Ch9 Practise Q's - Internal Controls II Flashcards

1
Q

Internal controls are necessary in all businesses because:(LO1)

A business processes do not always go to plan.
B employees are basically corrupt.
C financial statements only contain assertions.
D external auditors insist on them.

A

A business processes do not always go to plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information processing controls are those that are put in place within the organisation to work towards the _______, _______ and _______ of transactions.(LO2)

A efficiency, effectiveness, and accuracy
B timeliness, efficiency, and completeness
C accuracy, completeness, and authorisation
D authorisation, processing, accuracy

A

C accuracy, completeness, and authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The system documentation tool that is most useful for documenting controls is:(LO9)

A process map.
B structured narrative.
C logical data flow diagram.
D system flowchart.

A

D system flowchart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An antivirus program scans and monitors files in a computer continuously for viruses. This is an example of:(LO2)

A preventive control.
B detective control.
C corrective control.
D application control.

A

B detective control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company wants all sales orders over $1000 to be authorised by the sales manager. Are the procedures covering this an example of computer or human controls?(LO8)

A Human.
B Computer.
C Human followed by computer.
D Computer followed by human.

A

D Computer followed by human.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COBIT5.0 is a framework for the governance and management of enterprise IT (information technology). There are six (6) COBIT 5.0 application controls (AC). AC3 covers accuracy, completeness and authenticity checks. The following are examples of such controls at the data input stage:(LO3)

A limit checks and system access controls.
B edit checks and batch totals.
C range checks and data file maintenance.
D all of the above.

A

B edit checks and batch totals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a small company the sales manager agrees to allow a regular customer to make a purchase that would exceed their credit limit. The customer fails to pay. Of what category of limitation of controls is this an example?(LO10)

A Conflicting signals.
B Management override.
C Collusion.
D Judgement error.

A

D Judgement error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COBIT5.0 is a framework for the governance and management of enterprise IT (information technology). There are six (6) COBIT 5.0 application controls (AC). AC4 covers processing integrity and validity. The following are examples of controls to ensure integrity at the data processing stage:(LO3)

A sequence checks and range checks.
B batch totals and limit checks.
C sequence checks and run-to-run totals.
D all of the above.

A

C sequence checks and run-to-run totals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is NOT a major aim of a computerised accounting information system?(LO4)

A Proper authorisation.
B Timeliness.
C Proper recording.
D User friendly.

A

D User friendly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Segregation of duties is a principle that applies to which sections of an organisation?(LO5)

A Throughout the organisation including office staff, accountants and IT workers.
B Accountants.
C Office staff who have to deal with money matters.
D Programmers and computer support staff who could interfere with the accounting information system.

A

A Throughout the organisation including office staff, accountants and IT workers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Purchasing goods over the Internet would fit into which of the following categories of processing?(LO4)

A Batch.
B Online real-time.
C Online data collection batched for later processing.
D Shopping basket.

A

C Online data collection batched for later processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT a form of physical control?(LO5)

A Servers are placed in a locked room.
B A username and a password are needed to log into a computer.
C Security cameras are put in place.
D A swipe card system for controlling access to computer labs.

A

B A username and a password are needed to log into a computer.

This would be authorisations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following controls will best help detect inventory input accuracy concerns when entering credit sales into a system?
(LO6)

A A batch total of the number of sales invoices in the batch.
B A hash total of the number of inventory items ordered across all invoices.
C A hash total of customer numbers from all sales invoices.
D A sequence check on sales invoice numbers.

A

B A hash total of the number of inventory items ordered across all invoices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which control would best help achieve the aim of correct valuation for purchase transactions entered into a system?(LO6)

A Range checks – checking the quantity ordered against acceptable ranges.
B Validity checks – checking the supplier is listed in our supplier master file.
C Sequence check – ensuring the purchase order number is the next number in the sequence.
D Authorisation – getting a manager to approve all purchases.

A

A Range checks – checking the quantity ordered against acceptable ranges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In terms of disaster recovery, organisations’ reaction to the threat of disaster can be:(LO7)

A detective or preventive.
B preventive or corrective.
C detective or corrective.
D preventive, detective and corrective.

A

B preventive or corrective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of preventive controls to prevent incorrect data entry into a sales system include: (i) validity checks, (ii) range checks, (iii) completeness checks, (iv) run-to-run total checks, (v) redundant data checks.(LO2)

i, ii, iii and iv

ii, iii, iv and v

i, iii, iv and v

i, ii, iv and v

i, ii, iii and v

A

i, ii, iii and v

13
Q

The use of biometric identification techniques on an entrance to the computer processing centre is an example of a:(LO2)

preventive control.

detective control.

corrective control.

application control.

access control.

A

access control.

14
Q

An organisation is concerned about the possibility of sales to false and nonexistent customers being entered into its sales system by sales staff. The best control to prevent this problem would be:(LO6)

calling a random sample of customers to ensure they exist.

having sales staff maintain a customer master file.

having a customer master file maintained independent of sales.

having a policy of making only in-store sales (e.g. having no phone or web-based orders).

proper screening of sales staff before hiring them.

A

having a customer master file maintained independent of sales.

15
Q

Select the best pair of terms to complete the following statement: The threat of collusion among employees can be reduced by the application of (i)___________, which entails (ii)______________.(LO8)

(i) organisational policies, (ii) having clearly defined job descriptions.

(i) organisational policies, (ii) specifying procedures for the authorisation, custody and record keeping relating to assets.

(i) separation of duties, (ii) keeping employees separate from one another.

(i) general controls, (ii) having a clear set of organisational policies, such as job notation and forced annual leave.

(i) separation of duties, (ii) keeping authorisation, custody and record keeping separate.

A

(i) general controls, (ii) having a clear set of organisational policies, such as job notation and forced annual leave.