Unit 6 Test Flashcards
An organization’s internal controls have been deemed effective by management and external audits for the last five years. A proposal is made to upgrade the enterprise resource planning (ERP) system at a significant cost. The proposal mentions slightly increased IT controls to better detect errors.
Which modifying assumption would keep management from implementing the upgrade?
Management responsibility Reasonable assurance System limitations Methods of data processing
Reasonable assurance
The correct answer is “Reasonable assurance.” The reasonable assurance modifying assumption states that the four objectives of internal control are met in a cost-effective manner. The upgrade is expensive, and the benefits will be limited. Since the current system is effective, the management team may decide to reject the upgrade due to cost-effectiveness.
Which component of the Committee of Sponsoring Organizations of the Treadway Commission (COSO) framework is being considered when an auditor is comparing a company’s organization chart to the prior year’s chart to identify new personnel who are responsible for internal controls?
Control activities Control environment Risk assessment Monitoring
Risk assessment
The correct answer is “Risk assessment.” Risk assessment’s purpose is to identify, analyze, and manage risks related to financial reporting. New personnel create risk because they may not fully understand or be aware of an organization’s internal controls.
What is one of the four areas that ethical issues in business can be divided into?
Risk minimization Honesty Proportionality Computer ethics
Honesty
The correct answer is “Honesty.” Ethical issues in business can be divided into the areas of equity, rights, honesty, and exercise of corporate power. These areas can be used to assess any ethical situation, whether it is a computer-based issue or not.
A disgruntled employee places a logic bomb to erase an organization’s supplier list.
Which type of fraud does this scenario reflect?
Program fraud Operations fraud Scavenging fraud Database management fraud
Database management fraud
The correct answer is “Database management fraud.” Database management fraud involves altering, deleting, corrupting, destroying, or stealing an organization’s data.
Which access point is the most common for committing computer fraud?
Information dissemination Data collection Information generation Data processing
Data collection
The correct answer is “Data collection.” The data collection stage is the most common access point for perpetrating computer fraud.
According to the Public Company Accounting Oversight Board (PCAOB) Standard No. 5, auditors need to understand transaction flows, including the controls pertaining to how transactions are initiated, authorized, recorded, and reported.
Which accounts are affected by this requirement?
All financial accounts of an organization All financial accounts with material implications for financial reporting All financial accounts with implications for financial reporting All financial and nonfinancial accounts of an organization
All financial accounts with material implications for financial reporting
The correct answer is “All financial accounts with material implications for financial reporting.” The auditors are interested in the financial accounts that can materially affect the accuracy of the financial statements.
Management is required to provide external auditors with documented evidence of functioning controls related to selected material accounts in a report on control effectiveness.
How is this evidence obtained?
The IT department documents this evidence. The internal audit department documents this evidence. The documented evidence is provided by the information system. The documented evidence is provided by the information system vendor.
The internal audit department documents this evidence.
The correct answer is “The internal audit department documents this evidence.” The internal audit department of the organization would perform and document the necessary tests.
What is a common form of contra-security behavior?
Changing passwords Complex passwords Challenge-response syndrome Post-it syndrome
Post-it syndrome
The correct answer is “Post-it syndrome.” The post-it syndrome, in which passwords are written down and displayed for others to see, is a contra-security behavior.
What are two general forms of risk related to the technology of network communications?
Data corruption and degraded computer performance Subversive threats and equipment failures Abuse of authority and application errors Internal and external individuals who exploit security flaws
Subversive threats and equipment failures
The correct answer is “Subversive threats and equipment failures.” The technology of network communications is subject to two general forms of risk: subversive threats and equipment failures.
What represents an equipment failure risk in a communication system?
A denial-of-service attack A loss of databases stored on network servers A computer hacker gaining unauthorized access A computer criminal intercepting a message
A loss of databases stored on network servers
The correct answer is “A loss of databases stored on network servers.” Equipment failures can result in the loss of databases and programs stored on network servers.
Which information technology (IT) test category verifies that credit checks and accounts payable (AP) three-way matches are performed by an application?
Accuracy test Completeness test Validity test Redundancy test
Validity test
The correct answer is “Validity test.” A validity test verifies that credit checks and AP three-way matches are properly performed by the application.
Which characteristic applies to black box testing?
It is used for inputs and outputs that are easily reconciled. It requires the use of generalized audit software. It is used on complex applications. It requires test files for execution.
It is used for inputs and outputs that are easily reconciled.
The correct answer is “It is used for inputs and outputs that are easily reconciled.” Black box testing is feasible for applications that are relatively simple with inputs and outputs that are easily reconciled.
Why is an accumulator routine used in a banking application?
To explain differences in reporting To address rounding errors To collect account balances To catch overpayments
To address rounding errors
The correct answer is “To address rounding errors.” An accumulator routine is a special technique used to keep track of the rounding differences between calculated and reported balances.
Which scenario accurately represents the general approach used to test application controls for a batch processing application?
Auditor-created data are submitted in a transaction file. Accountant-created data are submitted from their workstations. Auditor-created data are submitted via a dummy terminal. Accountant-created data are submitted in a data upload.
Auditor-created data are submitted in a transaction file.
The correct answer is “Auditor-created data are submitted in a transaction file.” Auditor-created data are submitted in a transaction file.
Which component of the Committee of Sponsoring Organizations of the Treadway Commission (COSO) framework is being considered when an auditor is reviewing a walk-through and process narrative of an established process and decides to gain an understanding of the process by tracing a single transaction from the source documents through the accounting information system to the financial statements?
Risk assessment Control environment Information and communication Monitoring
Information and communication
The correct answer is “Information and communication.” By gaining an understanding of the process and following a transaction through the system an auditor can assess how the system processes information (transaction processing) and communicates the results (reporting). Testing a single transaction would not qualify as testing of the control environment , ensuring monitoring or showing how management assesses risk. It would help in gaining an understanding of what information is in the system and how it is reported.