Exam 8: Internal Controls and Control Risk
Exam 1: The Demand for Audit and Other Assurance Services69 Questions
Exam 2: The Public Accounting Profession and Audit Quality68 Questions
Exam 3: Legal Liability55 Questions
Exam 4: Professional Judgment and Ethics72 Questions
Exam 5: Audit Responsibilities and Objectives67 Questions
Exam 6: Client Acceptance and Planning the Audit60 Questions
Exam 7: Materiality and Risk65 Questions
Exam 8: Internal Controls and Control Risk62 Questions
Exam 9: Audit Evidence80 Questions
Exam 10: Audit Strategy and Audit Program67 Questions
Exam 11: Audit Sampling Concepts67 Questions
Exam 12: Audit of the Revenue Cycle134 Questions
Exam 13: Audit of the Acquisition and Payment Cycle64 Questions
Exam 14: Audit of the Inventory and Distribution Cycle66 Questions
Exam 15: Audit of the Human Resources and Payroll Cycle66 Questions
Exam 16: Audit of the Capital Acquisition and Repayment Cycle66 Questions
Exam 17: Audit of Cash Balances65 Questions
Exam 18: Completing the Audit65 Questions
Exam 19: Audit Reports on Financial Statements67 Questions
Exam 20: Other Assurance and Nonassurance Services59 Questions
Select questions type
Jenny is the information technology support manager at CMH. Jenny is considered to be a super-user at CMH since she can circumvent normal controls. In order to address the risk of super-users, management should
(Multiple Choice)
4.8/5
(35)
An important type of protective measure for safeguarding assets and records is
(Multiple Choice)
4.9/5
(33)
Why is it important to separate systems development (or acquisition) and program maintenance activities from accounting?
(Multiple Choice)
4.8/5
(28)
An act of two or more employees to work together to misstate records is called
(Multiple Choice)
4.8/5
(45)
A system of internal control consists of policies and procedures designed to provide management with
(Multiple Choice)
4.8/5
(36)
Which of the following is an example of a general authorization?
(Multiple Choice)
4.8/5
(26)
HomeTown Tanning Company is the largest leather tanning operation in Canada. Hides from various animals are stretched and treated, then cut into shapes for shipment to wholesalers.
Computer-assisted operations are important in maintaining temperature, humidity, and proper mix proportions in chemical solutions used for the tanning process. Computer assistance has helped improve the quality of the tanning process, as well as provide a safer environment for employees. Computer operations and backup are supported by the warehouse manager, Joe.
Individual hides are tagged with a bar code and tracked for quality control purposes. The HomeTown Tanning Company uses a centralized microcomputer-based system for its manufacturing and accounting operations. The two owners of the company are active in the business and approve all new hardware and software acquisitions.
The controller is responsible for network upgrades as well as for maintaining passwords and user identification codes on the network. Accounting transactions are entered by accounting staff, although the controller has the ability to review and correct transactions.
Required:
List the six categories of functions that need to be separated from each other. Does HomeTown Tanning have these functions separated? For any functions that are not separated, indicate the potential impact upon controls and upon the audit.
(Essay)
4.8/5
(53)
You have just finished documenting your understanding of cycle controls at an audit engagement.
Required:
A) Explain how you will identify the controls that will be tested.
B) What process will you follow for weakness in internal controls?
(Essay)
4.9/5
(44)
When planning the audit, the auditor's decision on the appropriate assessed level of control risk to use is
(Multiple Choice)
4.8/5
(39)
A major control available in a small company, which might not be feasible in a large company, is
(Multiple Choice)
4.8/5
(42)
The procedures to test effectiveness of control policies and procedures in support of a reduced assessed control risk are called
(Multiple Choice)
4.7/5
(34)
The chart of accounts is an important control because it provides the framework for determining the information presented to management and other financial statement users. What type of error is the chart of accounts helpful in preventing?
(Multiple Choice)
4.9/5
(35)
When a compensating control exists, a weakness in the system
(Multiple Choice)
4.7/5
(35)
An example of general computer control systems that provide reasonable assurance of authorization of application systems is
(Multiple Choice)
4.9/5
(39)
Carrie is the manager of the Bay Street Pharmacy. Carrie is considering implementing a security tag system to reduce the losses related to stolen goods at their store. The system Carrie is looking at currently costs $60 000 and is expected to be effective for 5 years. In order to justify the implementation of the security tag system, average theft per year should be at least
(Multiple Choice)
4.9/5
(41)
The operational responsibility and the recording of transactions are normally kept separate
(Multiple Choice)
4.9/5
(40)
After considering a client's internal controls, an auditor has concluded that it is well designed and is functioning as intended. Under these circumstances, the auditor would most likely
(Multiple Choice)
4.8/5
(35)
The board of directors is essential for effective corporate governance because it has ultimate responsibility to
(Multiple Choice)
5.0/5
(41)
A) The first step in the auditor's study and evaluation of internal control is obtain understanding of internal control for audit planning purposes. List the remaining steps.
B) Once the auditor has an understanding of internal control, what two assessments must be made prior to testing controls?
C) Describe five common procedures an auditor can use to obtain an understanding of internal control design.
(Essay)
4.9/5
(37)
Narratives, flowcharts, and internal control questionnaires are three commonly used methods of
(Multiple Choice)
4.8/5
(33)
Showing 41 - 60 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)