ログイン

acc309 internal control and coso

acc309 internal control and coso
96問 • 1年前
  • Tlotlo Legotho
  • 通報

    問題一覧

  • 1

    Which of the following is not one of the three primary objectives of effective internal control?

    assurance of elimination of business risk

  • 2

    With which of management's assertions with respect to implementing internal controls is the auditor primarily concerned?

    reliability of financial reporting

  • 3

    Internal controls

    consist of policies and procedures designed to provide reasonable assurance that the company achieves its objectives and goals.

  • 4

    Internal controls are not designed to provide reasonable assurance that

    all frauds will be detected.

  • 5

    Section 404 of the Sarbanes-Oxley Act requires that both private and public companies issue an internal control report.

    FALSE

  • 6

    Management has a legal and professional responsibility to be sure that the financial statements are prepared in accordance with reporting requirements of applicable accounting frameworks.

    TRUE

  • 7

    Who is responsible for establishing a private company's internal control?

    senior management

  • 8

    Two key concepts that underlie management's design and implementation of internal control are

    inherent limitations and reasonable assurance.

  • 9

    The PCAOB places responsibility for the reliability of internal controls over the financial reporting process on

    management.

  • 10

    An act of two or more employees to steal assets and cover their theft by misstating the accounting records would be referred to as

    collusion.

  • 11

    Sarbanes-Oxley requires management to issue an internal control report that includes two specific items. Which of the following is one of these two requirements?

    a statement that management is responsible for establishing and maintaining an adequate internal control structure and procedures for financial reporting

  • 12

    When one material weakness is present at the end of the year, management of a public company must conclude that internal control over financial reporting is

    ineffective.

  • 13

    The auditors primary purpose in auditing the client's system of internal control over financial reporting is

    to evaluate the effectiveness of the company's internal controls over all relevant assertions in the financial statements.

  • 14

    The internal control framework used by most U.S. companies is the ________ framework.

    COSO

  • 15

    In performing the audit of internal control over financial reporting, the auditor emphasizes internal control over classes of transactions because

    the accuracy of accounting system outputs depends heavily on the accuracy of inputs and processing.

  • 16

    Internal controls can never be regarded as completely effective. Even if company personnel could design an ideal system, its effectiveness depends on the

    competency and dependability of the people using it.

  • 17

    When considering internal controls,

    auditors are concerned with the client's internal controls over the safeguarding of assets if they affect the financial statements.

  • 18

    Of the following statements about internal controls, which one is least likely to be correct?

    Control procedures reasonably ensure that collusion among employees cannot occur.

  • 19

    The Sarbanes-Oxley Act requires

    all public companies to issue reports on internal controls.

  • 20

    Which of the following is an accurate statement regarding the auditor's responsibility for understanding internal control?

    Transaction-related audit objectives typically have no impact on the rights and obligations objectives.

  • 21

    The primary emphasis by auditors is on controls over

    classes of transactions.

  • 22

    An auditor should consider two key issues when obtaining an understanding of a client's internal controls. These issues are

    the design and operating effectiveness of the controls.

  • 23

    Reasonable assurance allows for

    low likelihood that material misstatements will not be prevented or detected by internal controls.

  • 24

    Which of the following is most correct regarding the requirements under Section 404 of the Sarbanes-Oxley Act?

    The audits of internal control and the financial statements provide reasonable assurance as to misstatements.

  • 25

    Under the Dodd-Frank federal financial reform legislation, all public companies are required to obtain an audit report on internal control over financial reporting.

    FALSE

  • 26

    When a company designs and implements internal controls, cost of the controls is not a valid consideration.

    FALSE

  • 27

    Which of the following activities would be least likely to strengthen a company's internal control?

    maintaining insurance for fire and theft

  • 28

    Which of the following components of the control environment define the existing lines of responsibility and authority?

    organizational structure

  • 29

    Which of the following statements is most correct with respect to separation of duties?

    Employees who authorize transactions should not have custody of related assets.

  • 30

    Which of the following is correct with respect to the design and use of business documents?

    Documents should be prenumbered consecutively to facilitate control over missing documents.

  • 31

    which of the following best describes the purpose of control activities?

    the policies and procedures that help ensure that necessary actions are taken to address risks to the achievement of the entity's objectives

  • 32

    Which of the following deals with ongoing or periodic assessment of the quality of internal control by management?

    monitoring activities

  • 33

    Which of the following is a risk assessment principle?

    consider the potential for fraud

  • 34

    Which of the following is not an underlying principle related to risk assessment?

    The auditors should determine how the company's risks should be managed.

  • 35

    Which of the following is not one of the subcomponents of the control environment?

    adequate separation of duties

  • 36

    It is important for the CPA to consider the competence of the clients' personnel because their competence has a direct impact upon the

    achievement of the objectives of internal control.

  • 37

    Proper segregation of functional responsibilities calls for separation of

    authorization, recording, and custody.

  • 38

    Which of the following is an accurate statement regarding control activities?

    all of the above

  • 39

    If a company has an effective internal audit department,

    it can reduce external audit costs by providing direct assistance to the external auditors.

  • 40

    To promote operational efficiency, the internal audit department would ideally report to

    the audit committee.

  • 41

    Hanlon Corp. maintains a large internal audit staff that reports directly to the accounting department. Audit reports prepared by the internal auditors indicate that the system is functioning as it should and that the accounting records are reliable. An independent auditor will probably

    place limited reliance on the work performed by the internal audit staff

  • 42

    External financial statement auditors must obtain evidence regarding what attributes of an internal audit (IA) department if the external auditors intend to rely on IA's work?

    all of the above

  • 43

    To obtain an understanding of an entity's control environment, an auditor should concentrate on the substance of management's policies and procedures rather than their form because

    management may establish appropriate policies and procedures but not act on them.

  • 44

    The ________ is helpful in preventing classification errors if it accurately describes which type of transaction should be in each account.

    chart of accounts

  • 45

    Control activities are a subcomponent of the information and communication component of internal control.

    FALSE

  • 46

    Adequate documents and records is a subcomponent of the control environment.

    FALSE

  • 47

    The chart of accounts is helpful in preventing classification errors if it accurately describes which type of transaction should be in each account.

    TRUE

  • 48

    Auditing standards prohibit reliance on the work of internal auditors due to the lack of independence of the internal auditors.

    FALSE

  • 49

    If an auditor wishes to rely on the work of internal auditors (IA), the auditor must obtain satisfactory evidence related to the IA's competence, integrity, and objectivity.

    TRUE

  • 50

    An example of a specific authorization is management setting a policy authorizing the ordering of inventory when less than a one-week supply is on hand.

    FALSE

  • 51

    Personnel responsible for performing internal verification procedures must be independent of those originally responsible for preparing the data.

    TRUE

  • 52

    Old and new systems operating simultaneously in all locations is a test approach known as

    parallel testing.

  • 53

    Which of the following is a component of general controls?

    back-up and contingency planning

  • 54

    Which of the following statements related to application controls is correct?

    Application controls relate to the processing of individual transactions.

  • 55

    General controls include all of the following except

    processing controls.

  • 56

    Which of the following describes the process of implementing a new system in one part of the organization, while other locations continue to use the current system?

    pilot testing

  • 57

    A ________ is responsible for controlling the use of computer programs, transaction files and other computer records and documentation and releases them to the operators only when authorized.

    librarian

  • 58

    Security controls should require that users enter a(n) ________ before being allowed access to software and other related data files.

    authorized password

  • 59

    Typical controls developed for manual systems which are still important in IT systems include

    all of the above.

  • 60

    Which of the following controls prevent and detect errors while transaction data are processed?

    processing

  • 61

    When purchasing software or developing in-house software,

    a team of both IT and non-IT personnel should be involved in the decision process.

  • 62

    Output controls need to be designed for which of the following data integrity objectives?

    detecting errors after the processing is completed

  • 63

    A control that relates to all parts of the IT system is called a(n)

    general control.

  • 64

    Controls that are designed for each software application and are intended to help a company satisfy the transaction-related audit objectives are

    application controls.

  • 65

    Which of the following is not an example of an applications control?

    Back-up of data is made to a remote site for data security.

  • 66

    Which of the following is not a general control?

    Computer performed validation tests of input accuracy.

  • 67

    Controls which are built in by the manufacturer to detect equipment failure are called

    hardware controls.

  • 68

    Controls which are designed to assure that the information entered into the computer is authorized, complete, and accurate are called

    input controls.

  • 69

    Which of the following tests determines that every field in a record has been completed?

    completeness

  • 70

    An internal control deficiency occurs when computer personnel

    originate changes in customer master files.

  • 71

    In an IT system, automated equipment controls or hardware controls are designed to

    detect and control errors arising from the use of equipment.

  • 72

    If a control total were to be computed on each of the following data items, which would best be identified as a hash total for a payroll IT application?

    employee numbers

  • 73

    Which of the following is not an application control?

    logging in to the company's information systems via a password

  • 74

    Which of the following is not a general control?

    processing controls

  • 75

    ________ is the information technology and internal control processes an organization has in place to protect computers, networks, programs, and data from unauthorized access.

    Cybersecurity

  • 76

    The most important output control is

    review of data for reasonableness by someone who knows what the output should look like.

  • 77

    Parallel testing is used when old and new systems are operated simultaneously in all locations.

    TRUE

  • 78

    Programmers should only be allowed to work with test copies of programs and data.

    TRUE

  • 79

    Parallel testing can be used in combination with pilot testing to test new systems.

    TRUE

  • 80

    The effectiveness of automated controls depends solely on the competence of the personnel performing the controls.

    FALSE

  • 81

    Backup and contingency plans should also identify alternative hardware that can be used to process company data.

    TRUE

  • 82

    A large portion of errors in IT systems result from data entry errors.

    TRUE

  • 83

    Output controls focus on preventing errors during processing.

    FALSE

  • 84

    Processing controls are a category of application controls.

    TRUE

  • 85

    Controls that relate to a specific use of the IT system, such as the processing of sales or cash receipts, are called application controls.

    TRUE

  • 86

    IT controls are classified as either input controls or output controls.

    FALSE

  • 87

    A database management system

    allows clients to create databases that include information that can be shared across multiple applications.

  • 88

    When auditing a client who uses a database management system, the auditor is principally aware of elevated risk due to the fact that

    multiple users can access and update data files.

  • 89

    Firewalls are used to protect from

    unauthorized external users.

  • 90

    Rather than maintain an internal IT center, many companies outsource their basic IT functions such as payroll to an

    independent computer service center.

  • 91

    When the auditor is obtaining an understanding of the independent computer service center's internal controls, the auditor should

    use the same criteria used to evaluate the client's internal controls.

  • 92

    ________ protect(s) the security of electronic communication when information is transmitted and when it is stored.

    Encryption

  • 93

    A(n) ________ is a computer resource deployment and procurement model that enables an organization to obtain IT resources and applications from any location via an Internet connection.

    cloud computing environment

  • 94

    Firewalls can protect company data and software programs.

    TRUE

  • 95

    LANs link equipment within a single or small cluster of buildings and are used within a company.

    TRUE

  • 96

    Companies using e-commerce systems to transact business electronically do not need to be concerned about how their e-commerce partners manage IT systems risks.

    FALSE

  • acc 309

    acc 309

    Tlotlo Legotho · 55問 · 1年前

    acc 309

    acc 309

    55問 • 1年前
    Tlotlo Legotho

    acc 308

    acc 308

    Tlotlo Legotho · 10問 · 1年前

    acc 308

    acc 308

    10問 • 1年前
    Tlotlo Legotho

    mgt 301 (1)

    mgt 301 (1)

    Tlotlo Legotho · 100問 · 1年前

    mgt 301 (1)

    mgt 301 (1)

    100問 • 1年前
    Tlotlo Legotho

    mgt 301 (2)

    mgt 301 (2)

    Tlotlo Legotho · 82問 · 1年前

    mgt 301 (2)

    mgt 301 (2)

    82問 • 1年前
    Tlotlo Legotho

    mgt 301 (3)

    mgt 301 (3)

    Tlotlo Legotho · 100問 · 1年前

    mgt 301 (3)

    mgt 301 (3)

    100問 • 1年前
    Tlotlo Legotho

    acc 309 (1)

    acc 309 (1)

    Tlotlo Legotho · 79問 · 1年前

    acc 309 (1)

    acc 309 (1)

    79問 • 1年前
    Tlotlo Legotho

    acc309 materiality and risk

    acc309 materiality and risk

    Tlotlo Legotho · 89問 · 1年前

    acc309 materiality and risk

    acc309 materiality and risk

    89問 • 1年前
    Tlotlo Legotho

    acc309 Fraud Audit

    acc309 Fraud Audit

    Tlotlo Legotho · 89問 · 1年前

    acc309 Fraud Audit

    acc309 Fraud Audit

    89問 • 1年前
    Tlotlo Legotho

    acc309 audit planning and analytical procedures

    acc309 audit planning and analytical procedures

    Tlotlo Legotho · 100問 · 1年前

    acc309 audit planning and analytical procedures

    acc309 audit planning and analytical procedures

    100問 • 1年前
    Tlotlo Legotho

    mgt 301 (4)

    mgt 301 (4)

    Tlotlo Legotho · 11問 · 1年前

    mgt 301 (4)

    mgt 301 (4)

    11問 • 1年前
    Tlotlo Legotho

    問題一覧

  • 1

    Which of the following is not one of the three primary objectives of effective internal control?

    assurance of elimination of business risk

  • 2

    With which of management's assertions with respect to implementing internal controls is the auditor primarily concerned?

    reliability of financial reporting

  • 3

    Internal controls

    consist of policies and procedures designed to provide reasonable assurance that the company achieves its objectives and goals.

  • 4

    Internal controls are not designed to provide reasonable assurance that

    all frauds will be detected.

  • 5

    Section 404 of the Sarbanes-Oxley Act requires that both private and public companies issue an internal control report.

    FALSE

  • 6

    Management has a legal and professional responsibility to be sure that the financial statements are prepared in accordance with reporting requirements of applicable accounting frameworks.

    TRUE

  • 7

    Who is responsible for establishing a private company's internal control?

    senior management

  • 8

    Two key concepts that underlie management's design and implementation of internal control are

    inherent limitations and reasonable assurance.

  • 9

    The PCAOB places responsibility for the reliability of internal controls over the financial reporting process on

    management.

  • 10

    An act of two or more employees to steal assets and cover their theft by misstating the accounting records would be referred to as

    collusion.

  • 11

    Sarbanes-Oxley requires management to issue an internal control report that includes two specific items. Which of the following is one of these two requirements?

    a statement that management is responsible for establishing and maintaining an adequate internal control structure and procedures for financial reporting

  • 12

    When one material weakness is present at the end of the year, management of a public company must conclude that internal control over financial reporting is

    ineffective.

  • 13

    The auditors primary purpose in auditing the client's system of internal control over financial reporting is

    to evaluate the effectiveness of the company's internal controls over all relevant assertions in the financial statements.

  • 14

    The internal control framework used by most U.S. companies is the ________ framework.

    COSO

  • 15

    In performing the audit of internal control over financial reporting, the auditor emphasizes internal control over classes of transactions because

    the accuracy of accounting system outputs depends heavily on the accuracy of inputs and processing.

  • 16

    Internal controls can never be regarded as completely effective. Even if company personnel could design an ideal system, its effectiveness depends on the

    competency and dependability of the people using it.

  • 17

    When considering internal controls,

    auditors are concerned with the client's internal controls over the safeguarding of assets if they affect the financial statements.

  • 18

    Of the following statements about internal controls, which one is least likely to be correct?

    Control procedures reasonably ensure that collusion among employees cannot occur.

  • 19

    The Sarbanes-Oxley Act requires

    all public companies to issue reports on internal controls.

  • 20

    Which of the following is an accurate statement regarding the auditor's responsibility for understanding internal control?

    Transaction-related audit objectives typically have no impact on the rights and obligations objectives.

  • 21

    The primary emphasis by auditors is on controls over

    classes of transactions.

  • 22

    An auditor should consider two key issues when obtaining an understanding of a client's internal controls. These issues are

    the design and operating effectiveness of the controls.

  • 23

    Reasonable assurance allows for

    low likelihood that material misstatements will not be prevented or detected by internal controls.

  • 24

    Which of the following is most correct regarding the requirements under Section 404 of the Sarbanes-Oxley Act?

    The audits of internal control and the financial statements provide reasonable assurance as to misstatements.

  • 25

    Under the Dodd-Frank federal financial reform legislation, all public companies are required to obtain an audit report on internal control over financial reporting.

    FALSE

  • 26

    When a company designs and implements internal controls, cost of the controls is not a valid consideration.

    FALSE

  • 27

    Which of the following activities would be least likely to strengthen a company's internal control?

    maintaining insurance for fire and theft

  • 28

    Which of the following components of the control environment define the existing lines of responsibility and authority?

    organizational structure

  • 29

    Which of the following statements is most correct with respect to separation of duties?

    Employees who authorize transactions should not have custody of related assets.

  • 30

    Which of the following is correct with respect to the design and use of business documents?

    Documents should be prenumbered consecutively to facilitate control over missing documents.

  • 31

    which of the following best describes the purpose of control activities?

    the policies and procedures that help ensure that necessary actions are taken to address risks to the achievement of the entity's objectives

  • 32

    Which of the following deals with ongoing or periodic assessment of the quality of internal control by management?

    monitoring activities

  • 33

    Which of the following is a risk assessment principle?

    consider the potential for fraud

  • 34

    Which of the following is not an underlying principle related to risk assessment?

    The auditors should determine how the company's risks should be managed.

  • 35

    Which of the following is not one of the subcomponents of the control environment?

    adequate separation of duties

  • 36

    It is important for the CPA to consider the competence of the clients' personnel because their competence has a direct impact upon the

    achievement of the objectives of internal control.

  • 37

    Proper segregation of functional responsibilities calls for separation of

    authorization, recording, and custody.

  • 38

    Which of the following is an accurate statement regarding control activities?

    all of the above

  • 39

    If a company has an effective internal audit department,

    it can reduce external audit costs by providing direct assistance to the external auditors.

  • 40

    To promote operational efficiency, the internal audit department would ideally report to

    the audit committee.

  • 41

    Hanlon Corp. maintains a large internal audit staff that reports directly to the accounting department. Audit reports prepared by the internal auditors indicate that the system is functioning as it should and that the accounting records are reliable. An independent auditor will probably

    place limited reliance on the work performed by the internal audit staff

  • 42

    External financial statement auditors must obtain evidence regarding what attributes of an internal audit (IA) department if the external auditors intend to rely on IA's work?

    all of the above

  • 43

    To obtain an understanding of an entity's control environment, an auditor should concentrate on the substance of management's policies and procedures rather than their form because

    management may establish appropriate policies and procedures but not act on them.

  • 44

    The ________ is helpful in preventing classification errors if it accurately describes which type of transaction should be in each account.

    chart of accounts

  • 45

    Control activities are a subcomponent of the information and communication component of internal control.

    FALSE

  • 46

    Adequate documents and records is a subcomponent of the control environment.

    FALSE

  • 47

    The chart of accounts is helpful in preventing classification errors if it accurately describes which type of transaction should be in each account.

    TRUE

  • 48

    Auditing standards prohibit reliance on the work of internal auditors due to the lack of independence of the internal auditors.

    FALSE

  • 49

    If an auditor wishes to rely on the work of internal auditors (IA), the auditor must obtain satisfactory evidence related to the IA's competence, integrity, and objectivity.

    TRUE

  • 50

    An example of a specific authorization is management setting a policy authorizing the ordering of inventory when less than a one-week supply is on hand.

    FALSE

  • 51

    Personnel responsible for performing internal verification procedures must be independent of those originally responsible for preparing the data.

    TRUE

  • 52

    Old and new systems operating simultaneously in all locations is a test approach known as

    parallel testing.

  • 53

    Which of the following is a component of general controls?

    back-up and contingency planning

  • 54

    Which of the following statements related to application controls is correct?

    Application controls relate to the processing of individual transactions.

  • 55

    General controls include all of the following except

    processing controls.

  • 56

    Which of the following describes the process of implementing a new system in one part of the organization, while other locations continue to use the current system?

    pilot testing

  • 57

    A ________ is responsible for controlling the use of computer programs, transaction files and other computer records and documentation and releases them to the operators only when authorized.

    librarian

  • 58

    Security controls should require that users enter a(n) ________ before being allowed access to software and other related data files.

    authorized password

  • 59

    Typical controls developed for manual systems which are still important in IT systems include

    all of the above.

  • 60

    Which of the following controls prevent and detect errors while transaction data are processed?

    processing

  • 61

    When purchasing software or developing in-house software,

    a team of both IT and non-IT personnel should be involved in the decision process.

  • 62

    Output controls need to be designed for which of the following data integrity objectives?

    detecting errors after the processing is completed

  • 63

    A control that relates to all parts of the IT system is called a(n)

    general control.

  • 64

    Controls that are designed for each software application and are intended to help a company satisfy the transaction-related audit objectives are

    application controls.

  • 65

    Which of the following is not an example of an applications control?

    Back-up of data is made to a remote site for data security.

  • 66

    Which of the following is not a general control?

    Computer performed validation tests of input accuracy.

  • 67

    Controls which are built in by the manufacturer to detect equipment failure are called

    hardware controls.

  • 68

    Controls which are designed to assure that the information entered into the computer is authorized, complete, and accurate are called

    input controls.

  • 69

    Which of the following tests determines that every field in a record has been completed?

    completeness

  • 70

    An internal control deficiency occurs when computer personnel

    originate changes in customer master files.

  • 71

    In an IT system, automated equipment controls or hardware controls are designed to

    detect and control errors arising from the use of equipment.

  • 72

    If a control total were to be computed on each of the following data items, which would best be identified as a hash total for a payroll IT application?

    employee numbers

  • 73

    Which of the following is not an application control?

    logging in to the company's information systems via a password

  • 74

    Which of the following is not a general control?

    processing controls

  • 75

    ________ is the information technology and internal control processes an organization has in place to protect computers, networks, programs, and data from unauthorized access.

    Cybersecurity

  • 76

    The most important output control is

    review of data for reasonableness by someone who knows what the output should look like.

  • 77

    Parallel testing is used when old and new systems are operated simultaneously in all locations.

    TRUE

  • 78

    Programmers should only be allowed to work with test copies of programs and data.

    TRUE

  • 79

    Parallel testing can be used in combination with pilot testing to test new systems.

    TRUE

  • 80

    The effectiveness of automated controls depends solely on the competence of the personnel performing the controls.

    FALSE

  • 81

    Backup and contingency plans should also identify alternative hardware that can be used to process company data.

    TRUE

  • 82

    A large portion of errors in IT systems result from data entry errors.

    TRUE

  • 83

    Output controls focus on preventing errors during processing.

    FALSE

  • 84

    Processing controls are a category of application controls.

    TRUE

  • 85

    Controls that relate to a specific use of the IT system, such as the processing of sales or cash receipts, are called application controls.

    TRUE

  • 86

    IT controls are classified as either input controls or output controls.

    FALSE

  • 87

    A database management system

    allows clients to create databases that include information that can be shared across multiple applications.

  • 88

    When auditing a client who uses a database management system, the auditor is principally aware of elevated risk due to the fact that

    multiple users can access and update data files.

  • 89

    Firewalls are used to protect from

    unauthorized external users.

  • 90

    Rather than maintain an internal IT center, many companies outsource their basic IT functions such as payroll to an

    independent computer service center.

  • 91

    When the auditor is obtaining an understanding of the independent computer service center's internal controls, the auditor should

    use the same criteria used to evaluate the client's internal controls.

  • 92

    ________ protect(s) the security of electronic communication when information is transmitted and when it is stored.

    Encryption

  • 93

    A(n) ________ is a computer resource deployment and procurement model that enables an organization to obtain IT resources and applications from any location via an Internet connection.

    cloud computing environment

  • 94

    Firewalls can protect company data and software programs.

    TRUE

  • 95

    LANs link equipment within a single or small cluster of buildings and are used within a company.

    TRUE

  • 96

    Companies using e-commerce systems to transact business electronically do not need to be concerned about how their e-commerce partners manage IT systems risks.

    FALSE