Exam 10: Understanding Internal Controls
Exam 1: Auditing and the Public Accounting69 Questions
Exam 2: Financial Statement Audits and84 Questions
Exam 3: Professional Ethics86 Questions
Exam 4: Auditors Legal Liability67 Questions
Exam 5: Overview of the Audit Process49 Questions
Exam 6: Audit Evidence, Audit Objectives,71 Questions
Exam 7: Accepting the Engagement and56 Questions
Exam 8: Materiality Decisions and Performing Analytical Procedures47 Questions
Exam 9: Audit Risk, Including the Risk of Fraud44 Questions
Exam 10: Understanding Internal Controls91 Questions
Exam 11: Audit Procedures in Response to Assessed Risks: Tests of Controls18 Questions
Exam 12: Audit Procedures in Response to Assessed Risks: Substantive Tests82 Questions
Exam 13: Audit Sampling in Substantive Tests72 Questions
Exam 14: Auditing the Revenue Cycle72 Questions
Exam 15: Auditing the Expenditure Cycle80 Questions
Exam 16: Auditing the Production and81 Questions
Exam 17: Auditing the Investing and77 Questions
Exam 18: Auditing Investments and92 Questions
Exam 19: Completing the Audit and Postaudit102 Questions
Exam 20: Attest and Assurance Services, and Related Reports61 Questions
Exam 21: Internal, Operational, and103 Questions
Select questions type
General controls provide a framework for controlling daily computer operations, minimizing the likelihood of processing errors, and assuring the continuity of operations in the event of a physical disaster of computer failure.
(True/False)
4.8/5
(40)
Access controls relate to both the accounting records and the physical assets.
(True/False)
4.9/5
(38)
The Foreign Corrupt Practices Act (FCPA) is administered by the:
(Multiple Choice)
4.9/5
(41)
The external auditor is not required to test the work of internal auditors that pertains to
obtaining an understanding.
(True/False)
4.9/5
(30)
An effective accounting system should identify and record only the valid transaction of the entity that occurred in the current period, which relates to the:
(Multiple Choice)
4.9/5
(40)
Essential to both management and auditors is a chain of evidence in the accounting system provided by coding, cross references, and documentation connecting account balances and other summary results with original data. This chain of evidence is referred to as the:
(Multiple Choice)
4.9/5
(32)
Listed below are eight positions within an IT department coded by the letters A through H.
A.IT manager
E.Security administrator
B.Systems analyst
F.Librarian
C.Programmer
G.Data control group
D.Computer operator
H.Database administrator
REQUIRED: Match the primary responsibilities below with the codes for the positions above.
1.Flowcharts logic of computer programs, develops and documents programs, and
debugs programs.
2.Manages security of IT systems, including hardware, security software and
monitors access to programs and data, and follows-up on security breaches.
3.Exercises overall control, develops short and long range plans, and approves
systems.
4.Designs content and organization of the database and controls access to and use
of the database.
5.Evaluates existing systems, designs new systems, outlines the systems, and
prepares specifications for programmers.
6.Acts as liaison with user departments and monitors input, processing, and
output.
7.Maintains custody of systems documentation, programs, and files.
8.Operates the computer hardware and executes the program according to
operating instructions.
Answers - Matching 10-2
(Short Answer)
4.9/5
(34)
PCAOB standards require the auditor to evaluate the effectiveness of the audit committee as part of understanding the control environment and monitoring. Which of the following is not a factor the auditor should consider in making this evaluation?
(Multiple Choice)
4.8/5
(36)
Communication includes making sure that personnel involved in the financial reporting system understand how their activities relate to the work of others inside the organization.
(True/False)
4.9/5
(37)
Application controls are designed to provide reasonable assurance that IT records, processes, and reports data properly for specific applications.
(True/False)
4.8/5
(42)
Which of the following is not normally a characteristic of batch entry/batch processing in a small system?
(Multiple Choice)
4.8/5
(33)
Which of the following is an incorrect quotation from the second field work standard?
(Multiple Choice)
4.9/5
(37)
The accounting records for an asset should normally be maintained by the same individual who controls that asset.
(True/False)
4.8/5
(45)
In database management systems, an important documentation control is the data repository.
(True/False)
4.8/5
(33)
Which one of the following positions maintains custody of systems documentation, programs, and files?
(Multiple Choice)
4.7/5
(35)
Which one of the following is not an inherent limitation in an entity's internal controls?
(Multiple Choice)
4.9/5
(40)
The use of a transaction log is most commonly associated with which of the following data processing methods?
(Multiple Choice)
4.8/5
(38)
The rekeying of all or a portion of the input data is an example of a:
(Multiple Choice)
4.9/5
(48)
Which of the following control program development, program changes, computer operations, and access to programs and data?
(Multiple Choice)
4.7/5
(40)
Showing 41 - 60 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)