk reduction primarily relates to which fundamental component of internal control:
Control activities.
Control environment.
Risk assessment.
Monitoring.
Control activities.
According to the COSO principles, control activities primarily relate to risk reduction, technology controls, and policies.
Milo Corp. maintains daily backups of its accounting system in a fireproof vault in the file library. Weekly, monthly, and annual backups are stored in a secure, fireproof vault at an off‐site location.
Maintenance of the backup files is an example of
a detective control.
a feedback control.
a corrective control.
a preventive control.
a corrective control.
Corrective controls allow the user to recover from a problem once it has been identified.