Chapter 5 Flashcards

Internal control concepts and Information

1
Q

What is collusion?

A

An inherent risk of internal control.

2 or more people may collude or management may override internal control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is human judgement considered an inherent risk in internal control?

A

Yes, because human judgement is faulty and controls may fail because of simple errors /or mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internal controls are designed to provide reasonable insurance that?

A

material errors or fraud will be prevented, or detected and corrected, within a timely period by employees in the course of performing their assigned duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which test will be best to assess auditor concern about management override as a limitation of internal control?

A

auditor should compare actual expenditures with budgeted amount to determine whether management has overridden approvals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a control deficiency?

A

The lowest level of deficiency in the AU-C265 standards.

A control deficiency may arise either in the design or operation of the control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What results in a design deficiency?

A
  1. when a necessary control is missing, or

2. A control operating as designed does not meet the control objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What results in an operating deficiency?

A
  1. when a properly designed control does not function as designed.
  2. The person performing the control does not have the authority or competence to perform it effectively.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary objective of procedures performed to obtain an understanding of internal control?

A

To provide an auditor with knowledge necessary for audit planning.

Audit plan describes:

  1. Risk assessment procedures
  2. Further audit procedures at the assertion level
  3. Other procedures required by GAAS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 5 components of internal control?

A
  1. control environment
  2. risk assessment process
  3. control activities
  4. information systems
  5. monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When may manual controls be suitable?

A

where judgment and discretion is required:

  1. for large, unusual, nonrecurring, transactions.
  2. for circumstances where misstatements are difficult to define, anticipate, or predict..
  3. in changing circumstances that require a control response outside the scope of an existing automated control, and
  4. In monitoring the effectiveness of automated controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the control environment of internal control?

A

Control environment provides discipline and structure, sets the tone of the organization, and influences the control consciousness of the employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the components of the control environment of internal control?

A
  1. participation of those charged with governance.
  2. integrity and ethical values
  3. organizational structure
  4. management philosophy and operating style
  5. assignment of authority and responsibility
  6. Human Resources policies and practices.
  7. commitment to competence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is one of the overriding principles of internal control?

A

Responsibility for the performance of duty must be fixed.

Fixing the responsibility for each duty makes it easier to trace problems to the persons responsible, and hold them accountable for their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How may effective internal control be obtained?

A

By decentralization of duties and responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Should one person be responsible for Authorization, recording, and custody of related assets?

A

No. one person should not be responsible for all phases of a transaction.

These duties should be performed by separate individuals to reduce the opportunities to allow any person to be in a position both to perpetrate and conceal fraud or error in the normal course of his or her duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why may the understanding of IT in an attest engagement may most likely be required by the auditor?

A

To :

  1. determine the effect of IT on the audit
  2. understand its controls, and
  3. design and perform test of IT controls and substantive procedures.
17
Q

In obtaining an understanding of the manufacturing entity’s internal control concerning inventory balances, an auditor most likely would:

A

Review the entity’s description of the inventory policies and procedures.

Auditor should obtain an understanding of internal control to plan the audit, Including knowledge about the design of relevant controls and whether they have been implemented.

18
Q

What is the most logical order the audit step is performed?

A
  1. Evaluate the design of relevant controls and determine whether they have been implemented.
  2. Assess the RMM’s
  3. Design further audit procedures.
  4. Test controls
19
Q

What is obtaining an understanding of internal control and then assessing RMMs used to do?

A

design further audit procedures (test of controls and substantive procedures).

20
Q

What does test of controls do?

A
  1. Determine the operating effectiveness of controls.
21
Q

Why is substantive procedures performed?

A

for all relevant assertions related to material classes of transactions, balances, and disclosures.

But the nature, timing, and extent of substantive procedures depend on the operating effectiveness of controls

22
Q

What should the auditor document in an audit?

A
  1. The understanding of the entity and its environment and the components of internal control.
  2. The sources of information regarding the understanding,
  3. The risk assessment procedures performed.

The form and extent of the documentation are influenced by the nature and complexity of the entity’s controls.

23
Q

in obtaining an understanding of each of the five components of internal control sufficient to plan the audit, how is an understanding obtained?

A

By performing risk assessment procedures to evaluate the design of controls relevant to the audit and to determine whether they have been implemented.

24
Q

The auditor uses the understanding of internal control and the assessment of the RMMs to design…?

A

Further audit procedures.

These include:
Test of control, if relevant, and substantive procedures

25
Q

What is a decision table?

A

It identifies the contingencies considered in the description of a problem, and the appropriate actions to be taken relative to those contingencies.

Decision tables are logic diagrams presented in matrix form.

Flow charts DO NOT present the sequence of actions described

26
Q

What is a system flowchart?

A

a visual representation of a series of sequential processes, that is, of a flow of documents, data, and operations.

27
Q

Why might a flowchart be preferred over a questionnaire?

A

Because a picture is more easily comprehended.

28
Q

Documentation of internal control of a complex information system may include?

A

questionnaires, flowcharts, or decision tables.

29
Q

What is the sequence of documents and operations on a well prepared systems flowchart

A

top to bottom and left to right

30
Q

What is a system flowchart?

A

A symbolic representation of the flow of documents and procedures through a series of steps in the accounting process of the client’s organization.

31
Q

When is a hot site used?

A

When fast recovery backup is critical.

Hot site includes all software , hardware, and other equipment necessary for a company to carry out operations.

Hot sites are expensive to maintain

32
Q

Name the computer program that appears to be legitimate, but performs some illicit activity when it runs.

A

Trojan Horse.

Eg.
A game appearing friendly, but actually contains an application destructive to the computer system

33
Q

What is Preformatting?

A

An online data entry control to avoid data entry errors.

The display of a document, with blanks for data items to be entered by the terminal operator

34
Q

What is validity check?

A

tests identification numbers or transaction codes for validity by comparison with items already known to be correct or authorized.

eg.

validity check identify a transmission for which the control fields value did not match a pre-existing record in a file.

35
Q

What is a hash total?

A

a control total without a defined meaning, such as total employees numbers, or invoice numbers, that is used to verify the completeness of data.