Fill This Form To Receive Instant Help
Homework answers / question archive / Utah State University ACCT 610 Chapter 15-IT Controls Part I: Sarbanes-Oxley and IT Governance TRUE/FALSE 1)Corporate management (including the CEO) must certify monthly and annually their organization’s internal controls over financial reporting
Utah State University
ACCT 610
Chapter 15-IT Controls Part I: Sarbanes-Oxley and IT Governance
TRUE/FALSE
1)Corporate management (including the CEO) must certify monthly and annually their organization’s internal controls over financial reporting.
a. |
Auditors must determine, whether changes in internal control has, or is likely to, materially affect internal control over financial reporting. |
b. |
Auditors must interview management regarding significant changes in the design or operation of internal control that occurred since the last audit. |
c. |
Corporate management (including the CEO) must certify monthly and annually their organization’s internal controls over financial reporting. |
d. |
Management must disclose any material changes in the company’s internal controls that have occurred during the most recent fiscal quarter. |
a. |
A statement of management’s responsibility for establishing and maintaining adequate internal control user satisfaction. |
b. |
A statement that the organizations internal auditors has issued an attestation report on management’s assessment of the companies internal controls. |
c. |
A statement identifying the framework used by management to conduct their assessment of internal controls. |
d. |
An explicit written conclusion as to the effectiveness of internal control over financial reporting. |
a. |
program coding from program operations |
b. |
program operations from program maintenance |
c. |
program maintenance from program coding |
d. |
all of the above duties should be separated |
a. |
rapid turnover of systems professionals complicates management's task of assessing the competence and honesty of prospective employees |
b. |
many systems professionals have direct and unrestricted access to the organization's programs and data |
c. |
rapid changes in technology make staffing the systems environment challenging |
d. |
systems professionals and their supervisors work at the same physical location |
a. |
natural disasters such as fires |
b. |
unauthorized access |
c. |
data corruption caused by program errors |
d. |
system crashes |
a. |
systems development from data processing |
b. |
data operations from data librarian |
c. |
data preparation from data control |
d. |
data control from data librarian |
a. |
weakens database access security |
b. |
allows programmers access to make unauthorized changes to applications during execution |
c. |
results in inadequate documentation |
d. |
results in master files being inadvertently erased |
a. |
separate systems development from systems maintenance |
b. |
separate systems analysis from application programming |
c. |
separate systems development from data processing |
d. |
separate database administrator from data processing |
a. |
lack of separation of duties |
b. |
system incompatibilities |
c. |
system interdependency |
d. |
lack of documentation standards |
a. |
off-site storage of backups |
b. |
computer services function |
c. |
second site backup |
d. |
critical applications identified |
a. |
internally provided backup |
b. |
recovery operations center |
c. |
empty shell |
d. |
mutual aid pact |
a. |
the host site may be unwilling to disrupt its processing needs to process the critical applications of the disaster stricken company |
b. |
intense competition for shell resources during a widespread disaster |
c. |
maintenance of excess hardware capacity |
d. |
the control of the shell site is an administrative drain on the company |
a. |
this is an inexpensive solution |
b. |
the initial recovery period is very quick |
c. |
the company has sole control over the administration of the center |
d. |
none of the above are advantages of the recovery operations center |
a. |
month-end adjustments |
b. |
accounts receivable |
c. |
accounts payable |
d. |
order entry/billing |
a. |
backups of systems software |
b. |
backups of application software |
c. |
documentation and blank forms |
d. |
results of the latest test of the disaster recovery program |
a. |
systems documentation is inadequate because of pressures to begin coding a new program before documenting the current program |
b. |
illegal lines of code are hidden among legitimate code and a fraud is covered up for a long period of time |
c. |
a new systems analyst has difficulty in understanding the logic of the program |
d. |
inadequate systems documentation is prepared because this provides a sense of job security to the programmer |
a. |
clearly marked exits |
b. |
an elaborate water sprinkler system |
c. |
manual fire extinguishers in strategic locations |
d. |
automatic and manual alarms in strategic locations |
a. |
evaluating internal controls |
b. |
preparing financial statements |
c. |
expressing an opinion |
d. |
analyzing financial data |
a. |
Auditors must maintain independence. |
b. |
IT auditors attest to the integrity of the computer system. |
c. |
IT auditing is independent of the general financial audit. |
d. |
IT auditing can be performed by both external and internal auditors. |
a. |
IT audits |
b. |
evaluation of operational efficiency |
c. |
review of compliance with legal obligations |
d. |
internal auditors perform all of the above tasks |
a. |
internal auditors represent the interests of management and external auditors represent outsiders |
b. |
internal auditors perform IT audits and external auditors perform financial statement audits |
c. |
internal auditors focus on financial statement audits and external auditors focus on operational audits and financial statement audits |
d. |
external auditors assist internal auditors but internal auditors cannot assist external auditors |
a. |
reduce audit fees |
b. |
ensure independence |
c. |
represent the interests of management |
d. |
the statement is not true; internal auditors are not permitted to assist external auditors with financial audits |
a. |
Auditors gather evidence using tests of controls and substantive tests. |
b. |
The most important element in determining the level of materiality is the mathematical formula. |
c. |
Auditors express an opinion in their audit report. |
d. |
Auditors compare evidence to established criteria. |
a. |
substantive testing |
b. |
tests of controls |
c. |
post-audit testing |
d. |
audit planning |
a. |
completing questionnaires |
b. |
interviewing management |
c. |
observing activities |
d. |
confirming accounts receivable |
a. |
examining the safety deposit box for stock certificates |
b. |
reviewing systems documentation |
c. |
completing questionnaires |
d. |
observation |
a. |
confirming accounts receivable |
b. |
counting inventory |
c. |
completing questionnaires |
d. |
counting cash |
a. |
control risk |
b. |
legal risk |
c. |
detection risk |
d. |
inherent risk |
a. |
the probability that the auditor will render an unqualified opinion on financial statements that are materially misstated |
b. |
associated with the unique characteristics of the business or industry of the client |
c. |
the likelihood that the control structure is flawed because controls are either absent or inadequate to prevent or detect errors in the accounts |
d. |
the risk that auditors are willing to take that errors not detected or prevented by the control structure will also not be detected by the auditor |
a. |
review of fire marshal records |
b. |
review of the test of the backup power supply |
c. |
verification of the second site backup location |
d. |
observation of procedures surrounding visitor access to the computer center |
a. |
inspection of the second site backup |
b. |
analysis of the fire detection system at the primary site |
c. |
review of the critical applications list |
d. |
composition of the disaster recovery team |
a. |
In the CBIS environment, auditors gather evidence relating only to the contents of databases, not the reliability of the computer system. |
b. |
Conducting an audit is a systematic and logical process that applies to all forms of information systems. |
c. |
Substantive tests establish whether internal controls are functioning properly. |
d. |
IT auditors prepare the audit report if the system is computerized. |
a. |
exists because all control structures are flawed in some ways. |
b. |
is the likelihood that material misstatements exist in the financial statements of the firm. |
c. |
is associated with the unique characteristics of the business or industry of the client. |
d. |
is the likelihood that the auditor will not find material misstatements. |
a. |
written assertions and a practitioner’s written report |
b. |
the engagement is designed to conduct risk assessment of the client’s systems to verify their degree of SOX compliance |
c. |
the formal establishment of measurements criteria |
d. |
the engagement is limited to examination, review, and application of agreed-upon procedures |
a. |
that all of the assets and equities on the balance sheet exist |
b. |
that all employees are properly trained to carry out their assigned duties |
c. |
that all transactions on the income statement actually occurred |
d. |
that all allocated amounts such as depreciation are calculated on a systematic and rational basis |
a. Both the SEC and the PCAOB requires the use of the COSO framework
b.Both the SEC and the PCAOB requires the COBIT framework
c. The SEC recommends COBIT and the PCAOB recommends COSO
d.Any framework can be used that encompass all of COSO’s general themes
Functions to Separate |
|
Risk Exposure |
|
|
|
|
|
|
|
|
|
Already member? Sign In