Chapter 9: Internal controls II Flashcards
Which control would best help achieve the aim of correct valuation for purchase transactions entered into a system?
a. Range checks – checking the quantity ordered against acceptable ranges.
b. Validity checks – checking the supplier is listed in our supplier master file.
c. Sequence check – ensuring the purchase order number is the next number in the sequence.
d. Authorisation – getting a manager to approve all purchases.
Which control would best help achieve the aim of correct valuation for purchase transactions entered into a system?
*a. Range checks – checking the quantity ordered against acceptable ranges.
b. Validity checks – checking the supplier is listed in our supplier master file.
c. Sequence check – ensuring the purchase order number is the next number in the sequence.
d. Authorisation – getting a manager to approve all purchases.
Which of the following is a risk to the financial statement of a company when it places a purchase order with a supplier?
a. The supplier delivers the goods with an invoice instead of a delivery note.
b. The goods are not available.
c. The supplier delivers the wrong goods or wrong quantity.
d. The purchasing officer orders the wrong goods.
Which of the following is a risk to the financial statement of a company when it places a purchase order with a supplier?
a. The supplier delivers the goods with an invoice instead of a delivery note.
b. The goods are not available.
*c. The supplier delivers the wrong goods or wrong quantity.
d. The purchasing officer orders the wrong goods.
Which of the following is not one of the six COBIT 5 application controls?
a. Source data preparation and authentication.
b. Transaction authentication and integrity.
c. Processing integrity and validity.
d. Programmable logic controller.
Which of the following is not one of the six COBIT 5 application controls?
a. Source data preparation and authentication.
b. Transaction authentication and integrity.
c. Processing integrity and validity.
*d. Programmable logic controller.
Disadvantages of manual controls include all of the following except:
a. manual controls are prone to human errors.
b. manual controls are prone to inconsistent application.
c. manual controls used up too many human resources.
d. manual controls are easier to avoid and workaround.
Disadvantages of manual controls include all of the following except:
a. manual controls are prone to human errors.
b. manual controls are prone to inconsistent application.
*c. manual controls used up too many human resources.
d. manual controls are easier to avoid and workaround.
Examples of preventive controls to prevent incorrect data entry into a sales system include: (i) validity checks, (ii) range checks, (iii) completeness checks, (iv) run-to-run total checks, (v) redundant data checks.
a. i, ii, iii and iv
b. ii, iii, iv and v
c. i, iii, iv and v
d. i, ii, iv and v
e. i, ii, iii and v
Examples of preventive controls to prevent incorrect data entry into a sales system include: (i) validity checks, (ii) range checks, (iii) completeness checks, (iv) run-to-run total checks, (v) redundant data checks.
a. i, ii, iii and iv
b. ii, iii, iv and v
c. i, iii, iv and v
d. i, ii, iv and v
e. i, ii, iii and v
In general, disaster recovery plans include all of the following except:
a. temporary sites.
b. staffing.
c. employee evacuation procedures.
d. business relationships restoration.
In general, disaster recovery plans include all of the following except:
a. temporary sites.
b. staffing.
*c. employee evacuation procedures.
d. business relationships restoration.
The control matrix does NOT tell us:
a. the control objectives of a control system.
b. how control objectives would ideally be attained.
c. whether control objectives actually exist within a system.
d. the effectiveness of the control objectives.
The control matrix does NOT tell us:
a. the control objectives of a control system.
b. how control objectives would ideally be attained.
c. whether control objectives actually exist within a system.
*d. the effectiveness of the control objectives.
Which of the following is an example of a good segregation of duties?
a. The sales department is allowed to bill customers.
b. The accounts receivable department is allowed to prepare bills.
c. The warehouse personnel are allowed to maintain the inventory record.
d. None of the options is correct.
Which of the following is an example of a good segregation of duties?
a. The sales department is allowed to bill customers.
b. The accounts receivable department is allowed to prepare bills.
c. The warehouse personnel are allowed to maintain the inventory record.
*d. None of the options is correct.
Which of the following is NOT a form of physical control?
a. Servers are placed in a locked room.
b. A username and a password are needed to log into a computer.
c. Security cameras are put in place.
d. A swipe card system for controlling access to computer labs.
Which of the following is NOT a form of physical control?
a. Servers are placed in a locked room.
*b. A username and a password are needed to log into a computer.
c. Security cameras are put in place.
d. A swipe card system for controlling access to computer labs.
Segregation of duties is a principle that applies to which sections of an organisation?
a. Throughout the organisation including office staff, accountants and IT workers.
b. Accountants.
c. The office staff who have to deal with money matters.
d. Programmers and computer support staff, who could interfere with the accounting information system.
Segregation of duties is a principle that applies to which sections of an organisation?
*a. Throughout the organisation including office staff, accountants and IT workers.
b. Accountants.
c. The office staff who have to deal with money matters.
d. Programmers and computer support staff, who could interfere with the accounting information system.
After identifying risks, management will decide on appropriate policies and procedures to address the risks. These policies and procedures are called:
a. control policies.
b. control activities.
c. control procedures.
d. control processes.
After identifying risks, management will decide on appropriate policies and procedures to address the risks. These policies and procedures are called:
a. control policies.
*b. control activities.
c. control procedures.
d. control processes.
Which of the following would enable an organisation to detect that an unauthorised person has entered a secure area?
a. Swipe card access.
b. Physical lock of the door.
c. Security camera.
d. Biometric access control.
Which of the following would enable an organisation to detect that an unauthorised person has entered a secure area?
a. Swipe card access.
b. Physical lock of the door.
*c. Security camera.
d. Biometric access control.
The comparison of actual and budgeted figures and the conduct of variance analysis to determine the source of the variance is a type of:
a. general control.
b. information processing control.
c. performance review.
d. application control.
The comparison of actual and budgeted figures and the conduct of variance analysis to determine the source of the variance is a type of:
a. general control.
b. information processing control.
*c. performance review.
d. application control.
Purchasing goods over the Internet would fit into which of the following categories of processing?
a. Batch.
b. Online real-time.
c. Online data collection batched for later processing.
d. Shopping basket.
Purchasing goods over the Internet would fit into which of the following categories of processing?
a. Batch.
b. Online real-time.
*c. Online data collection batched for later processing.
d. Shopping basket.
Computer-based controls are extremely dependent on:
(i) a sound control environment.
(ii) sound general controls.
(iii) the COBIT framework.
a. (i) (ii)
b. (i) (iii)
c. (ii) (iii)
d. (i) (ii) (iii)
Computer-based controls are extremely dependent on:
(i) a sound control environment.
(ii) sound general controls.
(iii) the COBIT framework.
*a. (i) (ii)
b. (i) (iii)
c. (ii) (iii)
d. (i) (ii) (iii)
CPA Australia identifies five reasons an internal control system does not provide 100 per cent assurance that an organisation’s objectives will be achieved. These reasons do NOT include:
a. judgement error.
b. unexpected transactions.
c. weak internal controls.
d. natural disasters.
CPA Australia identifies five reasons an internal control system does not provide 100 per cent assurance that an organisation’s objectives will be achieved. These reasons do NOT include:
a. judgement error.
b. unexpected transactions.
c. weak internal controls.
*d. natural disasters.
How does a computer system know that a sales manager has authorised a credit transaction over $1000?
a. The input terminal has bio-security check e.g. retina scanning.
b. A combination of checks on the size of the credit required and the access rights of the manager when she logged in with her username and password.
c. The system must insist on the sales manager entering the transaction.
d. The control comes from the work practices outside the computer.
How does a computer system know that a sales manager has authorised a credit transaction over $1000?
a. The input terminal has bio-security check e.g. retina scanning.
*b. A combination of checks on the size of the credit required and the access rights of the manager when she logged in with her username and password.
c. The system must insist on the sales manager entering the transaction.
d. The control comes from the work practices outside the computer.
The first that financial giant Morgan Stanley knew about the 9/11 bombings were that their business started running from their ________________ several kilometres away from Wall St.
a. cold site
b. hot site
c. off-site backup
d. hosted site
The first that financial giant Morgan Stanley knew about the 9/11 bombings were that their business started running from their ________________ several kilometres away from Wall St.
a. cold site
*b. hot site
c. off-site backup
d. hosted site
Which of the following is NOT a major aim of a computerised accounting information system?
a. Proper authorisation.
b. Timeliness.
c. Proper recording.
d. User friendly.
Which of the following is NOT a major aim of a computerised accounting information system?
a. Proper authorisation.
b. Timeliness.
c. Proper recording.
*d. User friendly.
The use of biometric identification techniques on an entrance to the computer processing centre is an example of a:
a. preventive control.
b. detective control.
c. corrective control.
d. application control.
e. access control.
The use of biometric identification techniques on an entrance to the computer processing centre is an example of a:
a. preventive control.
b. detective control.
c. corrective control.
d. application control.
e. access control.
Which of the following is an example of poor segregation of duties?
a. Inventory control department is allowed to receive incoming goods.
b. Warehouse personnel are allowed to ship goods to customers.
c. The purchasing department is allowed to generate purchase requisitions.
d. All of the options are correct.
Which of the following is an example of poor segregation of duties?
a. Inventory control department is allowed to receive incoming goods.
b. Warehouse personnel are allowed to ship goods to customers.
c. The purchasing department is allowed to generate purchase requisitions.
*d. All of the options are correct.