CH 9+10 Flashcards

1
Q

Why is an understanding of internal control important?

A

Understanding internal control is critical because it helps ensure quality of information, efficient operations, security over assets, and compliance with regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are internal controls? How does the Sarbanes-Oxley 404 view of internal control over financial reporting differ?

A

Internal controls are processes designed to provide reasonable assurance regarding financial reporting, operational efficiency, and regulatory compliance. Sarbanes-Oxley 404 requires management and auditors to assess and report on the effectiveness of internal controls over financial reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does an error compare and contrast to an irregularity in financial reporting?

A

An error is an unintentional mistake in financial reporting, while an irregularity is a deliberate act of fraud or misrepresentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the COSO (2013) framework? What is it used for?

A

The COSO (2013) framework is a model for designing and evaluating internal controls. It is used to ensure the effectiveness of internal controls in achieving financial reporting accuracy, operational efficiency, and regulatory compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the components of the COSO framework?

A

The five components are:

  1. Control Environment – Ethical culture, governance, and accountability.
  2. Risk Assessment – Identifying and evaluating risks.
  3. Control Activities – Policies and procedures to mitigate risk.
  4. Information & Communication – Effective data flow and reporting.
  5. Monitoring – Continuous assessment of controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provide three examples of control activities. What activities should be segregated?

A

Examples:

  1. Authorization procedures.
  2. Reconciliation of accounts.
  3. Physical asset security.

Segregation of duties should be applied to authorization, recordkeeping, and custody of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the control environment affect the effectiveness of control activities?

A

A strong control environment enhances effectiveness by promoting ethical behavior and accountability, while a weak environment can undermine controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do ethical values affect internal control over financial reporting?

A

Ethical values ensure integrity in financial reporting. The SEC emphasizes corporate ethics, and organizations can measure them through audits, surveys, and monitoring of compliance programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is risk assessment, and how does it relate to the COSO (2013) framework?

A

Risk assessment is the identification and evaluation of risks that may impact an organization. It is a key component of COSO and helps determine necessary internal controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is monitoring, and how does it relate to the COSO (2013) framework?

A

Monitoring is the continuous assessment of internal controls to ensure they function properly. It differs from control activities as it focuses on oversight rather than execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are management’s responsibilities under Section 404 of the Sarbanes-Oxley Act?

A

Management must assess and report on the effectiveness of internal controls over financial reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the inherent limitations of a “perfectly” designed internal control system?

A

No system is perfect due to human error, collusion, management override, and evolving risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main difference between application and general IT security controls?

A

Application controls focus on transaction-level security, while general controls apply to the overall IT environment, such as network security and access management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three types of application controls? Provide an example.

A
  1. Input controls – Validity checks on entered data.
  2. Processing controls – Ensuring calculations are performed correctly.
  3. Output controls – Restricting access to reports.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is phishing, and why is it a threat?

A

Phishing is a cyberattack where attackers trick users into providing sensitive information. It threatens data security and financial integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ransomware, and why is it harmful to businesses?

A

Ransomware is malicious software that encrypts data and demands payment for decryption. It disrupts operations and leads to financial losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is encryption used in accounting?

A

Encryption protects sensitive financial data from unauthorized access and ensures data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is patch management?

A

Patch management is the process of updating software to fix security vulnerabilities and improve system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a disaster recovery plan? Are they necessary? What should be included?

A

A disaster recovery plan outlines procedures for restoring IT operations after an incident. It is necessary for business continuity and should include data backup strategies, alternate processing sites, and emergency response protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the three types of disaster recovery options?

A
  1. Hot site – Fully operational backup facility.
  2. Cold site – Infrastructure without pre-installed systems.
  3. Warm site – A balance between hot and cold, with some pre-configured resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which control would reduce the likelihood of someone receiving an expense check for $65,000 more than they were entitled to?

A

Limit check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What best describes a computer virus?

A

A list of instructions to a computer that can replicate itself and attach to another program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which approach to alternate processing facilities presents the least risk to a company?

A

Recovery operations center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Physical access and protection falls under which category of control?

A

General control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What control can prevent a vendor payment due date from being entered as 2001 instead of 2010?
Validity check.
26
What control can prevent omission of a due date from a payment input?
Completeness check.
27
What control can prevent an accounts payable clerk from missing one of 52 check requisitions sent for processing?
Reconciliation and batch totals.
28
What control can prevent unauthorized access to a school’s computer system to change grades?
Strong password policies and access control measures.
29
What control can prevent an employee from coding an expense to a non-existent department?
Validity check.
30
What control can prevent an employee from entering a letter instead of a number in a payroll deduction form?
Field check.
31
What is Expected Loss?
Exposure x Probability of Occurrence.
32
What is Inherent Risk?
Risk that is faced prior to taking action.
33
What is Residual Risk?
Risk that remains after management takes action to respond to the risks threats and implements counteractions.
34
What is Collusion?
When two employees work together to defeat the system to commit fraud.
35
What is Pressure in the context of the fraud triangle?
Element of the fraud triangle that is the motive to commit the fraud.
36
What is Opportunity in the context of the fraud triangle?
Element of the fraud triangle that is the availability to commit the fraud.
37
What is Rationalization in the context of the fraud triangle?
Element of the fraud triangle that is the reasoning to commit the fraud.
38
What is the Fraud Triangle?
Requires all three elements, pressure, opportunity, and rationalization, to commit fraud.
39
What is Segregation of Accounting Duties?
Different individuals should be responsible for each of the three major activities of a transaction: approval, recordkeeping, and custody.
40
What is a Validity Check?
Ensures that account numbers or customers exist.
41
What are Application Controls?
Ensures the accuracy of specific input, processing, and output.
42
What is a Consistency Check?
Reviewing output to make sure there are no obvious problems.
43
What is a Check Digit?
Extra character added to account number to ensure no transpositions or other data errors have been made.
44
What is a Limit Check?
Checks to be sure that pre-established thresholds are not exceeded.
45
What is a Completeness Check?
Ensures that all required fields are filled in.
46
What is a Field Check?
Determines whether the characters in a field are of the proper type.
47
What is Prenumbering?
Used to keep track of transactions and to ensure that all authorized transactions are processed once and only once.
48
What is a Firewall?
Used to filter data packets from the internet and drop data packets coming from unauthorized network servers.
49
What is Malware Prevention?
Software that prevents malicious code from infecting your computer.
50
What are Reasonableness Tests?
Ensures that items make sense in relation to one another.
51
What is Ransomware?
Malware that locks you out of the system and requires you to pay a ransom in order for your data to be unlocked.
52
What is Patch Management?
Update to fix software bugs.
53
What is Biometric Identification?
A security measure that can identify unique physical characteristics.
54
What is a Lockout Procedure?
Tries at password then system shuts off.
55
What are Callback Procedures?
Allows you to log in then shuts off and calls you back at an authorized location.
56
What is Encryption?
Uses an algorithm to scramble data so that anyone gaining unauthorized access to it cannot read it without a key.
57
What is IPE (Information Produced by the Entity)?
Information produced by the entity.
58
What is Phishing?
Attempts to steal credit card and other sensitive information through social engineering.
59
What is Source Data?
The total of all the dollars input to a particular batch.
60
What are Disaster Recovery Plans?
Comprehensive outlines of the actions that should be taken before, during, and after an earthquake, fire, or terrorist attack along with tested procedures to ensure continuity of operations.