Deck 4: Internal Control, Control Risk, Section 404 Audits, Fraud Auditing, and the Impact of Information Technology on the Audit Process

ملء الشاشة (f)
exit full mode
سؤال
Internal controls can never be considered as absolutely effective because:

A) controls are designed to prevent and detect only material misstatements.
B) internal controls prevent separation of duties.
C) not all organizations have internal audit departments.
D) their effectiveness is limited by the competency and dependability of employees.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following parties provides an assessment of the effectiveness of internal control over financial reporting for U.S. public companies? Which of the following parties provides an assessment of the effectiveness of internal control over financial reporting for U.S. public companies?  <div style=padding-top: 35px>
سؤال
An act of two or more employees to steal assets or misstate records is frequently referred to as:

A) a control deficiency.
B) collusion.
C) a material weakness.
D) a significant deficiency.
سؤال
Which section of the Sarbanes- Oxley Act requires management to issue an internal control report?

A) 408.
B) 202.
C) 404.
D) 203.
سؤال
When management is evaluating the design of internal control, management evaluates whether the control can do which of the following? When management is evaluating the design of internal control, management evaluates whether the control can do which of the following?  <div style=padding-top: 35px>
سؤال
Internal control reports issued by public companies must identify the framework used to evaluate the effectiveness of internal control. Which of the following is the most common framework in the U.S.?

A) Enterprise Internal Control - COSO.
B) Effective Internal Control Framework - AICPA.
C) Enterprise Internal Control - AICPA.
D) Internal Control - Integrated Framework - COSO.
سؤال
The auditor's tests to understand the client's internal controls might include which of the following types of procedures? The auditor's tests to understand the client's internal controls might include which of the following types of procedures?  <div style=padding-top: 35px>
سؤال
The initial presumption in the audit of a public company is that control risk is:

A) moderate.
B) low.
C) high.
D) low or moderate, but not high.
سؤال
In the audit of a private company, an auditor will test controls when control risk is initially assessed at: In the audit of a private company, an auditor will test controls when control risk is initially assessed at:  <div style=padding-top: 35px>
سؤال
The auditor's consideration of a private company's internal control is:

A) recommended by most capital market authorities.
B) required by ISA 315.
C) required by IFAC's Code of Ethics.
D) required by IFRS.
سؤال
Which of the following factors may increase risks to an organization? Which of the following factors may increase risks to an organization?  <div style=padding-top: 35px>
سؤال
Which of the following is correct?

A) Approval should be given by the employee responsible for recording the transaction.
B) Authorization is a policy decision for either a general class of transactions or specific transactions.
C) Approval is a policy decision implemented by employees.
D) Approval occurs as a matter of general policy and includes significant transactions only.
سؤال
Which of the following principles is not necessary for the proper design and use of documents and records?

A) Designed for multiple uses to increase efficiency of operations.
B) Prepared at the time a transaction takes place.
C) Designed for a single use to increase efficiency of operations.
D) Constructed in a manner that encourages correct preparation.
سؤال
Which of the following is not one of the levels of an absence of internal controls?

A) Material weakness.
B) Control deficiency.
C) Significant deficiency.
D) Major deficiency.
سؤال
To determine if significant internal control deficiencies are material weaknesses, they must be evaluated on their: To determine if significant internal control deficiencies are material weaknesses, they must be evaluated on their:  <div style=padding-top: 35px>
سؤال
The purpose of an entity's accounting information and communication system is to: The purpose of an entity's accounting information and communication system is to:  <div style=padding-top: 35px>
سؤال
Which of the following is correct?

A) A control deficiency is always a material weakness.
B) A material weakness is always a significant deficiency.
C) A material weakness is less significant that a control deficiency.
D) A significant deficiency is always a material weakness.
سؤال
Which of the following is not a likely procedure to support the operating effectiveness of internal controls?

A) Inquiry of client personnel.
B) Completing an internal control questionnaire.
C) Reperformance of client procedures.
D) Observation of control- related activities.
سؤال
Before making the final assessment of internal control at the end of an integrated audit, the auditor must: Before making the final assessment of internal control at the end of an integrated audit, the auditor must:  <div style=padding-top: 35px>
سؤال
Compared to a public company, the most important difference in a nonpublic company in assessing control risk is the ability to assess control risk at ________ for any or all control- related objectives.

A) moderately low
B) high
C) low
D) medium
سؤال
To be effective, an internal audit department must be independent of:

A) operating departments.
B) the accounting department.
C) both A and B.
D) either A or B, but not both.
سؤال
Briefly describe the responsibilities of management and external auditors for internal controls.
سؤال
During a financial statement audit of a private company, three steps must be completed by the auditor before concluding that control risk is low. What are these steps?
سؤال
What are the two primary factors that auditors consider in determining if an entity is auditable?
سؤال
Match each of the definition with the following terms

-Management's ongoing and periodic assessment of the quality of internal control performance to determine that controls are operating as intended and modified when needed.

A) Control environment
B) Control activities
C) Independent checks on performance
D) Internal control
E) Monitoring
F) Separation of duties
G) General authorization
H) Specific authorization
I) Risk assessment
سؤال
Which of the following is a category of fraud? Which of the following is a category of fraud?  <div style=padding-top: 35px>
سؤال
With respect to fraudulent financial reporting, most frauds involve: With respect to fraudulent financial reporting, most frauds involve:  <div style=padding-top: 35px>
سؤال
________ involves deliberate actions taken by management to meet earnings objectives.

A) Expenditure management
B) Earnings management
C) Top- line management
D) Management- by- objective
سؤال
Which of the following is one of the conditions for fraud described in the fraud triangle? Which of the following is one of the conditions for fraud described in the fraud triangle?  <div style=padding-top: 35px>
سؤال
Fraudulent financial reporting may be accomplished through the manipulation of:

A) liabilities.
B) revenues.
C) assets.
D) all of the above
سؤال
The most common technique used by management to misstate financial information is:

A) improper revenue recognition.
B) understatement of liabilities.
C) understatement of assets.
D) overstatement of expenses.
سؤال
Which of the following statements describes circumstances that underlie employee incentives to misappropriate assets?

A) Weak internal controls encourage employees to take chances.
B) Dissatisfied employees may steal from a sense of entitlement.
C) Employees have a vested interest in making the company's financial statements erroneous.
D) If management cheats customers and gets away with it, then employees believe they can do the same to the company.
سؤال
Which of the following issues is normally part of the 'brainstorming' session required by ISA 240 and 315? Which of the following issues is normally part of the 'brainstorming' session required by ISA 240 and 315?  <div style=padding-top: 35px>
سؤال
Sources of information gathered to assess fraud risks usually do not include:

A) review of memorandum and articles of association.
B) communication among audit team members.
C) analytical procedures.
D) inquiries of management.
سؤال
ISA 230 requires auditors to document which of the following matters related to the auditor's consideration of material misstatements due to fraud?

A) Reasons supporting a conclusion that there is not a significant risk of material improper expense recognition.
B) Procedures performed to obtain information necessary to identify and assess the risks of material fraud.
C) Results of the internal auditor's procedures performed to address the risk of management override of controls.
D) Discussions with management regarding separation of duties.
سؤال
After fraud risks are identified and documented, the auditor should evaluate factors that ________ fraud risk before developing an appropriate response to the risk of fraud.

A) increase or decrease
B) increase
C) enhance
D) reduce
سؤال
As part of the brainstorming sessions, auditors are directed to emphasize: As part of the brainstorming sessions, auditors are directed to emphasize:  <div style=padding-top: 35px>
سؤال
Auditor responses to fraud risks include which of the following? Auditor responses to fraud risks include which of the following?  <div style=padding-top: 35px>
سؤال
As part of designing and performing procedures to address management override of controls, auditors must perform which of the following procedures? As part of designing and performing procedures to address management override of controls, auditors must perform which of the following procedures?  <div style=padding-top: 35px>
سؤال
For inquiry to be effective, auditors need to be skilled at listening and ________ an interviewee's response to questions.

A) remembering
B) evaluating
C) recording
D) transcribing
سؤال
This type of inquiry often elicits 'yes' or 'no' responses to the auditor's questions.

A) Assessment
B) Declarative
C) Interrogative
D) Informational
سؤال
Which of the following non- verbal cues is a sign of stress?

A) Avoiding eye contact.
B) Leaning away from the auditor, usually toward the door or window.
C) Crossing one's arms or legs.
D) Each of the above is a sign of stress.
سؤال
Management is responsible for: Management is responsible for:  <div style=padding-top: 35px>
سؤال
List and briefly describe the three conditions for fraud arising from fraudulent financial reporting and misappropriation of assets as described in ISAs 240, 315 and 450.
سؤال
Briefly discuss the discussions required by ISAs 240 and 315 within the audit team to consider fraud. Be sure to include a list of issues that should be addressed in these discussions.
سؤال
List and briefly describe examples of risk factors for each condition of fraud for misappropriation of assets.
سؤال
What matters related to their consideration of fraud must auditors document according to ISA 230?
سؤال
Information and idea exchange sessions are required by ISAs 240 and 315.
سؤال
ISAs 240 and 315 does not specifically indicate which members of an audit engagement team must attend a brainstorming session.
سؤال
One significant risk related to an automated environment is that auditors may ________ information provided by an information system.

A) not place enough reliance on
B) not understand
C) reveal
D) place too much reliance on
سؤال
Which of the following is not a category of an application control?

A) Processing controls.
B) Input controls.
C) Hardware controls.
D) Output controls.
سؤال
Which of the following is a category of general controls?

A) Output controls.
B) Input controls.
C) Physical and online security.
D) Processing controls.
سؤال
________ involves implementing a new system in one part of the organization, while other locations continue to use the current system.

A) Parallel testing
B) Pilot testing
C) Online testing
D) Control testing
سؤال
Which of the following statements about general controls is not correct?

A) Programmers should have access to computer operations to aid users in resolving problems.
B) Disaster recovery plans should identify alternative hardware to process company data.
C) Successful IT development efforts require the involvement of IT and non- IT personnel.
D) The chief information officer should report to senior management and the board.
سؤال
Which of the following is not an example of an applications control?

A) An equipment failure causes system downtime.
B) There is a preprocessing authorization of the sales transactions.
C) There are reasonableness tests for the unit selling price of a sale.
D) After processing, all sales transactions are reviewed by the sales department.
سؤال
Which of the following is not a general control?

A) Adequate program run instructions for operating the computer.
B) Reasonableness test for unit selling price of a sale.
C) Separation of duties between programmer and operators.
D) Equipment failure causes error messages on monitor.
سؤال
Which of the following is not one of the three categories of testing strategies when auditing through the computer?

A) Embedded audit module.
B) Test data approach.
C) Pilot simulation.
D) Parallel simulation.
سؤال
Companies with non- complex IT environments often rely on microcomputers to perform accounting system functions. Which of the following is not an audit consideration in such an environment?

A) Vulnerability to viruses and other risks.
B) Excess reliance on automated controls.
C) Unauthorized access to master files.
D) Limited reliance on automated controls.
سؤال
Because general controls have a ________ effect on the operating effectiveness of application controls, auditors must consider general controls.

A) mitigating
B) worsening
C) nominal
D) pervasive
سؤال
________ link equipment in large geographic regions.

A) Local area networks (LANs)
B) Wide area networks (WANs)
C) Cosmopolitan area networks (CANs)
D) Virtual area networks (VANs)
سؤال
What tools do companies use to limit access to sensitive company data? What tools do companies use to limit access to sensitive company data?  <div style=padding-top: 35px>
سؤال
Which of the following is not a general control?

A) Hardware controls.
B) The plan of organization and operation of IT activity.
C) Processing controls.
D) Procedures for documenting, reviewing, and approving systems and programs.
سؤال
Service center auditors do not issue which of the following types of reports?

A) Report on implemented controls.
B) Report on controls that have been implemented and tested for design effectiveness.
C) Report on controls that have been implemented and tested for operating effectiveness.
D) Each of the above is issued.
سؤال
Discuss the circumstances that must exist for the auditor to 'audit around the computer.
سؤال
Why do businesses use networks? Describe a local area network and a wide area network.
سؤال
What types of reports may be issued by a service organization auditor? Which of these is likely to be used by an auditor performing an audit of a public company?
سؤال
Inherent risk is often reduced in complex IT systems relative to less complex IT systems.
سؤال
Programmers should not have access to transaction data.
سؤال
Knowledge of both general and application controls is not particularly crucial for auditors of public companies.
سؤال
When the auditor decides to 'audit around the computer,' there is no need to test the client's IT controls or obtain an understanding of the client's internal controls related to the IT system.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/70
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Internal Control, Control Risk, Section 404 Audits, Fraud Auditing, and the Impact of Information Technology on the Audit Process
1
Internal controls can never be considered as absolutely effective because:

A) controls are designed to prevent and detect only material misstatements.
B) internal controls prevent separation of duties.
C) not all organizations have internal audit departments.
D) their effectiveness is limited by the competency and dependability of employees.
their effectiveness is limited by the competency and dependability of employees.
2
Which of the following parties provides an assessment of the effectiveness of internal control over financial reporting for U.S. public companies? Which of the following parties provides an assessment of the effectiveness of internal control over financial reporting for U.S. public companies?
B
3
An act of two or more employees to steal assets or misstate records is frequently referred to as:

A) a control deficiency.
B) collusion.
C) a material weakness.
D) a significant deficiency.
collusion.
4
Which section of the Sarbanes- Oxley Act requires management to issue an internal control report?

A) 408.
B) 202.
C) 404.
D) 203.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
5
When management is evaluating the design of internal control, management evaluates whether the control can do which of the following? When management is evaluating the design of internal control, management evaluates whether the control can do which of the following?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
6
Internal control reports issued by public companies must identify the framework used to evaluate the effectiveness of internal control. Which of the following is the most common framework in the U.S.?

A) Enterprise Internal Control - COSO.
B) Effective Internal Control Framework - AICPA.
C) Enterprise Internal Control - AICPA.
D) Internal Control - Integrated Framework - COSO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
7
The auditor's tests to understand the client's internal controls might include which of the following types of procedures? The auditor's tests to understand the client's internal controls might include which of the following types of procedures?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
8
The initial presumption in the audit of a public company is that control risk is:

A) moderate.
B) low.
C) high.
D) low or moderate, but not high.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
9
In the audit of a private company, an auditor will test controls when control risk is initially assessed at: In the audit of a private company, an auditor will test controls when control risk is initially assessed at:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
10
The auditor's consideration of a private company's internal control is:

A) recommended by most capital market authorities.
B) required by ISA 315.
C) required by IFAC's Code of Ethics.
D) required by IFRS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following factors may increase risks to an organization? Which of the following factors may increase risks to an organization?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is correct?

A) Approval should be given by the employee responsible for recording the transaction.
B) Authorization is a policy decision for either a general class of transactions or specific transactions.
C) Approval is a policy decision implemented by employees.
D) Approval occurs as a matter of general policy and includes significant transactions only.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following principles is not necessary for the proper design and use of documents and records?

A) Designed for multiple uses to increase efficiency of operations.
B) Prepared at the time a transaction takes place.
C) Designed for a single use to increase efficiency of operations.
D) Constructed in a manner that encourages correct preparation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is not one of the levels of an absence of internal controls?

A) Material weakness.
B) Control deficiency.
C) Significant deficiency.
D) Major deficiency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
15
To determine if significant internal control deficiencies are material weaknesses, they must be evaluated on their: To determine if significant internal control deficiencies are material weaknesses, they must be evaluated on their:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
16
The purpose of an entity's accounting information and communication system is to: The purpose of an entity's accounting information and communication system is to:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is correct?

A) A control deficiency is always a material weakness.
B) A material weakness is always a significant deficiency.
C) A material weakness is less significant that a control deficiency.
D) A significant deficiency is always a material weakness.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is not a likely procedure to support the operating effectiveness of internal controls?

A) Inquiry of client personnel.
B) Completing an internal control questionnaire.
C) Reperformance of client procedures.
D) Observation of control- related activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
19
Before making the final assessment of internal control at the end of an integrated audit, the auditor must: Before making the final assessment of internal control at the end of an integrated audit, the auditor must:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
20
Compared to a public company, the most important difference in a nonpublic company in assessing control risk is the ability to assess control risk at ________ for any or all control- related objectives.

A) moderately low
B) high
C) low
D) medium
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
21
To be effective, an internal audit department must be independent of:

A) operating departments.
B) the accounting department.
C) both A and B.
D) either A or B, but not both.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
22
Briefly describe the responsibilities of management and external auditors for internal controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
23
During a financial statement audit of a private company, three steps must be completed by the auditor before concluding that control risk is low. What are these steps?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
24
What are the two primary factors that auditors consider in determining if an entity is auditable?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match each of the definition with the following terms

-Management's ongoing and periodic assessment of the quality of internal control performance to determine that controls are operating as intended and modified when needed.

A) Control environment
B) Control activities
C) Independent checks on performance
D) Internal control
E) Monitoring
F) Separation of duties
G) General authorization
H) Specific authorization
I) Risk assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is a category of fraud? Which of the following is a category of fraud?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
27
With respect to fraudulent financial reporting, most frauds involve: With respect to fraudulent financial reporting, most frauds involve:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
28
________ involves deliberate actions taken by management to meet earnings objectives.

A) Expenditure management
B) Earnings management
C) Top- line management
D) Management- by- objective
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is one of the conditions for fraud described in the fraud triangle? Which of the following is one of the conditions for fraud described in the fraud triangle?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
30
Fraudulent financial reporting may be accomplished through the manipulation of:

A) liabilities.
B) revenues.
C) assets.
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
31
The most common technique used by management to misstate financial information is:

A) improper revenue recognition.
B) understatement of liabilities.
C) understatement of assets.
D) overstatement of expenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following statements describes circumstances that underlie employee incentives to misappropriate assets?

A) Weak internal controls encourage employees to take chances.
B) Dissatisfied employees may steal from a sense of entitlement.
C) Employees have a vested interest in making the company's financial statements erroneous.
D) If management cheats customers and gets away with it, then employees believe they can do the same to the company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following issues is normally part of the 'brainstorming' session required by ISA 240 and 315? Which of the following issues is normally part of the 'brainstorming' session required by ISA 240 and 315?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
34
Sources of information gathered to assess fraud risks usually do not include:

A) review of memorandum and articles of association.
B) communication among audit team members.
C) analytical procedures.
D) inquiries of management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
35
ISA 230 requires auditors to document which of the following matters related to the auditor's consideration of material misstatements due to fraud?

A) Reasons supporting a conclusion that there is not a significant risk of material improper expense recognition.
B) Procedures performed to obtain information necessary to identify and assess the risks of material fraud.
C) Results of the internal auditor's procedures performed to address the risk of management override of controls.
D) Discussions with management regarding separation of duties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
36
After fraud risks are identified and documented, the auditor should evaluate factors that ________ fraud risk before developing an appropriate response to the risk of fraud.

A) increase or decrease
B) increase
C) enhance
D) reduce
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
37
As part of the brainstorming sessions, auditors are directed to emphasize: As part of the brainstorming sessions, auditors are directed to emphasize:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
38
Auditor responses to fraud risks include which of the following? Auditor responses to fraud risks include which of the following?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
39
As part of designing and performing procedures to address management override of controls, auditors must perform which of the following procedures? As part of designing and performing procedures to address management override of controls, auditors must perform which of the following procedures?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
40
For inquiry to be effective, auditors need to be skilled at listening and ________ an interviewee's response to questions.

A) remembering
B) evaluating
C) recording
D) transcribing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
41
This type of inquiry often elicits 'yes' or 'no' responses to the auditor's questions.

A) Assessment
B) Declarative
C) Interrogative
D) Informational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following non- verbal cues is a sign of stress?

A) Avoiding eye contact.
B) Leaning away from the auditor, usually toward the door or window.
C) Crossing one's arms or legs.
D) Each of the above is a sign of stress.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
43
Management is responsible for: Management is responsible for:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
44
List and briefly describe the three conditions for fraud arising from fraudulent financial reporting and misappropriation of assets as described in ISAs 240, 315 and 450.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
45
Briefly discuss the discussions required by ISAs 240 and 315 within the audit team to consider fraud. Be sure to include a list of issues that should be addressed in these discussions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
46
List and briefly describe examples of risk factors for each condition of fraud for misappropriation of assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
47
What matters related to their consideration of fraud must auditors document according to ISA 230?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
48
Information and idea exchange sessions are required by ISAs 240 and 315.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
49
ISAs 240 and 315 does not specifically indicate which members of an audit engagement team must attend a brainstorming session.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
50
One significant risk related to an automated environment is that auditors may ________ information provided by an information system.

A) not place enough reliance on
B) not understand
C) reveal
D) place too much reliance on
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following is not a category of an application control?

A) Processing controls.
B) Input controls.
C) Hardware controls.
D) Output controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following is a category of general controls?

A) Output controls.
B) Input controls.
C) Physical and online security.
D) Processing controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ involves implementing a new system in one part of the organization, while other locations continue to use the current system.

A) Parallel testing
B) Pilot testing
C) Online testing
D) Control testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following statements about general controls is not correct?

A) Programmers should have access to computer operations to aid users in resolving problems.
B) Disaster recovery plans should identify alternative hardware to process company data.
C) Successful IT development efforts require the involvement of IT and non- IT personnel.
D) The chief information officer should report to senior management and the board.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is not an example of an applications control?

A) An equipment failure causes system downtime.
B) There is a preprocessing authorization of the sales transactions.
C) There are reasonableness tests for the unit selling price of a sale.
D) After processing, all sales transactions are reviewed by the sales department.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following is not a general control?

A) Adequate program run instructions for operating the computer.
B) Reasonableness test for unit selling price of a sale.
C) Separation of duties between programmer and operators.
D) Equipment failure causes error messages on monitor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following is not one of the three categories of testing strategies when auditing through the computer?

A) Embedded audit module.
B) Test data approach.
C) Pilot simulation.
D) Parallel simulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
58
Companies with non- complex IT environments often rely on microcomputers to perform accounting system functions. Which of the following is not an audit consideration in such an environment?

A) Vulnerability to viruses and other risks.
B) Excess reliance on automated controls.
C) Unauthorized access to master files.
D) Limited reliance on automated controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
59
Because general controls have a ________ effect on the operating effectiveness of application controls, auditors must consider general controls.

A) mitigating
B) worsening
C) nominal
D) pervasive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
60
________ link equipment in large geographic regions.

A) Local area networks (LANs)
B) Wide area networks (WANs)
C) Cosmopolitan area networks (CANs)
D) Virtual area networks (VANs)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
61
What tools do companies use to limit access to sensitive company data? What tools do companies use to limit access to sensitive company data?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following is not a general control?

A) Hardware controls.
B) The plan of organization and operation of IT activity.
C) Processing controls.
D) Procedures for documenting, reviewing, and approving systems and programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
63
Service center auditors do not issue which of the following types of reports?

A) Report on implemented controls.
B) Report on controls that have been implemented and tested for design effectiveness.
C) Report on controls that have been implemented and tested for operating effectiveness.
D) Each of the above is issued.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
64
Discuss the circumstances that must exist for the auditor to 'audit around the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
65
Why do businesses use networks? Describe a local area network and a wide area network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
66
What types of reports may be issued by a service organization auditor? Which of these is likely to be used by an auditor performing an audit of a public company?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
67
Inherent risk is often reduced in complex IT systems relative to less complex IT systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
68
Programmers should not have access to transaction data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
69
Knowledge of both general and application controls is not particularly crucial for auditors of public companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
70
When the auditor decides to 'audit around the computer,' there is no need to test the client's IT controls or obtain an understanding of the client's internal controls related to the IT system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.