audit 2 practice

¡Supera tus tareas y exámenes ahora con Quizwiz!

recording responsibility authorization

Access to accounts receivable records gives an individual ______,

employee fraud

missappropriation of assets is another term for

material weakness

The focus of AS 2201 is to determine whether a(n)____ exists at the end of the year being reported on. If it does, the entity's internal control over financial reporting cannot be considered effective.

walkthrough

The identification of IT applications and systems typically occurs during the______ of each financial reporting process

passwords

The most common form of control related to access is the use of

subsequent cash receipts

The most effective alternative procedure to confirmations to ensure existence is examining ______.

pprogram change

the objectives ___ parallel are to provide reasonable assurances regarding modifications to existing programs

true

True or false: When a user entity employs a service organization for specialized processing, the user entity's auditors must still evaluate controls related to the service organization's computerized processing for the user entity.

usually involves some type of falsification generally includes a cover-up is also called misappropriation of assets

employee fraud

are a type of insurance policy may include employee background checks are often recommended by auditors

fidelity bonds

always required

According to professional standards, the audit team's evaluation of the sufficiency of management's control activities is ______.

existence rights and obligations

Accounts receivable confirmation is a substantive procedure designed to obtain evidence of the _____and rights & obligations of customers' balances directly from the

voucher

Cash disbursements are typically authorized by an accounts payable department's assembly of supporting documents which is called a(n)____

computer abuse computer fraud

Experts have two definitions related to computer chicanery

customer master file

For current status, including up-to-date credit limit information, auditors may test a sample of the

internal controls

For each relevant assertion identified by the auditor, professional standards require auditors to first gain an understanding of the ______ that have been designed to mitigate the risk of material misstatement.

never handle the cash

The accountant who record cash receipts and credits to customer accounts should ______.

systematic processing input

In an information technology environment, audit teams need to be concerned with ______ errors.

timely/reliable/relevant

Professional standards recognize that to make effective decisions, managers must have access to ________ and ___ information

moderate

The audit team must adjust the substantive procedures accordingly in order to obtain enough evidence to mitigate the risk of material misstatements to a low level for the relevant assertions being tested if the assessment of control risk is ______.

inherent/ control

The risk of material misstatement is a combination of ___ risk and __ risk

F

True or false: Auditing standards recommend but generally do not require the use of confirmations for accounts receivable.

errors will result in all similar transactions between processed incorrectly

When computerized processing is used ______.

possibility of temporary transactions trails potential for errors and frauds potential for increased management supervision

When evaluating tests of controls within an IT environment, auditors need to consider the ______.

the same as

When companies process payments electronically, the required separation of duties is ______ for companies that write paper checks.

customer invoice evidence of shipment customer sales order

Which of the following documents should be matched before recording revenue?

significant deficiency

A deficiency in internal controls that is less severe than a material weakness yet important enough to merit attention from those charged with governance is a(n)

packing slip

A description of the goods being shipped as well as the quantity shipped is found on the ______.

business risks

All entities recognize the need for a formalized process to identify, assess and manage factors, events and conditions, known as___that can prevent the organization from achieving it objectives.

inherent

An account's significance is based on its ______ risk.

implies controls are ineffective implies controls cannot be relied upon

An audit team's assessment of control risk as high ______.

implies controls are effective allows auditors to use smaller sample sizes may limit the use of substantive tests of details

An audit team's assessment of control risk as low ______.

fidelity bond

An insurance policy that covers most kinds of cash embezzlement losses is called a(n)

enterprise risk management

COSO developed a(n) ______ framework to facilitate the assessment and mitigation of business risks a company faces.

make it difficult for a fraudster to steal cash detect fraudulent activity if it occurs prevent or detect misappropriations of cash

Control activities over cash disbursements are designed to ______.

automated application controls

Controls applied to specific business activities within an accounting information system to achieve financial reporting objectives are called

audit risk

Detection risk is set based on the level of _______and risk of material misstatement.

-help the audit team assess the key control points in the process -involve considerable time and effort -have become a popular documentation method for auditors -are time-consuming to construct -are easy to evaluate after they are completed -can be helpful in identifying missing controls

Flowcharts ______.

entity-level

For all relevant assertions for each significant account and disclosure, the audit team begins by examining___-___controls that are pervasive to the internal control system and reliability of the financial statements as a whole.

working late drinking too much irritability defensiveness working standing up inability to relax

Fraudsters behaviors often include ______.

the risk of material misstatement increases fraud may or may not exist auditors need to design substantive procedures related to control failure

If a control is missing or ineffective ______.

must still review the account for collectability

If a customer confirms that an account exists, the auditor ______.

substantive

If controls are not in place or personnel are not performing control activities effectively, auditors need to design____procedures to try to detect whether control failures have produced material misstatements in the financial statements.

revenue recognition

Sales must be realized or realizable and earned in order to be recorded under the accounting standards related to

-prevents incompatible responsibilities -prevents fraud that do not involve collusion -forces different people or departments to deal with different facets of transactions

Separation of duties ______.

control activities

Specific actions a client's management and employees take to help ensure management's directives are carried out are called

audit risk

When a material misstatement is not prevented or detected by the client's internal controls or auditors' substantive procedures,_____ has been manifested

operating deficiency

When a properly designed control is either ignored or inappropriately applied, a(n) ______ has occurred.

alternative audit procedures may be warranted a written response still needs to be requested

When an auditor receives an oral response to a confirmation ______.

inquiry

When testing controls, the audit team often uses----- about the existence of the activity and then corroborate the evidence by observing the control activities are actually being performed.

Automated application

Which of the following is NOT a category of general controls?

generally acting alone socially conforming attended college some type of religious affiliation no arrest record

a typical white collar criminal is

cash receipts journal

all the debits to the cash accounts are found in the

programmers - computer operators

an important general control is the separation of duties erformed by system analysts ____ and ___

custody authorization, reconciliaiton

proper separation of duties involves different people and departments handling______ of checks, cash disbursement ____ record keeping for payments and bank ___

general IT controls

A safe and secure computing environment that allows the operating controls to operate effectively is provided by the

realized or realizable

According to accounting standards, to be recognized, revenue must be __ and earned

rights & obligations existence

Accounts receivable confirmation is a substantive procedure designed to obtain evidence of the ______ of customers' balances directly from the customer.

-the internal control system is too ineffective to rely on -it is less time consuming to conduct substantive tests -the cost of obtaining a low control risk assessment is high

After their understanding of the entity's internal controls have been documented, the audit team may choose not to perform tests on the operating effectiveness of the controls because ______.

make a preliminary assessment of control risk

After understanding and documenting internal control, the audit team should be able to ______.

deliberate circumvention

An employee knowingly doing something to bypass the internal control system is an act of ______.

because not all fraud schemes can be thwarted or detected

An entity's auditors, accountants and security personnel must be acquainted with the basics of fraud awareness ______.

computer operations

Having an appropriate disaster recovery plan to ensure files are secured and protected from loss is a major objective of_____

Blank 1: completeness Blank 2: occurrence

Prenumbered documents are important in testing the ___ and the ___ assertion

always performed in the revenue cycle

Substantive procedures are ______.

reasonable assurance

The COSO definition states that internal control is designed to provide ___regarding the achievement of objectives in three categories.

entity-level controls

The audit team's first step in gaining an understand of the client's internal control system should focus on ______.

cutoff

The auditors' information source for validating the bank reconciliation is typically a(n)_____ bank statement

cutoff

Tracing shipping documents before and after year-end to the sales journal and vouching credit memos for returns after year end to receiving reports are done to test the

false

True or false: A walkthrough can be used to provide evidence of whether the client's control activities were operating effectively during the period under audit.

false Reason: A six character lower case alphabetic password of 6 characters can be hacked in 10 minutes.

True or false: All passwords should be at least six characters long to make hacking by computer-generated algorithms difficult.

collusion

Two or more people working together to circumvent the internal control system is called____ and it cannot be prevented by separation of duties.

Run-to-run totals ^ its a processing control

Which of the following is NOT an input control?

There is always a presumptive risk of fraud. It consists of routine transactions. Tests of controls often support a reduction in control risk.

Which of the following statements regarding the revenue cycle are correct?

Computer forensics

"The science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media" is the FBI definition of

output

Reasonable assurance that only authorized persons have access to files produced by the system is one concern of______

review merchandise returns continually review revenues and compare them to budgeted and forecasts scrutinize total write-offs of accounts receivables

Regarding the revenue process, management should ______.

Confirming a specific transaction may be more effective than confirming the account balance. Confirmation returned as "undeliverable" are always a red flag.

Which of the following statements are correct?

For a sample to be representative, all items in the population have an opportunity to be selected. Tests of controls should be applied to samples executed throughout the period under audit.

Which of the following statements are correct?

control environment

Integrity, ethical values and competence of the entity's people are all___factors The foundation for all other components of internal control

valuation assertion

Reviewing accounts for collectability and determining the adequacy of the allowance for doubtful accounts is done in support of the

data entry and formatting

Standardized formats and screens are examples of ______ controls.

-requires management to assess the risks it wishes to control -makes managers responsible for establishing a control environment -makes management responsible for monitoring, supervising and maintaining control activities -is designed to ensure the proper "tone at the top" -allows managers to make their own judgments about the necessity of specific controls

section 302 of the sarbanes-oxley act

input

Controls that provide the opportunity for entity personnel to correct and resubmit data initially rejected as erroneous are called

representative

A key factor in audit sampling is that, for a sample to be considered____ all items in a population must have an opportunity to be selected

reasonable / possibility

A material weakness is a deficiency that results in a(n)_____ ___ that a material misstatement would not be prevented or detected on a timely basis.

design deficiency

A problem relating to either a necessary control that is missing or an existing control so poorly constructed that it fails to satisfy the control's objective is called a(n) ______.

overall review by management

A strong entity-level control in the revenue process is ______.

competence/objectivity

AS 2201 encourages the audit team to use the work of internal auditors but the audit team must evaluate their___ and ___

receipts disbursements

Adjusting and correcting entries that result from bank reconciliations are found in the cash ______ journal.

relevant

An assertion that has a reasonable possibility of containing a material misstatement is considered to be a(n) ____assertion.

an independent employee

At the end of each day a copy of the check listing, a report of payments recorded in accountants receivable and a copy of the bank deposit slip should be received by ______.

-possibility of input errors -possibility of inappropriate access -to computer files and programs lack of an audit trail

Audit considerations in an IT environment include ______.

entity

Audit professionals generally categorize------- level controls as either general controls or application controls.

document that understanding in the workpapers

Auditors must gain an understanding of internal controls that are in place to mitigate assessed fraud risk and, at a minimum,______.

completeness

Auditors review items in the pending order file for evidence of the_____ of recorded sales and accounts receivable

input processing output

Automated application controls are organized under three categories,

may

Because of the nature of cash, auditors ______ need to expand substantive audit procedures to ensure the cash balance is not materially misstated and to identify possible fraudulent activities.

effectiveness/efficiency

COSO internal control categories include ______and_____ of operations.

reliability/compliance

COSO internal control categories include_____ of financial reporting and _____ with applicable laws and regulations.

incompatible

Combinations of duties that place a single person in a position to create and conceal misstatements due to errors or frauds in their normal job are___ responsibilities

-self-assessments by boards regarding the effectiveness of their oversight -supervisory review of controls -periodic evaluation of controls by internal audit -self-assessments by management regarding the tone they set -quality assurance review of the internal audit department -analysis of and follow up items that might by indicative of a control failure

Common monitoring controls include ______.

observation inquiry

Common procedures used in tests of controls are_____, inspection and reperformance

used in automated processing are appropriate can be reconstructed from earlier versions of processing information are appropriately secured and protected from loss

Computer operations controls are implemented for files and data used in processing with the major objectives of ensuring files ______.

entity

Controls that are pervasive to the internal control system and the reliability of the financial statements as a whole are called ______ - level controls.

output

Which type of controls are concerned with detecting rather than preventing errors?

change in customer base changing economic conditions revised credit policies Need help? Review these concept resources.Read About the Concept Feedback

Difficulties in estimating the allowance for doubtful accounts can be due to ______.

rarely

Due to the lack of predictability of the cash balance, auditors ______ use substantial analytical procedures to test cash.

should be subject to standard approval procedures after they are made require appropriate documentation should be migrated by appropriate individuals

Emergency change requests and the migration of new programs into operations, ______.

credit limits are appropriate files are accurate

It is important to maintain an up-to-date customer master file to ensure ______.

preventive controls

Errors and frauds are kept from entering the system by

-are somewhat unique for each organization -can be useful in detecting internal control weaknesses -help the auditing team obtain evidence about the control environment

Gaining an understanding of internal controls should start by identifying

significant / relevant assertions

Gaining an understanding of internal controls should start by identifying___ accountd and disclosures and their ___ ___

transaction-level controls related to that risk may not be needed

If the audit-team decides an entity-level control sufficiently reduces a specific risk ______.

substantive audit procedures

If the internal control activities over cash are not operating effectively, auditors may need to expand ______.

computer forensics

Impeaching a president, terrorist tracking and child pornographer prosecution have all been helped by

requires proper permissions

In a computerized environment, proper separation of duties ______.

dependent on proper password controls

In a computerized environment, proper separation of duties is ______.

audit trail

In an IT environment, a chain of evidence and documentation known as a(n) ----- does not exist

dependency

In determining whether an audit team can rely on IT controls, auditors must determine the scope of the IT testing plan completed by carefully identifying each of the IT

remittance advices should be sent to the controller's office for recording cash should be deposited daily and intact two people should open the mail checks should be endorsed immediately Need help? Review these concept resources.Read About the Concept Feedback Next Question Reading

In many situations an employee initially receives cash and thus has custody. Because this cannot be avoided, good control dictates that ______.

administrative

Individuals employed by the entity and limitations or limits on the nature and scope of activities they perform are the focus of

confirmations would be ineffective other procedures provide sufficient, competent evidence receivables are not material

Justifications for not using confirmations may include ______.

-the nature of the underlying accounting records, information and accounts used to execute a transaction -how the information system captures events and conditions other than transactions significant to the financial statements

Obtaining an understanding of the information system relevant to financial reporting includes understanding ______.

computer operation

Providing reasonable assurance that processing failures do not affect or delay the processing of other transactions is one objective of

far more expensive

Procedures related to internal control in an integrated audit performed under AS 2201 are ______ than those in a GAAS audit for a nonpublic entity.

data entry

Restrictions on access to input devices and standard screens and computer prompting are examples of _____ controls in end-user computing environments

always be performed

Substantive procedures over cash will ______.

true

True or false: Prenumbered documents are an example of an internal control.

is equivalent to assessing control risk at 100%

The audit team's decision that it would take more time to test the operating effectiveness of the control activities than it would take to perform the substantive tests necessary for a relevant assertion ______.

top-down

The audit team's focuses on threats to the integrity of the external financial reporting process by taking a _____- approach to evaluating the effectiveness of the internal control system over financial reporting.

walkthrough

The auditor selects examples of a transaction and traces them from initial receipt to the recording in the accounting records when performing a(n)

helps search for unrecorded liabilities verifies the existence of year-end deposits in transit qualifies as external evidence

The cutoff bank statement ______.

1 control environment 2 risk assessment 3 control activities 4 monitoring 5 information and communication

The five basic components of a properly designed internal control system as defined by COSO are:

bill of lading

The form the carrier signs to verify goods are shipped is a(n) ______.

inquiry/ observation/reperformance

The four methods of testing controls are ___ ___ document examination and ___

material weakness and significant deficiency

The magnitude of the potential misstatement that could occur and would not be detected on a timely basis is the primary difference between a(n) ______.

determining the scope of the IT testing plan by identifying each IT dependency testing the IT controls understanding the IT controls and processes that need to be tested

The major phases that need to be completed in order to determine whether an audit team can rely on IT controls are ______

may be made after understanding and documenting internal control includes identifying activities explicitly designed to support reliable financial statement reporting

The preliminary assessment of control risk ______.

bank reconciliation

The primary document used to test the cash balance in the financial statements is the company's

false Reason: While it is true these functions are not always separated, it often occurs because of a lack of resources, not indifference.

True or false: Small entities often fail to separate the functions of programming and operations due to indifference with respect to internal control.

true

True or false: The bank reconciliation is an opportunity for management to monitor the separation of duties between cash receipts and disbursements.

computer abuse or computer fraud

The use of information technology by a perpetrator to achieve a gain at the expense of a victim is called

cutoff tests

To ensure sales are recorded in the proper period, auditors use sales

false they are as of the end of the fiscal year

True or false: For audits of internal control, the audit team must understand and evaluate internal controls for the entire period.

false Reason: Companies come in many different sizes and there are also differences between industries.

True or false: There is no such thing as a typical revenue and collection cycle.

false The components work in an integrated manner

True or false: To achieve the specific objectives of each of the three goals, the COSO framework defines five components of a properly designed internal control system that work independently of each other to support the system's overall effectiveness.

false ^ perfection is not an option, settle for effective

True or false: When doing a WCGW analysis, the question the auditor should ask is, "Has the client designed and implemented a control that, if operating perfectly, would mitigate the identified risk of material misstatement?"

exception

Using an automated test procedure designed to test all items in a population as a means to identify a violation of control activities is an example of ___ testing Comparing all customers' credit limits to the sum of their outstanding credit balance plus a potential sales transaction as a means of checking for potential over-limit conditions is an example of ______ testing.

cutoff

Verifying the dates on sales documents helps reduce the risk of misstatement related to the____ assertion of revenue

sampling

When control activities do not lend themselves to automated testing, the audit team is likely to use audit____ to test the population

existence

When customers are not willing or able to return confirmations, examining subsequent cash receipts, sales orders, invoices, and shipping documents, and correspondence files for past-due accounts are alternative procedures that may be performed to ensure

deficiency

When either the design or operation of the control under consideration does not allow the entity's management or employees to detect or prevent misstatements in a timely fashion an internal control___ exits

key control activities being relied on the mitigate the RMM

When scoping the IT audit procedures that need to be completed, auditors need to be concerned with ______

rely exclusively on tests of detail

When testing cash, auditors typically ______.

valuation

When the auditor evaluates the reasonableness of the allowance for doubtful accounts,___________is a high risk assertion.

Purchasing raw materials

Which of the following is NOT a basic activity in the revenue and collection cycle for a typical manufacturing company?

Programs and software support the entity's financial reporting requirements.

Which of the following is NOT a computer operations control?

Transaction logs

Which of the following is NOT a data entry control in end-user computing environments?

Separation of programming and operations functions

Which of the following is NOT a typical end-user computing environment control issue that audit teams must consider?

Access control software and passwords

Which of the following is NOT an administrative level control?

Someone without access to check-writing should perform the recording function. Individuals outside of normal cash operations should prepare bank reconciliations.

Which of the following statements are correct?

Tests of controls over cash often support a reduction in control risk. Most audit clients have strong controls over cash.

Which of the following statements are correct?

input

Which type of controls are designed to provide reasonable assurance that data received for processing by the computer department have been properly authorized and accurately entered or converted for processing?

entity level controls

Within a client's IT environment, there are essential, general IT controls that apply to all applications that are called

-tend to be inflexible -should be used in combination with other methods -make it less likely for the audit team to forget to cover an important point -can be useful in detecting internal control weaknesses -are somewhat unique for each organization -help the auditing team obtain evidence about the control environment

internal control questionnaires

significant/material/weakness

serious internal control deficiencies can be categotized as either ____ decifiencies or __ __

communicates internal control issues to help management carry out internal control monitoring responsibilities must communicate significant deficiencies and material weaknesses identified during the audit

the audit team

service organizations

user entities may outsource specialized data processing to other companies referred to as


Conjuntos de estudio relacionados

Quickbooks Certification Section 5

View Set

Test #3 Multiple Choice Q&A Ch. 14, 15, 17, 18, 20

View Set

PSY340: Chapter 10 Tutorial Quiz

View Set

True or False Questions from Lectures

View Set