Operational Role of internal audit 1 Flashcards
An internal auditor is preparing procedures to verify the integrity of data in a database application. Theÿbestsource of information for the auditor to determine data field definitions is the: Data definition language. Data subschemas. Data dictionary. Data manipulation language.
Data dictionary.
Internal auditing departments are often requested to coordinate their work with that of the external auditors. Which of the following activities wouldÿmostlikely be restricted to the external auditor?
Evaluating the system of controls over cash collections and similar transactions
Attesting to the fairness of presentation of cash position
Evaluating the adequacy of the organization?s overall system of internal controls
Reviewing the system established to ensure compliance with policies and procedures that could have a significant impact on operations
Attesting to the fairness of presentation of cash position
Which of the following controls would be most efficient in reducing common data input errors? Keystroke verification. Balancing and reconciliation. Batch totals. A set of well-designed edit checks.
A set of well-designed edit checks.
The consultative approach to auditing emphasizes:
Participation with auditees to improve methods.
Imposition of corrective measures.
Fraud investigation.
Implementation of policies and procedures.
Participation with auditees to improve methods.
Using test data, an auditor has processed both normal and atypical transactions through a computerized payroll system to test calculation of regular and overtime hours. Sufficient competent evidence of controls exists if:
Exceptions are mapped to identify the control logic executed.
Test data results are compared to predetermined expectations.
No other tests are performed.
Test result data are tagged to instigate creation of an audit data file.
Test data results are compared to predetermined expectations.
An audit of the receiving function at the company?s distribution center revealed inadequate control over receipts. Which of the following controls would be appropriate for the receiving function?
Ensure that the warehouse-receiving department has a purchase order copy with the units described omitting both prices and quantities.
Ensure that the warehouse-receiving department has a true copy of the original purchase order.
Require that all receipts receive the approval of the warehouse manager.
To ensure adequate separation of duties, the warehouse-receiving clerk should work independently from the warehouse manager.
Ensure that the warehouse-receiving department has a purchase order copy with the units described omitting both prices and quantities.
An organization uses a service bureau to process its hourly payroll transactions. The internal auditor is concerned that the hourly payroll for the year has been processed correctly and, in particular, the computation of employee withholding for pension contributions is in accordance with the union contract, which specifies charges each quarter. Which of the following audit procedures wouldÿbestaccomplish the audit objective?
Select a random sample of all hourly payroll transactions for the reporting period, recompute pay and withholding items, and compare the result with that obtained from the service bureau.
Select a discovery sampling of all payroll transactions for an entire reporting period and then follow up on any findings.
Select a stratified sample of all hourly and salaried payroll transactions for an entire reporting period, perform the necessary activities, and then compare the result with that obtained from the service bureau.
Submit a set of test data to the service bureau during an annual audit and compare the service bureau?s processing with the auditor?s predetermined computations on the same test data.
Submit a set of test data to the service bureau during an annual audit and compare the service bureau?s processing with the auditor?s predetermined computations on the same test data.
During an audit of environmental protection devices at a hazardous materials research center, the auditor has reviewed the architect?s alarm device specifications, examined invoices for the devices, and interviewed the plant safety officer responsible for installation. The main concern of these procedures is assurance that:
The specified alarm system was purchased and installed.
The alarm system actually works.
The specified alarm system design is adequate.
The alarm system meets statutory requirements.
The specified alarm system was purchased and installed.
An internal auditor is planning an operational audit of a computer center. Which of the following items would normally be consideredÿmostÿimportant?
Ascertaining the existence of adequate measures of operational results.
Conducting a survey of computer vendors to be used in future purchases.
Computing required amounts of diskettes, paper, and other supplies.
Determining the age and condition of the mainframe computer.
Ascertaining the existence of adequate measures of operational results.
An audit assistant found a purchase order form for a regular supplier in the amount of $5,500. The purchase order was dated after receipt of the goods. The purchasing agent explained that he had forgotten to issue the purchase order. Also, a disbursement of $450 for materials did not have a receiving report. The assistant wanted to select additional purchase orders for investigation but was unconcerned about the lack of a receiving report. The audit director should:
Disagree with the assistant since all problems directly related to cost have an equal risk of loss associated with them.
Disagree with the assistant since the lack of a receiving report has a greater risk of loss associated with it.
Agree with the assistant since the amount of the purchase order exception was considerably larger than the receiving report exception.
Agree with the assistant since the receiving clerk had assured the cash disbursement clerk that the failure to fill out a report did not happen very often.
Disagree with the assistant since the lack of a receiving report has a greater risk of loss associated with it.
An auditor is performing an operational audit of a division and observes that an unusually large quantity of goods is on hand in the shipping and materials rework areas. The items are labeled as reship items. Upon inquiry, the auditor is told that they are goods that have been returned by customers and have been either repaired or shipped back to the original customer or repaired and shipped out as new products because they are fully warranted.
Assume that subsequent investigation shows that previously issued financial statements were materially misstated due to the improper recognition of sales. The auditor?s next step should be to:
Inform divisional management as a preliminary finding but wait until a formal audit report is issued to inform the audit committee.
Inform the external auditor, senior management, the board, and the audit committee.
Inform senior management, the board, and the audit committee.
Immediately inform the external auditor and the divisional manager.
Inform senior management, the board, and the audit committee.
An auditor is observing cash sales to determine if customers are given written receipts. The objective of this test is to ensure that:
All cash sales are recorded.
Cash received equals the total of the receipts.
Customers are charged authorized prices.
Cash balances are correct.
All cash sales are recorded.
Inefficient usage of excess computer equipment can be controlled by: System feasibility studies. Capacity planning. Exception reporting. Contingency planning.
Capacity planning.
In planning a system of internal operating controls, the role of the internal auditor is to:
Design the controls.
Establish the policies for controls.
Appraise the effectiveness of the controls.
Create the procedures for the planning process.
Appraise the effectiveness of the controls.
Your firm has recently converted its purchasing cycle from a manual process to an online computer system. Which of the following is a probable result associated with conversion to the new automatic system?
Processing time is increased.
The nature of the firm?s risk exposure is reduced.
Processing errors are increased.
Traditional duties are less segregated.
Traditional duties are less segregated.
According to the IIA Standards, a fraud report is required:
At the conclusion of the detection phase.
Neither at the conclusion of the detection phase nor at the conclusion of the investigation phase.
At the conclusion of both the detection and the investigation phases.
At the conclusion of the investigation phase.
At the conclusion of the investigation phase.
Erroneous management decisions might be the result of incomplete information. Theÿbestÿcontrol to detect a failure to process all valid transactions is:
Periodic user submission of test data.
User review of selected output and transactions rejected by edit checks.
Controlled output distribution.
Decollation of output.
User review of selected output and transactions rejected by edit checks.
During the audit of a company?s purchasing department, an internal auditor discovered that many purchases were made (at normal prices) from an office supply firm whose owner was the brother of the director of purchasing. There were no policies or controls in place to restrict such purchases, and no fraud appears to have been committed. In this case, the internal auditor should recommend:
The inspection of all receipts by receiving inspectors.
The development of an approved-vendor file initiated by the buyer and approved by the director of purchasing.
Establishment of a price policy (range) for all goods.
The initiation of a conflict-of-interest policy.
The initiation of a conflict-of-interest policy.
During an audit, the internal auditor found a scheme in which the warehouse director and the purchasing agent for a retail organization diverted approximately $500,000 of goods to their own warehouse, then sold the goods to third parties. The fraud was not noted earlier since the warehouse director forwarded receiving reports (after updating the perpetual inventory records) to the accounts payable department for processing.
Which of the following procedures would haveÿmostÿlikelyÿled to the discovery of the missing materials and the fraud?
Take a random sample of sales invoices and trace to the perpetual records to see if inventory was on hand. Investigate any differences.
Take a random sample of purchase orders and trace them to receiving documents and to the records in the accounts payable department.
Take an annual physical inventory, reconciling amounts with the perpetual inventory, noting the pattern of differences, and investigating.
Take a random sample of receiving reports and trace to the recording in the perpetual inventory record. Note differences and investigate by type of product.
Take an annual physical inventory, reconciling amounts with the perpetual inventory, noting the pattern of differences, and investigating.
An international nonprofit organization finances medical research. The majority of its revenue and support comes from fundraising activities, investments, and specific grants from an initial sponsoring corporation. The organization has been in operation over 15 years and has a small internal audit department. The organization has just finished a major fundraising drive that raised $500 million for the current fiscal period.
The following are selected data from recent financial statements:
Assume the auditor finds a number of instances in which travel and entertainment reimbursements going to the president seem excessive and inconsistent with the charter of the organization. Before an audit report is issued, a front-page article appears in a major financial newspaper alleging that the president has been using the organization?s funds for personal purposes. The auditor has enough information to confirm the allegations made in the newspaper article. The auditor is called by the newspaper and by a financial magazine in an attempt to confirm the facts. Which of the following would be theÿbestÿresponse by the auditor?
Respond truthfully and fully since the auditor is in a position to confirm the facts that concern the president, not the organization.
Provide information off the record so that the article does not state who gave the information.
Direct the inquiry to the audit committee or the board of directors.
Respond that the investigation is not complete.
Direct the inquiry to the audit committee or the board of directors.
In the course of their work, internal auditors must be alert for fraud and other forms of white-collar crime. The important characteristic that distinguishes fraud from other varieties of white-collar crime is that:
Unlike other white-collar crimes, fraud is always perpetrated against an outside party.
White-collar crime usually is perpetrated for the benefit of an organization, whereas fraud benefits an individual.
Outsiders usually perpetrate white-collar crime to the detriment of an organization, whereas insiders perpetrate fraud to benefit the organization.
Fraud encompasses an array of irregularities and illegal acts that involve intentional deception.
Fraud encompasses an array of irregularities and illegal acts that involve intentional deception.
A determination of cost savings is most likely to be an objective of: Operational auditing. Program results auditing. Compliance auditing. Financial auditing.
Operational auditing.
A company uses a local area network (LAN) to connect its four city area sales offices to the headquarter office. Sales information such as credit approval and other customer information, prices, account information, and so on is maintained at headquarters. This office also houses the inventory and shipping functions. Each area office is connected to the headquarters? office computer, and messages/information between the area offices pass through the headquarters? computer. This communication configuration allows for real-time confirmation of shipments as well as billing and account status. The company is concerned about the accuracy and sensitivity of its information and has implemented controls to protect the database used by the area offices. (1)ÿThe data are modeled after a tree structure, with each record type having any number of lower-level dependent records. The relationship is a one-to-many rather than a many-to-many relationship. When a user enters the system, a series of questions is asked of the user. These (2)ÿquestions include a name and mother?s birth date. The headquarters computer maintains a (3)ÿmatrix of user names and the files/programs the user can access as well as what the user can do to/with the file or program.
A recent addition to the system controls involves a lockout procedure. This procedure (4)ÿlocks out a particular record to other sales offices while a particular sales office is using the record. This control ensures that each transaction has the most recent and accurate information available when the sales office is processing the event.The questions described in (2) are primarily intended to provide:
Authentication of the user.
Data integrity control.
Access control to computer hardware.
Authorization for processing.
Authentication of the user.
A manufacturer of hospital equipment uses three vendors to supply about half of the materials used in its operations. Invoices from these vendors are transmitted directly to the company through electronic data interchange (EDI) with custom-developed software. In a systems development and postimplementation review, the internal auditor was involved with assessing and testing the EDI system and found no significant problems. Other manufacturing materials are obtained through routine purchase orders prepared by buyers in the purchasing department. Materials from EDI vendors are delivered to the receiving dock where personnel verify that the goods are authorized purchases, look for shipping damage, and record receipt into the system using barcode technology. Materials purchased from non-EDI vendors are delivered to the receiving dock and recorded manually on receiving reports. Copies of these reports are given to the purchasing and accounts payable departments. The internal audit department is scheduled to complete a full audit of the purchasing and accounts payable cycle before the end of the year. However, there are severe time pressures because other matters delayed the start of the audit.
The auditor determined that the risks associated with the EDI purchases were less than the risks associated with the purchases made through the traditional system. Which one of the following factorsÿbestÿsupports this prioritization of risks?
The external auditor did not examine EDI purchase controls during the annual financial audit.
There are three vendors connected through EDI.
The internal auditors were involved with systems development and testing of the EDI software.
About half of the materials are purchased through EDI.
The internal auditors were involved with systems development and testing of the EDI software.