chapter 10 Flashcards
According to COSO, which of the following components of the enterprise risk management addresses an entity’s integrity and ethical values
Internal environment
Which of the following items is one of the eight components of COSO’s enterprise risk management framework
Monitoring
In a large public corporation, evaluating internal control procedures should be responsibility of
internal audit staff who report to the board of directors
Which of the following represents an inherent limitation of internal controls?
the CEO can request a check with no purchase order
Which of the following is the best way to compensate for the lack of adequate segregation of duties in a small organization
Allowing for greater management oversight of incompatible activities
Review of the audit log is an example of which of the following types of security control
Detective
Which of the following is not a component of internal control as defined by COSO
Inherent risk
Which of the following is considered an application input control?
Edit check
Which of the following control activities should be taken to reduce the risk of incorrect processing in a newly installed computerized accounting system
Independently verify the transactions
Which of the following statement is correct regarding internal control?
An inherent limitation to internal control is the fact that controls can be circumvented by management override
Obtaining an understanding of an internal control involves evaluating the design of the control and determining whether the control has been
Implemented
A manufacturing firm identified that it would have difficulty sourcing raw materials locally, so it decided to relocate its production facilities. According to COSO, this decision represents which of the following response to the risk
Risk reduction
Each of the following types of controls is considered to be an entity-level control, except those
Regarding the company’s annual stockholder meeting
Controls in the information technology area are classified into preventive, detective, and corrective categories. Which of the following is preventive control
Access control software
All of the following are examples of internal control procedures except
Customer satisfaction surveys