SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: Level 1

Questions and Answers List

level questions: Level 1

QuestionAnswer
Developed and implemented to help achieve entity’s objectiveInternal Control
It includes all of the means by which business are directed and controlledCorporate governance
It arises from the fact that shareholders and the managers are different peopleAgency problem
aligning the goals of two or more groupsGoal congruence
Importance of Corporate GovernanceVital for general health and well-being of a country as well the company and its investors
Also means Articles of Incorporation or Certificate of IncorporationCharter
When does entity recognized as legal entity?When certificate of incorporation has been issued
This board committee should oversee the accounting and financial reporting process and the audits of the financial statementsAudit Committee
Responsibilities of the CEODepends on the board of directors’ mandate
High level Risks Identification. Can arise both externally and internallyEntity Level Risks
Risk identification which occur at level of subsidiaries, divisions operating units or functionsTransaction Level Risks
Low likelihood of occurrence and low impact risksAcceptance
High likelihood of occurrence and high impact risksAvoidance/exiting
High likelihood of occurrence and low impact risksReduction / Mitigation
Low likelihood of occurrence and high impact risksSharing / Insurance
Compliance with anti-bribery provision of FCPA is responsibility of who?Entire company
Inspect public accounting firm’s compliance with the ActPCAOB
Develop US auditing standardsPublic Company Accounting Oversight Board
Lead and Review Partner must rotate the audit client every how many years?5 years
Lead and Review Partner must remain OFF the audit5
Other Audit Partner must rotate the audit client after every7 years
organization’s ethical values, foundation of internal controlControl Environment
process of identifying, analyzing, and managing risksRisk Assessment
Internal control actions establishedControl Activities
sharing the identified and captured info regarding internal controlInformation and communication
assessing the effectiveness and operation of internal controlMonitoring
designed to support continued operation of technology and to support automated control activitiesTechnology general controls
10k (Annual Report) and 10Q (Quarterly report) must be accompanied byCertification of the company's principal executive director (MRL)
SEC and PCAOB prescribed what kind of approach in evaluating internal control?Top-down, risk based approach
Who nominates company's independent auditors?Audit committee, ratified by shareholders
Control which relate to system components, processes and data in a system environmentGeneral controls
Controls which relate to specific to individual applications and are designed to prevent, detect and correct errors and irregularities in transactions during the input, processing and output stagesApplication controls
The one who reviews the current systems to make sure that it is meeting the need of the organizationSystem analyst
The one who write, test and document the systemsProgrammers
The one who perform the actual operation of the computers for processing dataComputer operator
The one who reconciles input to output. Distributes output to authorized users and checks that errors are corrected.Data control group
The one who converts and transmit dataData conversion operator
The one who maintain the documentation, programs, and data filesLibrarians
The one who controls the access to various files, making program changes, and making source code details available only to those who need to knowDatabase administrator
Document created by a computer, then some additional information is added to it and it is returned to become an input document to the computer.Turnaround document
Monitors the use of software and prevent unauthorized access to itSoftware controls
Used to prevent unauthorized changes to application and systemProgram security controls
The original which is written by the programmers in common wordsSource code
The machine executable file which is the output of the compiler from source codeObject code
Controls which keeps the computer equipment physically secureHardware controls
Controls the access and ability to use equipment to protect from damage or theft. It includes access controls for users to limit actions they can performLogical security
prevent access to data files without authorization and prevent unauthorized or accidental change or destructionsData security control
Are controls designed to provide reasonable assurance that the input entered into the system has: a. Proper authorization b. Has been converted to machine-sensible form c. Has been entered accurately and completelyInput controls
Established predefined data limits in inputLimit checks
Match the input to an acceptable set of valuesValidity checks
Limit the number of digits in inputOverflow checks
checks whether the input number that is part of a group has been transcribed properlyCheck digits
input of information twiceKey verification
Control totals for nonmonetary informationHash totals
Compares input with the existing recordsReasonable checks
Assure the numeric data are used only for inputNumeric checks
controls designed to provide reasonable assurance that no transactions have been lost or incorrectly added and prevent/discouraged improper manipulation of dataProcessing controls
Processing controls at the time of data accessData access controls
Used to control movement of data from source to the processing point or from processing point to anotherTransmittal documents
Count transactions twice, during preparation and processing batchRecord count
Controls involving data manipulation later in the processingData manipulation controls
Checks for programming language errorsCompiler
Used to test a computer programTest data
Test the interaction of several different computer programsSystem testing
Comparing output total used as input total over subsequent processingRun-to-run total
Provide reasonable assurance that the input and processing have resulted in valid outputOutput controls
Provide all changes to master file and create an audit trailActivity/proof listing
Reconciliation of input totals and processing totalsOutput total reconciliation
resubmission of corrected error transactions as if they were new transactionsUpstream resubmission
uses feedback to measure differences between the actual and desired outputFeedback loop
A self-monitoring systemCybernatic system
produce feedback that can be monitored to and evaluated to determine if the system is functioning as it is supposed toFeedback control
attempts to predict when problems and deviations will occur before they actually occur.Feedforward controls
running both the old and the new system together for a period of timeParallel conversion
converting only parts of the application at a time or only a few locations at a timePhased conversion
the new system is tested only in just one work site before full implementationPilot conversion
changing immediately from the old system to the new systemDirect conversion
process of assigning people account and passwordsUser account management
barrier between the internal and the external networks and prevent unauthorized access to internal network.Firewall
converts data into a code and then key is required to convert the code back to dataEncryption
computer users’ ability to observe transmission intended for someone elseElectronic eavesdropping
Any program that does something besides what a person believes it will doTrojan horse
It executes and replicates itself which destroy computer systemVirus
Destroys computer system which do not need a host file to replicate itselfWorms
It will be deleted as it looks like virus but the file is actually needed for the computer to function properlyVirus hoax
repeatedly accessing website so that legitimate users cannot connect to itDenial of Service (DOS)
spam email to deceive recipient in disclosing personal informationPhishing
Cybercrime tool which is intended to destroy or take control of another computerMalware installation
a software that can probe a server or a computer for open portsPort scanner
software that grabs all of the traffic flowing into and out of a computer attached to a networkSniffers
errors in the logic of the computer programs that result in the destruction of computer data or malicious attack when specific criteria are metLogic bombs
sends too much data to the buffer in a computer’s memory, crashing it or enabling the hacker to gain control over itBuffer overflow
deceiving company employees to divulge informationSocial engineering
sifting into company’s trash for information that can be usedDumpster diving
limiting websites an organization can accessProxy-server
eliminates the broadcasting of traffic to every machineSwitched network
used by auditor in understanding and assessing internal control within company systemFlowcharts
a point in the process where an error or irregularity is likely to occurControl point (WCGWs)
Computerized audit technique where computer select, extract and process sample data from computer filesGeneral Audit System
Computerized audit technique where processing of both valid and invalid data manually and electronically and comparing the output of both.Test Data