Revision Flashcards

1
Q

Strategic] risk

A

is the potential volatility of profits as a result of the type of business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operational] risk

A

is the risk of loss from the failure of internal processes of a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Strategic risk –

A

These arise from the overall strategic positioning of the company in its
environment e.g. financial risk. This arises partly as a result of the way it chooses to be financed
(debt or equity) but also where financial conditions are different to those expected (e.g. interest
rate risk, foreign exchange risk).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operational risk –

A

Operational risks refer to potential losses arising from the normal business
operations. Accordingly, they affect the day-to-day running of operations and business systems
in contrast to strategic risks that arise from the organisation’s strategic positioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk mapping

A

Involves the evaluation, managing and reporting of risks 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CGMA’s Risk Management Cycle

A

1 Establish a risk management group and set goals.
2 Identify risk areas.
3 Understand and assess the scale of risk.
4 Develop a risk response strategy.
5 Implement the strategy and allocate responsibilities.
6 Implement and monitor the suggested controls.
7 Review and refine the process and do it again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Framework that COSO published has eight Components

The cube

A

Components:
 Internal Environment
 Objective Setting
 Event Identification
 Risk Assessment
 Risk Response
 Control Activities
 Information and Communication
 Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ISO 31000 three main clauses

A

the principles of creating and protecting value within the
organisation (clause 4),

the organisational framework that governs risk (clause 5)

the risk management process itself (clause 6).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Framework that COSO published has four Objectives categories.

The cube

A

Strategy – high-level goals, aligned with and supporting the organisation’s mission
 Operations – effective and efficient use of resources
 Financial Reporting – reliability of operational and financial reporting
 Compliance – compliance with applicable laws and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

policy on nominating the Chairman of the Board:

A

The Chairman should be re-elected annually

The Chairman should be selected by a majority Board vote.

A person should not serve more than six years in succession as Chairman to XY plc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

roles of the nomination committee

A

Considers whether an individual is appropriate to serve on the board of directors,

Prepares a job specification for the Chairmanship of the company,

Evaluates the balance of skills, experience, independence and knowledge on the board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

professional competence.

A

A professional accountant has a [continuing] duty to maintain professional [knowledge] and [skill] at the level to ensure that the employer receives competent professional service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stress testing

A

involves scrutinising and critically appraising an existing strategy. It is designed to challenge the status quo and is therefore particularly appropriate where there is stagnation or complacency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

benefits of an internal control system

A

Improves quality of internal reporting,

Improves quality of external reporting,

Helps a company to comply with laws and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

three primary objectives in designing an effective internal control system

A

(1) Reliability of Financial Reporting (
2) Efficiency and effectiveness of operations (
3) Compliance with laws and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

internal control system is deemed to comprise two key elements:

A

Control environment” – the management’s attitude and philosophy regarding controls. This can be ascertained to a degree by the number of control procedures the company has

“Control procedures”/activities -the actual policies and procedures in place which ensure that risks and errors are minimised, e.g. performing a monthly inventory count provides evidence of a strong control environment surrounding inventory management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

General controls

A

Password controls

Physical controls such as swipe cards restricting entry to computers.

Fire alarms and smoke detectors would also be included in this heading

Personnel controls – Ensuring that staff are aware of the importance of good computer security by recruiting motivated, intelligent staff and giving them sufficient training and supervision

Environmental controls – such as fire detectors

Contingency (or “disaster recovery”) plan – a document detailing the plan of action should a disaster such as a fire or flood occur.

Regular backups of key data

Virus protection

Firewalls

Spyware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Application Controls

A

Data verification controls e.g. having mandatory fields on an application form

Data validation e.g. credit card number validity

Exception reports – where any values over a certain value are highlighted in a separate report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Systems Development Lifecycle

A

Planning/Feasibility study – Initially, there will be recognition that “things can be done better”.

Systems analysis – This process ranks the available systems and will ultimately determine whether the company produces the new system in-house or outsources its design.

Systems design – Describes desired features and operations in detail, including screen layouts, business rules, process diagrams and other documentation (e.g. flowcharts).

Systems development – The system can then be built, with changes to the new system documented carefully so that future updates and developments can be carried out.

Implementation – The new system can be introduced, according to application or location, and the old system gradually replaced

Maintenance – The correction or enhancement of systems once they are in operation. A postimplementation review offers the opportunity to check that the system:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

problems with a value for money audit

A

The objectives of the activities being measured may not be clear.,

Effectiveness may be difficult to measure.

There may be a contradiction between focusing on efficiency and economy and focusing on effectiveness.

Pursuit of economy may lead to quality falling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The four objectives of cybersecurity

A

availability,

confidentiality,

integrity of data

integrity of processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Place the steps in the system monitoring process in the correct order:

A

1st. → Establish a monitoring strategy based on business need and assessment of risk,

2nd. → Monitor all systems across the network, including network traffic and user activity,

3rd. → Establish a centralised capability to collect and analyse information,

4th. → Ensure that policies and processes are in place to manage and respond to incidents,

5th. → Conduct a ‘lessons learned’ review after any security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Relating to the Balanced Scorecard

Market share

Value added

A

Market share → Non-financial, Value added → Financial

24
Q

Which one of the following sentences best describes risk?

A

The expected impact of uncertain future events on objectives

25
Q

The four levels to the COSO ERM framework

A

are subsidiary, business unit, division and entity

26
Q

Key features of assurance mapping

A

Assurance mapping will help the non-executive directors understand the compliance requirements of Jig Plc (Correct)

Assurance mapping will help the non-executive directors to understand any gaps where a mitigation strategy for a particular risk is lacking (Correct)

The transparency provided by assurance mapping will help directors to fulfil their duties (Correct)

It will not provide full briefing on the current internal audit plan.

Internal auditors will drive the assurance mapping exercise 

27
Q

COSO stated that effective internal control systems consist of five integrated elements

A

Control environment.

Risk assessment.

Control activities.

Information and communication.

Monitoring.

28
Q

An effective anti-fraud strategy has four main components –

A

prevention, detection, deterrence and response.

29
Q

Centralised management

A

is a key way to control and orchestrate important security features.

30
Q

The Turnbull guidance described three features of a sound internal control system:

A

Firstly, the principles of internal control should be embedded within the organisation’s structures, procedures and culture.

Secondly, internal control systems should be capable of responding quickly to evolving risks to the business arising from factors within the company and to changes in the business environment.

Thirdly, sound internal control systems include procedures for reporting immediately to appropriate levels of management any significant control failings or weaknesses that are identified, together with details of corrective action being undertaken.

31
Q

the three prerequisites for fraud

A

Rationalisation

Opportunity

Motive

32
Q

developing a sound ethical culture to ensure the long-term survival

A

CIMA recommends that organisations have:

a mission statement that refers to quality or, more unusually, to ethics and defines how the organization wants to be regarded externally

clear policy statements on business ethics and anti-fraud, with explanations about acceptable behaviour in risk prone circumstances

a route through which suspected fraud can be reported

an aggressive audit process that concentrates on areas of risk

management who are seen to be committed through their actions.

33
Q

The Audit Committee should be responsible for

A

Recommending appointment, or removal of the company’s external auditor (Correct)
Reviewing the company’s system of internal financial controls (Correct)

34
Q

Which THREE of the following are the key components of the AICPA cyber security risk management reporting framework?

A

Management’s description
Management’s assertion
The practitioner’s opinion

35
Q

Risk reduction can be achieved using which of the following theories?

A

Portfolio theory

36
Q

Inherent risk

A

A risk that exists regardless of internal controls

37
Q

Turnbull suggested that control systems should be

A

1) embedded in the operation and not a separate exercise
2) able to respond to changing risks within and outside the company
3) include procedures for reporting controls failings and weaknesses.

38
Q

A fraud response plan normally includes a section on

A

Corporate policy (Correct)
Roles and responsibilities (Correct)
Investigation and evidence (Correct)

39
Q

Inclusion in the report on the risk committee’s activities over the year as part of the company’s annual report.

A

The report should provide stakeholders with assurance that the committee is robust, comprised of suitable employees and able to carry out its roles effectively.

Description of purpose (Correct)
Details of membership (Correct)
Individual members attendance (Correct)
Roles and responsibilities (Correct)

40
Q

the most important aspects of cyber security.

A

AIC stands for:

Availability, Integrity, Confidentiality

41
Q

E-commerce

A

refers to the conducting of business electronically via some sort of communications link and may result in access to larger markets, targeted marketing, reduced costs and elimination of intermediaries.

42
Q

Compliance audits check the implementation of written rules, regulations and procedures. They verify that a check is taking place, so it is possible they may uncover that the required % of quality checks is not taking place.

A

check the implementation of written rules, regulations and procedures. They verify that a check is taking place, so it is possible they may uncover that the required % of quality checks is not taking place.

43
Q

Substantive tests concentrate on output (the end result) ensuring that it is as expected

A

concentrate on output (the end result) ensuring that it is as expected

44
Q

The principles of the UK governance code relate to:

A

Board Leadership and Company Purpose
Division of Responsibilities
Composition, Succession and Evaluation
Audit, Risk and Internal Control
Remuneration

45
Q

The risk of losses arising to a company due to theft is:

A

Pure risk

Downside risk

46
Q

Natural disaster risk

A

Event risk

47
Q

Which of the following statements are true of a steering committee?

A

The steering committee monitors the system implementation in comparison with the plan and ensures that specific deliverables are accepted at each stage of systems development. It has overall responsibility to ensure that the system meets requirements in terms of quality, time and cost.,

The steering committee brings together the sponsor of the project; the project manager who is responsible for the day-to-day delivery of the project; specialist IT staff with responsibility for delivering the project and user representatives with responsibility for accepting the system.

Not responsible for- budget creation, the needs of internal audit or considering ethical implications

48
Q

Post implementation audit (review)

A

The system is secure,
The system meets the needs of managers,
The system produces accurate information

Not-
Time taken or cost incurred.

49
Q

Which of the following are true with regard to a post-completion audit?

A

Post-completion audits could produce valuable insights.
Post-completion audits will not prevent dysfunctional behaviour by project sponsors.
It may be difficult to introduce post-completion audits.

Not-
Post-completion audits cannot be conducted until the project has reached its end

50
Q

ISO 31000
7 ways to deal with risk

A

Avoiding the risk

Excepting the risk

Removing the risk source

Changing the probability

Changing the outcome

Sharing the risk

Retaining the risk

51
Q

Economy

A

It’s considered by looking at the inputs such as the budget

52
Q

Effectiveness

A

Is considered by examining the outputs, so whether the objective was achieved

53
Q

Efficiency

A

Involves the examination of the relationship between inputs and outputs

54
Q

Four characteristics of technology has to find by AICPA

A

Type

Connection

Service providers

Delivery channels

55
Q

Appropriate controls to defend against the risks posed by laptops

A

Disc encryption

Policies regarding safe storage

56
Q

SIEM system
Security information and event management

A

Analyses all of the available data and looks for patterns the suggest unusual activity that could be a security compromise or a possible attack

Collect data from multiple sources enabling faster incident response to threats.

If an anomaly is detected it might collect more information, trigger an alert or quarantine an asset.

57
Q

COSO 2017 framework

A

Governance and culture

Strategy and objective setting

Performance

Review and revision

Information, communication and reporting