CH 9+10 Flashcards

1
Q

What is Expected Loss?

A

Exposure x Probability of Occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Inherent Risk?

A

Risk that is faced prior to taking action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Residual Risk?

A

Risk that remains after management takes action to respond to the risks threats and implements counteractions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Collusion?

A

When two employees work together to defeat the system to commit fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Pressure in the context of the fraud triangle?

A

Element of the fraud triangle that is the motive to commit the fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Opportunity in the context of the fraud triangle?

A

Element of the fraud triangle that is the availability to commit the fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Rationalization in the context of the fraud triangle?

A

Element of the fraud triangle that is the reasoning to commit the fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Fraud Triangle?

A

Requires all three elements, pressure, opportunity, and rationalization, to commit fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Segregation of Accounting Duties?

A

Different individuals should be responsible for each of the three major activities of a transaction: approval, recordkeeping, and custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Validity Check?

A

Ensures that account numbers or customers exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Application Controls?

A

Ensures the accuracy of specific input, processing, and output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Consistency Check?

A

Reviewing output to make sure there are no obvious problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Check Digit?

A

Extra character added to account number to ensure no transpositions or other data errors have been made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Limit Check?

A

Checks to be sure that pre-established thresholds are not exceeded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Completeness Check?

A

Ensures that all required fields are filled in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Field Check?

A

Determines whether the characters in a field are of the proper type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Prenumbering?

A

Used to keep track of transactions and to ensure that all authorized transactions are processed once and only once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Firewall?

A

Used to filter data packets from the internet and drop data packets coming from unauthorized network servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Malware Prevention?

A

Software that prevents malicious code from infecting your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are Reasonableness Tests?

A

Ensures that items make sense in relation to one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Ransomware?

A

Malware that locks you out of the system and requires you to pay a ransom in order for your data to be unlocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Patch Management?

A

Update to fix software bugs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Biometric Identification?

A

A security measure that can identify unique physical characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Lockout Procedure?

A

Tries at password then system shuts off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are Callback Procedures?
Allows you to log in then shuts off and calls you back at an authorized location.
26
What is Encryption?
Uses an algorithm to scramble data so that anyone gaining unauthorized access to it cannot read it without a key.
27
What is IPE (Information Produced by the Entity)?
Information produced by the entity.
28
What is Phishing?
Attempts to steal credit card and other sensitive information through social engineering.
29
What is Source Data?
The total of all the dollars input to a particular batch.
30
What are Disaster Recovery Plans?
Comprehensive outlines of the actions that should be taken before, during, and after an earthquake, fire, or terrorist attack along with tested procedures to ensure continuity of operations.
31
Why is an understanding of internal control important?
Understanding internal control is critical because it helps ensure quality of information, efficient operations, security over assets, and compliance with regulations.
32
What are internal controls? How does the Sarbanes-Oxley 404 view of internal control over financial reporting differ?
Internal controls are processes designed to provide reasonable assurance regarding financial reporting, operational efficiency, and regulatory compliance. Sarbanes-Oxley 404 requires management and auditors to assess and report on the effectiveness of internal controls over financial reporting.
33
How does an error compare and contrast to an irregularity in financial reporting?
An error is an unintentional mistake in financial reporting, while an irregularity is a deliberate act of fraud or misrepresentation.
34
What is the COSO (2013) framework? What is it used for?
The COSO (2013) framework is a model for designing and evaluating internal controls. It is used to ensure the effectiveness of internal controls in achieving financial reporting accuracy, operational efficiency, and regulatory compliance.
35
What are the components of the COSO framework?
The five components are: 1. Control Environment – Ethical culture, governance, and accountability. 2. Risk Assessment – Identifying and evaluating risks. 3. Control Activities – Policies and procedures to mitigate risk. 4. Information & Communication – Effective data flow and reporting. 5. Monitoring – Continuous assessment of controls.
36
Provide three examples of control activities. What activities should be segregated?
Examples: 1. Authorization procedures. 2. Reconciliation of accounts. 3. Physical asset security. Segregation of duties should be applied to authorization, recordkeeping, and custody of assets.
37
How does the control environment affect the effectiveness of control activities?
A strong control environment enhances effectiveness by promoting ethical behavior and accountability, while a weak environment can undermine controls.
38
How do ethical values affect internal control over financial reporting?
Ethical values ensure integrity in financial reporting. The SEC emphasizes corporate ethics, and organizations can measure them through audits, surveys, and monitoring of compliance programs.
39
What is risk assessment, and how does it relate to the COSO (2013) framework?
Risk assessment is the identification and evaluation of risks that may impact an organization. It is a key component of COSO and helps determine necessary internal controls.
40
What is monitoring, and how does it relate to the COSO (2013) framework?
Monitoring is the continuous assessment of internal controls to ensure they function properly. It differs from control activities as it focuses on oversight rather than execution.
41
What are management’s responsibilities under Section 404 of the Sarbanes-Oxley Act?
Management must assess and report on the effectiveness of internal controls over financial reporting.
42
What are the inherent limitations of a “perfectly” designed internal control system?
No system is perfect due to human error, collusion, management override, and evolving risks.
43
What is the main difference between application and general IT security controls?
Application controls focus on transaction-level security, while general controls apply to the overall IT environment, such as network security and access management.
44
What are the three types of application controls? Provide an example.
1. Input controls – Validity checks on entered data. 2. Processing controls – Ensuring calculations are performed correctly. 3. Output controls – Restricting access to reports.
45
What is phishing, and why is it a threat?
Phishing is a cyberattack where attackers trick users into providing sensitive information. It threatens data security and financial integrity.
46
What is ransomware, and why is it harmful to businesses?
Ransomware is malicious software that encrypts data and demands payment for decryption. It disrupts operations and leads to financial losses.
47
Why is encryption used in accounting?
Encryption protects sensitive financial data from unauthorized access and ensures data integrity.
48
What is patch management?
Patch management is the process of updating software to fix security vulnerabilities and improve system performance.
49
What is a disaster recovery plan? Are they necessary? What should be included?
A disaster recovery plan outlines procedures for restoring IT operations after an incident. It is necessary for business continuity and should include data backup strategies, alternate processing sites, and emergency response protocols.
50
What are the three types of disaster recovery options?
1. Hot site – Fully operational backup facility. 2. Cold site – Infrastructure without pre-installed systems. 3. Warm site – A balance between hot and cold, with some pre-configured resources.
51
Which control would reduce the likelihood of someone receiving an expense check for $65,000 more than they were entitled to?
Limit check.
52
What best describes a computer virus?
A list of instructions to a computer that can replicate itself and attach to another program.
53
Which approach to alternate processing facilities presents the least risk to a company?
Recovery operations center.
54
Physical access and protection falls under which category of control?
General control.
55
What control can prevent a vendor payment due date from being entered as 2001 instead of 2010?
Validity check.
56
What control can prevent omission of a due date from a payment input?
Completeness check.
57
What control can prevent an accounts payable clerk from missing one of 52 check requisitions sent for processing?
Reconciliation and batch totals.
58
What control can prevent unauthorized access to a school’s computer system to change grades?
Strong password policies and access control measures.
59
What control can prevent an employee from coding an expense to a non-existent department?
Validity check.
60
What control can prevent an employee from entering a letter instead of a number in a payroll deduction form?
Field check.