TEST3 - AIS

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are some threats to AIS?

natural and political disasters, software and equipment malfunctions, unintentional acts, intentional acts

What was the primary charge of COSO?

to identify factors that could lead to fraudulent financial reporting, improving financial reporting quality and provide guidance on internal control evaluation

Which of the following XBRL documents contains the actual data values for a company's net income for a particular year? a. style sheets b. schema c. linkbases d. instance document

instance document

Which of the following is the correct order of the risk assessment steps discussed in this chapter? a. identify threats, estimate risk and exposure, identify controls, and estimate costs and benefits b. identify controls, estimate risk and exposure, identify threats, and estimate costs and benefits c. estimate risk and exposure, identify controls, identify threats, and estimate costs and benefits d. estimate costs and benefits, identify threats, identify controls, and estimate risk and exposure

A

Which of the following statements about the control environment is FALSE? a. management's attitude toward internal control and ethical behavior have little impact on employee beliefs or actions b. an overly complex or unclear organizational structure may be indicative or problems that are more serious c. a written policy and procedures manual is an important tool for assigning authority and responsibility d. supervision is especially important in organizations that cannot afford elaborate responsibility reporting or are too small to have adequate separation of duties

A

employee uses assets for personal benefit; inventory theft

Asset Abuse

responsible for financial reporting, regulatory compliance, internal control, and hiring and overseeing internal and external auditors, who report all critical accounting policies and practice to them

Audit Committee

allows transactions to be traced back and forth between their origination and the financial statements

Audit Trail

management establishes policies for employees to follow and then empowers them; documented by signing, initializing, or entering a ______________ code on a document or record

Authorization

What are the three effective ways to segregate accounting duties?

Authorization, Recording, Custody

To achieve effective segregation of duties, certain functions must be separated. Which of the following ist he correct listing of the accounting-related functions that must be segregated? a. control, recording, and monitoring b. authorization, recording, custody c. control, custody, authorization d. monitoring, recording, and planning

B

a specialized software based on the probability of digits; analytical technique used to detect possible errors, potential fraud, and other irregularities

Benford's Law

Which of the following is a control procedure relating to both the design and use of documents and records? a. locking blank checks in a drawer b. reconciling the bank account c. sequentially pre-numbering sales invoices d. comparing actual physical quantities with recorded amounts

C

process of making sure that changes are made smoothly and efficiently and that they do not negatively affect systems reliability, security, confidentiality, integrity, and availability

Change Management

artificially boost sales at end of fiscal year by offering distributors and dealers special incentives to purchase more goods than they need

Channel Stuffing

change the name of the payee/amount after check is written,

Check Tampering

checks accuracy of input data by using it to retrieve and display other related information

Closed-Loop Verification

What are the three components of opportunity within fraud?

Commit, Conceal, Convert

help the company comply with all applicable laws and regulations

Compliance Objectives

fraud that requires computer technology knowledge to perpetrate, investigate, or prosecute it; unauthorized theft, use, access, modification, copying, or destruction of software or data, theft of assets by altering computer records, theft of computer time, etc.

Computer Fraud

policies and procedures that provide reasonable assurance that control objectives are met and risk responses are carried out

Control Activities

the framework that consolidates control standards from 36 different sources into a single framework that allows 1)management to benchmark security and control practices of IT environment 2)users to be assured that adequate IT security and control exist and 3) auditors to substantiate their internal control opinions and to advise on IT security and control matters

Control Objectives for Information and Related Technology (COBIT)

Which of the following is not an independent check? a. bank reconciliation b. periodic comparison of subsidiary ledger totals to control accounts c. trial balance d. re-adding the total of a batch of invoices and comparing it with your first total

D

ensures that source data have been properly approved, monitors the flow of work through the computer, reconciles input and output, maintains a record of input errors to ensure their correction and resubmission, and distributes systems output

Data Control Group

two or more items must be matched before an action can take place; before paying vendor, verify that invoice matches P.O.

Data Matching

what is the difference between the second line of defense and corrective controls?

Detective controls identify the errors and corrective controls fix them

means of signing a document with data that cannot be forged

Digital Signiture

each specific data item in an XBRL document

Element

the process the board of directors and management use to set strategies, identify events that may effect the entity, assess and manage risk, and provide reasonable assurance that the company achieves its objectives and goals

Enterprise Risk Management

mathematical product of impact and likelihood

Expected Loss

employee reports higher expenses for reimbursement than actually incurred; submits for expenses actually comped

Expense Padding

potential loss from threat

Exposure

need to be checked to ensure the correct amt most current files are being updated

File Labels

sums a field that contain monetary values (total $ amount)

Financial Total

what are the following pressures that can lead to employee fraud?

Financial, Emotional, Lifestyle

what are the pressures that can lead to financial statement fraud?

Financial, Industry Conditions, Management Characteristics

What act was passed to prevent companies from bribing foreign officials to obtain business?

Foreign Corrupt Practices Act

intentional conduct by act or omission that results in materially misleading financial statements; F/S falsified to deceive investors and creditors, increase stock prices, meet cash flow needs, hide company losses/problems

Fraudulent Financial Reporting

What two categories are internal controls segregated into?

General and application controls

sums of nonfinancial numeric field (total quantity ordered)

Hash Totals

at beginning of file with file name, expiration data, etc.

Header Record

risk that exists before management takes any steps to control the likelihood or impact of an event

Inherent Risk

XBRL file containing the tagged data that is delivered to users; contains facts about specific F/S line items, including values, and contextual information such as measurement unit and whether for specific point in time

Instance Document

process implemented by the board of directors, management, and those under their direction to provide reasonable assurance that these control objectives are met

Internal Control

the process implemented to provide reasonable assurance that the following objectives are achieved: - safeguard assets - maintain records in sufficient detail to report company assets accurately and fairly - provide accurate and reliable information - prepare financial reports in accordance with established criteria - promote and improve operational efficiency - encourage adherence to prescribed managerial policies - comply with applicable laws and regulations

Internal Control

COSO identified five interrelated components of internal control. Which of the following is NOT one of those five? A. risk assessment B. internal control policies C. monitoring D. information and communication

Internal Control Policies

influences how organizations establish strategies and objectives; structure business activities; and identify, assess, and respond to risk

Internal Environment

Who benefits from XBRL?

Investors, companies, relations with lenders

cash is created using the lag between the time a check is deposited and the time it clears the bank

Kiting

a perpetrator steals the cash or checks customer A mails in to pay A/R. Then funds from customer B are used to pay off customer A's balance, etc.

Lapping

test numerical amount against fixed values; hours work >/= 40 hours

Limit Check

any significant deficiency or aggregation of significant deficiencies

Material Weakness

committed by a person or group for personal financial gain; the most significant contributing factor in most of these cases is the absence of I.C. ad failure to enforce existing I.C.

Misappropriation of Assets

ensures that devices are linked to the organization's internal and external networks and that those networks operate properly

Network Management

what are the three components of the fraud triangle?

Opportunity, Rationalization, Pressure

system requests each input data item and waits for an acceptable response, ensures that all necessary data are entered; online completeness check

Prompting

created to control auditing profession; sets and enforces auditing, quality control, ethics, independence, and other auditing standards

Public Company Accounting Oversight Board (PCAOB)

What are the four ways management can respond to risk?

Reduce, Accept, Share, Avoid

help ensure the accuracy, completeness, and reliability of company reports; improve decision making; and monitor company activities and performance

Reporting Objectives

what remains after management implements internal controls or some other response to risk

Residual Risk

In the ERM model, COSO specified four types of objectives that management must meet to achieve company goals. Which of the following is NOT one of those types? a. responsibility objectives b. strategic objectives c. reporting objectives d. operations objectives

Responsibility Objectives

probability that the threat will occur

Risk (probability * exposure)

What act applies to publicly held companies and their auditors and was designed to prevent financial statement fraud, make financial reports more transparent, protect investors, strengthen internal controls, and punish executives who perpetrate fraud?

Sarbanes-Oxley Act of 2002

The definition of an XBRL element, including such information as whether its normal account balance as a debit or a credit, is found in which of the following? a. linkbase b. instance document c. schema d. style sheet

Schema

file that contains the definitions of every element that could appear in the instance document

Schema

maintains that management should provide reasonable assurance that control is adequate, management should provide timely, reliable financial information, a system of internal controls is necessary to discharge these obligations

Securities and Exchange Commission

makes sure that systems are secure and protected from internal and external threats

Security management

check if data has correct arithmic sign; quantity ordered should never be negative

Sign Check

an internal control deficiency or combination of deficiencies that is less severe than a material weakness, yet important enough to merit attention by those responsible for oversight of the registrant's financial reporting

Significant Deficiency

check if input will fit into assigned field

Size Check

employee pockets cash received from a customer, then reduces the amount of sale or omits the sale altogether

Skimming

provides instructions on how to appropriately display the content of an instance document

Style Sheet

makes sure all information system components operate smoothly and efficiently

System Administration

help users determine their information needs and design systems to meet those needs

System Analysts

set of files that defines various elements and the relationship between them

Taxonomy

any potential adverse occurrence that could harm the AIS

Threat

at end of file and contain batch totals

Trailer Data

compares account number with data in master file

Validity Check

Which of the following statements is false? a. the psychological profiles of white-collar criminals differ from those of violent criminals b. the psychological profiles of white-collar criminals are significantly different from those of the general public c. there is little to no difference between computer fraud perpetrators and other types of white-collar criminals d. computer fraud perpetrators often do not view themselves as criminals

b. the psychological profiles of white-collar criminals are significantly different from those of the general public

Which of the following is designed primarily to improve the efficiency of financial reporting? a. XML b. XBRL c. IFRS d. the balanced score card

XBRL

the general purpose language used to communicate financial data

XBRL

a file containing a set of customized tags to define new XBRL elements that are unique to a specific organization

XBRL extension taxonomy

Which data entry application control would detect and prevent entry of alphabetic characters as the price of an inventory item? a. field check b. limit check c. reasonableness check d. sign check

a

Once fraud has occurred, which of the following will reduce fraud losses? a. insurance b. regular backup of data and programs c. contingency plan d. segregation of duties

a, b, c

Which of the following conditions is/are usually necessary for a fraud to occur? (select all correct answers) a. pressure b. opportunity c. explanation d. rationalization

a, b, d

Which of the following causes the majority of computer security problems? a. human errors b. software errors c. natural disasters d. power outages

a. human errors

Which of the following is a fraud in which later payments on account are used to pay off earlier payments that were stolen? a. lapping b. kiting c. Ponzi scheme d. salami technique

a. lapping

make sure transactions are processed corrective

application controls

Which type of fraud is associated with 50% of all auditor lawsuits? a. kiting b. fraudulent financial reporting c. Ponzi scheme d. lapping

b. fraudulent financial reporting

Which of the following statements is true? a. COSO's enterprise risk management framework is narrow in scope and is limited to financial controls b. COSO's internal control integrated framework has been widely accepted as the authority on internal controls c. The Foreign Corrupt Practices Act has no impact on internal accounting control systems d. it is easier to add controls to an already designed system that to include them during the initial design stage

b. COSO's internal control integrated framework has been widely accepted as the authority on internal controls

Which of the following is an example of the kind of batch total called a hash total? a. the sum of the purchase amount field in a set of purchase orders b. the sum of the purchase order number field in a set of purchase orders c. the number of completed documents in a set of purchase orders d. all of the above

b. the sum of the purchase order number field in a set of purchase orders

summarize important values for bath input records

batch totals

All other things being equal, which of the following is true? a. Detective controls are superior to preventive controls b. Corrective controls are superior to preventive controls c. Preventive controls are equivalent to detective controls d. Preventive controls are superior to detective controls

d. Preventive controls are superior to detective controls

Which of the following is NOT an example of computer fraud? a. theft of money by altering computer records b. obtaining information illegally using a computer c. failure to perform preventative maintenance on a computer d. unauthorized modification of a software package

c. failure to perform preventative maintenance on a computer

Which of the following is a control that can be used to verify the accuracy of information transmitted over a network? a. completeness check b. check digits c. parity bit d. size check

c. parity bit

Which of the following is the most important, basic, and effective control to deter fraud? a. enforced vacation b. logical access control c. segregation of duties d. virus protection controls

c. segregation of duties

Which of the following controls would prevent entry of a nonexistent customer number in a sales transaction? a. field check b. completeness check c. validity check d. batch total

c. validity check

check if required items have been entered

completeness check

run the software on the company's computers. ensure that data are input properly, that they are processed correctly, and that output is produced when needed

computer operations

identify and correct problems as well as correct and recover from the resulting errors

corrective controls

make sure an organizations control environment is stable and well managed

general control

maintains custody of corporate databases, files, and programs in a separate storage area called:

information system library

Which of the following is NOT one of the responsibilities of auditors in detecting fraud according to SAS No. 99? a. evaluate the results of their audit tests b. incorporate a technology focus c. discuss the risks of material fraudulent misstatements d. catch the perpetrators in the act of committing the fraud

d. catch the perpetrators in the act of committing the fraud

Which of the following control procedures is most likely to deter lapping? a. encryption b. continual update of the access control matrix c. background check on employees d. periodic rotation duties

d. periodic rotation duties

discover problems that are not prevented

detective control

What does XBRL stand for?

eXtensible Business Reporting Language

check if character in field is proper type

field check

deal with the effectiveness and efficiency of company operations

operation objectives

a person's incentive or motivation for committing fraud

pressure

Which control is superior - preventative or detective?

preventative

deter problems before they arise

preventative control

What are the three important functions that internal controls perform?

preventative, detective corrective

take the analysts' design and create a system by writing the computer programs

programming

number of records in a batch

record count

the amount of risk they are willing to accept to achieve their goals

risk appetite

high-level goals that are aligned with the company's mission, support it, and create shareholder value

strategic objectives


Conjuntos de estudio relacionados

History 1311 final exam questions

View Set

Med-Chem/Pharm 3: Immune System & Inflammation (EXAM 4)

View Set

Chapter 4 Quiz: Units 31, 32, 35, 38

View Set

Principles of Marketing Mid-Term

View Set

Existing S-12 COF is renewable and can be UPGRADED to S-15 by taking T-15 exam

View Set

Major Provisions of 11 Consumer Credit Laws Keown Chapter 6

View Set

Material Requirements Planning (MRP)

View Set