Professional Documents
Culture Documents
1) Which of the following is not one of the three primary objectives of effective internal control?
A) reliability of financial reporting
B) efficiency and effectiveness of operations
C) compliance with laws and regulations
D) assurance of elimination of business risk
Answer: D
2) With which of management's assertions with respect to implementing internal controls is the
auditor primarily concerned?
A) efficiency of operations
B) reliability of financial reporting
C) effectiveness of operations
D) compliance with applicable laws and regulations
Answer: B
3) Internal controls
A) are implemented by and are the responsibility of the auditors.
B) consist of policies and procedures designed to provide reasonable assurance that the company
achieves its objectives and goals.
C) guarantee that the company complies with all laws and regulations.
D) only apply to SEC companies.
Answer: B
6) Section 404 of the Sarbanes-Oxley Act requires that both private and public companies issue
an internal control report.
Answer: FALSE
7) Management has a legal and professional responsibility to be sure that the financial statements
are prepared in accordance with reporting requirements of applicable accounting frameworks.
Answer: TRUE
1
Copyright © 2017 Pearson Education, Ltd.
11.2 Learning Objective 11-2
3) The PCAOB places responsibility for the reliability of internal controls over the financial
reporting process on
A) the company's board of directors.
B) the audit committee of the board of directors.
C) management.
D) the CFO and the independent auditors.
Answer: C
4) Which of the following parties provides an assessment of the effectiveness of internal control
over financial reporting for public companies?
A)
Management Financial statement auditors
Yes Yes
B)
Management Financial statement auditors
No No
C)
Management Financial statement auditors
Yes No
D)
Management Financial statement auditors
No Yes
Answer: A
2
Copyright © 2017 Pearson Education, Ltd.
5) An act of two or more employees to steal assets and cover their theft by misstating the
accounting records would be referred to as
A) collusion.
B) a material weakness.
C) a control deficiency.
D) a significant deficiency.
Answer: A
7) When management is evaluating the design of internal control, management evaluates whether
the control can do which of the following?
A)
Detect material Correct material
misstatements misstatements
Yes Yes
B)
Detect material Correct material
misstatements misstatements
No No
C)
Detect material Correct material
misstatements misstatements
Yes No
D)
Detect material Correct material
misstatements misstatements
No Yes
Answer: C
8) When one material weakness is present at the end of the year, management of a public
company must conclude that internal control over financial reporting is
A) insufficient.
B) inadequate.
C) ineffective.
D) inefficient.
Answer: C
9) The auditors primary purpose in auditing the client's system of internal control over financial
reporting is
A) to prevent fraudulent financial statements from being issued to the public.
B) to evaluate the effectiveness of the company's internal controls over all relevant assertions in
the financial statements.
C) to report to management that the internal controls are effective in preventing misstatements
from appearing on the financial statements.
D) to efficiently conduct the Audit of Financial Statements.
3
Copyright © 2017 Pearson Education, Ltd.
Answer: B
10) The internal control framework used by most U.S. companies is the ________ framework.
A) FASB
B) PCAOB
C) COSO
D) SEC
Answer: C
11) In performing the audit of internal control over financial reporting, the auditor emphasizes
internal control over classes of transactions because
A) the accuracy of accounting system outputs depends heavily on the accuracy of inputs and
processing.
B) the class of transaction is where most fraud schemes occur.
C) account balances are less important to the auditor then the changes in the account balances.
D) classes of transactions tests are the most efficient manner to compensate for inherent risk.
Answer: A
12) Internal controls can never be regarded as completely effective. Even if company personnel
could design an ideal system, its effectiveness depends on the
A) adequacy of the computer system.
B) proper implementation by management.
C) ability of the internal audit staff to maintain it.
D) competency and dependability of the people using it.
Answer: D
14) Of the following statements about internal controls, which one is least likely to be correct?
A) No one person should be responsible for the custodial responsibility and the recording
responsibility for an asset.
B) Transactions must be properly authorized before such transactions are processed.
C) Because of the cost-benefit relationship, a client may apply controls on a test basis.
D) Control procedures reasonably ensure that collusion among employees cannot occur.
Answer: D
18) An auditor should consider two key issues when obtaining an understanding of a client's
internal controls. These issues are
A) the effectiveness and efficiency of the controls.
B) the frequency and effectiveness of the controls.
C) the design and operating effectiveness of the controls.
D) the implementation and operating effectiveness of the controls.
Answer: C
19) Reasonable assurance allows for
A) low likelihood that material misstatements will not be prevented or detected by internal
controls.
B) no likelihood that material misstatements will not be prevented or detected by internal
control.
C) moderate likelihood that material misstatements will not be prevented or detected by internal
control.
D) high likelihood that material misstatements will not be prevented or detected by internal
control.
Answer: A
5
Copyright © 2017 Pearson Education, Ltd.
20) Which of the following is most correct regarding the requirements under Section 404 of the
Sarbanes-Oxley Act?
A) The audits of internal control and the financial statements provide reasonable assurance as to
misstatements.
B) The audit of internal control provides absolute assurance of misstatement.
C) The audit of financial statements provides absolute assurance of misstatement.
D) The audits of internal control and the financial statements provide absolute assurance as to
misstatements.
Answer: A
21) Under the Dodd-Frank federal financial reform legislation, all public companies are required
to obtain an audit report on internal control over financial reporting.
Answer: FALSE
22) When a company designs and implements internal controls, cost of the controls is not a valid
consideration.
Answer: FALSE
11.3 Learning Objective 11-3
1) Which of the following activities would be least likely to strengthen a company's internal
control?
A) separating accounting from other financial operations
B) maintaining insurance for fire and theft
C) fixing responsibility for the performance of employee duties
D) carefully selecting and training employees
Answer: B
2) Which of the following components of the control environment define the existing lines of
responsibility and authority?
A) organizational structure
B) management philosophy and operating style
C) human resource policies and practices
D) management integrity and ethical values
Answer: A
B)
Geographic dispersion of Presence of new information
company operations technologies
No No
C)
6
Copyright © 2017 Pearson Education, Ltd.
Geographic dispersion of Presence of new information
company operations technologies
Yes No
D)
Geographic dispersion of Presence of new information
company operations technologies
No Yes
Answer: A
4) Which of the following statements is most correct with respect to separation of duties?
A) A person who has temporary or permanent custody of an asset should account for that asset.
B) Employees who authorize transactions should not have custody of related assets.
C) Employees who open cash receipts should record the amounts in the subsidiary ledgers.
D) Employees who authorize transactions should have recording responsibility for these
transactions.
Answer: B
5) Authorizations can be either general or specific. Which of the following is not an example of a
general authorization?
A) automatic reorder points for raw materials inventory
B) a sales manager's authorization for a sales return
C) credit limits for various classes of customers
D) a sales price list for merchandise
Answer: B
6) Which of the following is correct with respect to the design and use of business documents?
A) The documents should be in paper format.
B) Documents should be designed for a single purpose to avoid confusion in their use.
C) Documents should be designed to be understandable only by those who use them.
D) Documents should be prenumbered consecutively to facilitate control over missing
documents.
Answer: D
9) Which of the following best describes an entity's accounting information and communication
system?
A)
Record and
Monitor process
transactions transactions Initiate transactions
Yes Yes Yes
B)
Record and
Monitor process
transactions transactions Initiate transactions
No No No
C)
Record and
Monitor process
transactions transactions Initiate transactions
Yes No No
D)
Record and
Monitor process
transactions transactions Initiate transactions
No Yes Yes
Answer: D
12) Which of the following is not one of the subcomponents of the control environment?
A) management's philosophy and operating style
8
Copyright © 2017 Pearson Education, Ltd.
B) organizational structure
C) adequate separation of duties
D) commitment to competence
Answer: C
13) It is important for the CPA to consider the competence of the clients' personnel because their
competence has a direct impact upon the
A) cost/benefit relationship of the system of internal control.
B) achievement of the objectives of internal control.
C) comparison of recorded accountability with assets.
D) timing of the tests to be performed.
Answer: B
18) To promote operational efficiency, the internal audit department would ideally report to
A) line management.
B) the PCAOB.
9
Copyright © 2017 Pearson Education, Ltd.
C) the Chief Accounting Officer.
D) the audit committee.
Answer: D
19) Hanlon Corp. maintains a large internal audit staff that reports directly to the accounting
department. Audit reports prepared by the internal auditors indicate that the system is functioning
as it should and that the accounting records are reliable. An independent auditor will probably
A) eliminate tests of controls.
B) increase the depth of the study and evaluation of administrative controls.
C) avoid duplicating the work performed by the internal audit staff.
D) place limited reliance on the work performed by the internal audit staff.
Answer: D
20) External financial statement auditors must obtain evidence regarding what attributes of an
internal audit (IA) department if the external auditors intend to rely on IA's work?
A) integrity
B) objectivity
C) competence
D) all of the above
Answer: D
22) The ________ is helpful in preventing classification errors if it accurately describes which
type of transaction should be in each account.
A) general ledger
B) general journal
C) trial balance
D) chart of accounts
Answer: D
23) Control activities help assure that the necessary actions are taken to address risks to the
achievement of the company's objectives. List the five types of control activities.
Answer:
1. adequate separation of duties
2. proper authorization of transactions and activities
3. adequate documents and records
4. physical control over assets and records
5. independent checks on performance
10
Copyright © 2017 Pearson Education, Ltd.
30) Control activities are a subcomponent of the information and communication component of
internal control.
Answer: FALSE
32) The chart of accounts is helpful in preventing classification errors if it accurately describes
which type of transaction should be in each account.
Answer: TRUE
33) Auditing standards prohibit reliance on the work of internal auditors due to the lack of
independence of the internal auditors.
Answer: FALSE
34) If an auditor wishes to rely on the work of internal auditors (IA), the auditor must obtain
satisfactory evidence related to the IA's competence, integrity, and objectivity.
Answer: TRUE
35) An example of a specific authorization is management setting a policy authorizing the
ordering of inventory when less than a one-week supply is on hand.
Answer: FALSE
36) Personnel responsible for performing internal verification procedures must be independent of
those originally responsible for preparing the data.
Answer: TRUE
1) Old and new systems operating simultaneously in all locations is a test approach known as
A) pilot testing.
B) horizontal testing.
C) integrative testing.
D) parallel testing.
Answer: D
5) Which of the following describes the process of implementing a new system in one part of the
organization, while other locations continue to use the current system?
A) parallel testing
B) online testing
C) pilot testing
D) control testing
Answer: C
6) A ________ is responsible for controlling the use of computer programs, transaction files and
other computer records and documentation and releases them to the operators only when
authorized.
A) software engineer
B) chief computer operator
C) librarian
D) data control operator
Answer: C
7) Security controls should require that users enter a(n) ________ before being allowed access to
software and other related data files.
A) echo check
B) parity check
C) self-diagnosis test
D) authorized password
Answer: D
8) Typical controls developed for manual systems which are still important in IT systems include
A) management's authorization of transactions.
B) competent personnel.
C) adequate preparation of input source documents.
D) all of the above.
Answer: D
9) Which of the following controls prevent and detect errors while transaction data are
processed?
A) software
12
Copyright © 2017 Pearson Education, Ltd.
B) application
C) processing
D) transaction
Answer: C
11) Output controls need to be designed for which of the following data integrity objectives?
A) detecting errors after the processing is completed
B) preventing errors before the processing is completed
C) detecting errors in the general ledger adjustment process
D) preventing errors in separation of duties for IT personnel
Answer: A
12) A control that relates to all parts of the IT system is called a(n)
A) general control.
B) systems control.
C) universal control.
D) applications control.
Answer: A
13) Controls that are designed for each software application and are intended to help a company
satisfy the transaction-related audit objectives are
A) user controls.
B) general controls.
C) audit controls.
D) application controls.
Answer: D
13
Copyright © 2017 Pearson Education, Ltd.
16) Controls which are built in by the manufacturer to detect equipment failure are called
A) input controls.
B) data integrity controls.
C) hardware controls.
D) manufacturer's controls.
Answer: C
17) Controls which are designed to assure that the information entered into the computer is
authorized, complete, and accurate are called
A) input controls.
B) processing controls.
C) output controls.
D) general controls.
Answer: A
18) When dealing with the administration of the IT function and the segregation of IT duties
A) in large organizations, management should assign technology issues to outside consultants.
B) programmers should investigate all security breaches.
C) the board of directors should not get involved in IT decisions since it is a routine function
handled by middle management.
D) in complex environments, management may establish IT steering committees.
Answer: D
19) Which of the following tests determines that every field in a record has been completed?
A) validation
B) sequence
C) completeness
D) programming
Answer: C
23) Which of the following best explains the relationship between general controls and
application controls?
A) Application controls are effective even if general controls are extremely weak.
B) Application controls are likely to be effective only when general controls are effective.
C) General controls have no impact on application controls.
D) None of the above
Answer: B
24) A(n) ________ total represents the summary total of codes from all records in a batch that do
not represent a meaningful total.
A) record
B) hash
C) output
D) financial
Answer: B
26) If a control total were to be computed on each of the following data items, which would best
be identified as a hash total for a payroll IT application?
A) gross wages earned
B) employee numbers
C) total hours worked
D) total debit amounts and total credit amounts
Answer: B
15
Copyright © 2017 Pearson Education, Ltd.
28) Which of the following is not a general control?
A) separation of IT duties
B) systems development
C) processing controls
D) hardware controls
Answer: C
29) ________ is the information technology and internal control processes an organization has in
place to protect computers, networks, programs, and data from unauthorized access.
A) Encryption
B) A firewall
C) Cybersecurity
D) A processing control
Answer: C
34) Match six of the terms (a-j) with the definitions provided below (1-6):
a. Application controls
b. Error listing
c. General controls
d. Hardware controls
e. Input controls
f. Output controls
g Parallel simulation
h. Parallel testing
i Pilot testing
j. Processing controls
________ 1. The new and old systems operate simultaneously in all locations.
________ 3. Controls such as review of data for reasonableness, designed to assure that data
generated by the computer is valid, accurate, complete, and distributed only to authorized people.
________ 5. A new system is implemented in one part of the organization while other locations
continue to rely on the old system.
16
Copyright © 2017 Pearson Education, Ltd.
________ 6. Controls such as proper authorization of documents, check digits, and adequate
documentation, designed to assure that the information to be entered into the computer is
authorized, complete, and accurate.
Answer:
1. h
2. c
3. f
4. a
5. i
6. e
39) Parallel testing is used when old and new systems are operated simultaneously in all
locations.
Answer: TRUE
40) Programmers should only be allowed to work with test copies of programs and data.
Answer: TRUE
41) In IT systems, if general controls are effective, it increases the auditor's ability to rely on
application controls to reduce control risk.
Answer: TRUE
42) Parallel testing can be used in combination with pilot testing to test new systems.
Answer: TRUE
43) The effectiveness of automated controls depends solely on the competence of the personnel
performing the controls.
Answer: FALSE
44) Backup and contingency plans should also identify alternative hardware that can be used to
process company data.
Answer: TRUE
45) A large portion of errors in IT systems result from data entry errors.
Answer: TRUE
46) Output controls focus on preventing errors during processing.
Answer: FALSE
48) Controls that relate to a specific use of the IT system, such as the processing of sales or cash
receipts, are called application controls.
Answer: TRUE
B)
Encryption techniques Digital signatures Firewall
Yes No No
C)
Encryption techniques Digital signatures Firewall
No Yes Yes
D)
Encryption techniques Digital signatures Firewall
Yes Yes No
Answer: A
5) Rather than maintain an internal IT center, many companies outsource their basic IT functions
such as payroll to an
A) external general service provider.
18
Copyright © 2017 Pearson Education, Ltd.
B) independent computer service center.
C) internal control service provider.
D) internal auditor.
Answer: B
6) When the auditor is obtaining an understanding of the independent computer service center's
internal controls, the auditor should
A) use the same criteria used to evaluate the client's internal controls.
B) use different criteria because the service center resides outside the company.
C) use the same criteria used to evaluate the client's internal controls but omit tests of
transactions.
D) use different criteria for the service center by including substantive tests of balances.
Answer: A
8) A(n) ________ is a computer resource deployment and procurement model that enables an
organization to obtain IT resources and applications from any location via an Internet
connection.
A) application service provider
B) firewall
C) cloud computing environment
D) local area network
Answer: C
10) Firewalls can protect company data and software programs.
Answer: TRUE
11) LANs link equipment within a single or small cluster of buildings and are used within a
company.
Answer: TRUE
12) Companies using e-commerce systems to transact business electronically do not need to be
concerned about how their e-commerce partners manage IT systems risks.
Answer: FALSE
19
Copyright © 2017 Pearson Education, Ltd.