Download as pdf or txt
Download as pdf or txt
You are on page 1of 43

Auditing and Assurance Services, 15e (Arens)

Chapter 11 Fraud Auditing

Learning Objective 11-1

1) Which of the following best defines fraud in a financial statement auditing context?
A) Fraud is an unintentional misstatement of the financial statements
!) Fraud is an intentional misstatement of the financial statements
") Fraud is either an intentional or unintentional misstatement of the financial statements#
de$ending on materialit%
materialit%
&) Fraud is either an intentional or unintentional misstatement of the financial statements#
de$ending on consistenc%
consistenc%
Answer' !
(erms'
(erms' &efinition of fraud
fraud in financial statement auditing
auditing
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing
thin,ing s,ills
s,ills

) "om$anies ma% intentionall% understate earnings when income is high to create ........
that ma% be used in future %ears to increase earnings
A) income smoothing
!) coo,ie jar reserves
") cash
&) sales
Answer' !
(erms'
(erms' /ntentionall% understate earnings0 +eserve earnings
earnings
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing
thin,ing s,ills
s,ills

1
"o$%right  213 4earson ducation# /nc
5) Which of the following is a categor% of fraud?
A)
Fraudulent financial re$orting 6isa$$ro$riation of assets
7es 7es

!)
Fraudulent financial re$orting 6isa$$ro$riation of assets
8o 8o

")
Fraudulent financial re$orting 6isa$$ro$riation of assets
7es 8o

&)
Fraudulent financial re$orting 6isa$$ro$riation of assets
8o 7es
7es

Answer' A
(erms'
(erms' "ategor% of fraud
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing
thin,ing s,ills
s,ills

3) 6ost cases of fraudulent re$orting involve'


A) inade9uate disclosures
!) an overstatement of income
") an overstatement of liabilities
&) an overstatement of ex$enses
Answer' !
(erms'
(erms' Financial statements subject to mani$ulation
mani$ulation
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing
thin,ing s,ills
s,ills

:) ........ is fraud that involves theft of an entit%;s assets


A) Fraudulent financial re$orting
!) A <coo,ie jar< reserve
") 6isa$$ro$riation of assets
&) /ncome smoothing
Answer' "
(erms'
(erms' Fraud that involves theft of entit%;s assets
assets
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing
thin,ing s,ills
s,ills


"o$%right  213 4earson ducation# /nc
=) Which of the following is a form of earnings management in which revenues and ex$enses are
shifted between $eriods to reduce fluctuations in earnings?
A) Fraudulent financial re$orting
!) x$ense smoothing
") /ncome smoothing
&) ach of the above is correct
Answer' "
(erms' Form of earnings management where revenues and ex$enses are shifted between $eriods
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing s,ills

>) 6isa$$ro$riation of assets is normall% $er$etrated b%'


A) members of the board of directors
!) em$lo%ees at lower levels of the organiation
") management of the com$an%
&) the internal auditors
Answer' !
(erms' 6isa$$ro$riation of assets normall% $er$etrated b%
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing s,ills

@) &efine fraud and distinguish between the two main categories of fraud
Answer' /n the context of financial statement auditing# fraud is defined as an intentional
misstatement of the financial statements

(he two main categories of fraud are fraudulent financial re$orting and misa$$ro$riation of
assets Fraudulent financial re$orting is an intentional misstatement or omission of amounts or
disclosures with the intent to deceive users of the financial statement 6isa$$ro$riation of assets
involve theft of an entit%;s assets
(erms' Fraud and main categories
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing s,ills

) Fraudulent financial re$orting is an intentional misstatement or omission of amounts or


disclosures with the intent to deceive users
A) (rue
!) False
Answer' A
(erms' Fraud in financial statement auditing
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing s,ills

5
"o$%right  213 4earson ducation# /nc
12) (he two main categories of fraud are fraudulent financial re$orting and misa$$ro$riation of
assets
A) (rue
!) False
Answer' A
(erms' "ategories of fraud0 Fraudulent financial re$orting and misa$$ro$riation of assets
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing s,ills

11) <"oo,ie jar reserves< are often created b% com$anies whenever their earnings are high to
create reserves for future $eriods when earnings need to be <boosted< u$ward
A) (rue
!) False
Answer' A
(erms' "oo,ie jar reserves
&iff' as%
Objective' LO 11-1
AA"*!' +eflective thin,ing s,ills

1) 6isa$$ro$riation of assets is normall% $er$etrated at the lowest levels of the organiation
hierarch%
A) (rue
!) False
Answer' A
(erms' 6isa$$ro$riation of assets
&iff' 6oderate
Objective' LO 11-1
AA"*!' +eflective thin,ing s,ills

15) Fraudulent financial re$orting usuall% involves mani$ulation of amounts rather than
disclosures
A) (rue
!) False
Answer' A
(erms' Fraudulent financial re$orting
&iff' 6oderate
Objective' LO 11-1
AA"*!' +eflective thin,ing s,ills

3
"o$%right  213 4earson ducation# /nc
Learning Objective 11-

1) Which of the following are elements of the fraud triangle?


A)
AttitudesBrationaliation +is, Factors O$$ortunities
7es 8o 7es

!)
AttitudesBrationaliation +is, Factors O$$ortunities
8o 7es 7es

")
AttitudesBrationaliation +is, Factors O$$ortunities
7es 8o 8o

&)
AttitudesBrationaliation +is, Factors O$$ortunities
8o 7es 8o

Answer' A
(erms' Fraud triangle
&iff' as%
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

) Financial statement mani$ulation ris, is arguabl% $resent for all com$anies; financial
statements Cowever# the ris, is elevated for com$anies that'
A) are heavil% regulated
!) have low amounts of debt
") have to ma,e significant judgments for accounting estimates
&) o$erate in stable economic environments
Answer' "
(erms' Financial statement mani$ulation ris, is elevated
&iff' as%
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

:
"o$%right  213 4earson ducation# /nc
5) Which of the following is not a factor that relates to o$$ortunities to commit fraudulent
financial re$orting?
A) Lac, of controls related to the calculation and a$$roval of accounting estimates
!) /neffective oversight of financial re$orting b% the board of directors
") 6anagement;s $ractice of ma,ing overl% aggressive forecasts
&) Cigh turnover of accounting# internal audit# and information technolog% staff
Answer' "
(erms' Factor relates to o$$ortunities to commit fraudulent financial re$orting
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

3) Fraud is more $revalent in smaller businesses and no t-for-$rofit organiations because it is


more difficult for them to maintain'
A) ade9uate se$aration of duties
!) ade9uate com$ensation
") ade9uate financial re$orting standards
&) ade9uate su$ervisor% boards
Answer' A
(erms' Fraud more $revalent in smaller business and not-for-$rofit organiations
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

:) Which of the following is a factor that relates to incentives or $ressures to commit fraudulent
financial re$orting?
A) *ignificant accounting estimates involving subjective judgments
!) xcessive $ressure for management to meet debt re$a%ment re9uirements
") 6anagement;s $ractice of ma,ing overl% aggressive forecasts
&) Cigh turnover of accounting# internal audit# and information technolog% staff
Answer' !
(erms' Factor that relates to incentives or $ressures to commit fraudulent financial re$orting
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

=) Which of the following is a factor that relates to attitudes or rationaliation to commit


fraudulent financial re$orting?
A) *ignificant accounting estimates involving subjective judgments
!) xcessive $ressure for management to meet debt re$a%ment re9uirements
") 6anagement;s $ractice of ma,ing overl% aggressive forecasts to third $arties
&) Cigh turnover of accounting# internal audit a nd information technolog% staff
Answer' "
(erms' Factor that relates to attitudes or rationaliation to commit fraudulent financial re$orting
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

=
"o$%right  213 4earson ducation# /nc
13) List and briefl% describe the three conditions for fraud
Answer'
D /ncentivesB$ressures E 6anagement or other em$lo%ees have incentives or $ressures to
commit fraud
D O$$ortunities E "ircumstances $rovide o$$ortunities for management or em$lo%ees to
commit fraud
D AttitudesB+ationaliation E An attitude# character# or set of ethical values exists that allows
management or em$lo%ees to intentionall% commit a dishonest act# or the% are in an environment
that im$oses sufficient $ressure that causes them to rationalie committing a dishonest act
(erms' "onditions for fraud
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

1:) List and briefl% describe exam$les of ris, factors for each condition of fraud for fraudulent
financial re$orting
Answer' Incentives/Pressures' 1 Financial stabilit% or $rofitabilit% is threatened b% economic#
industr%# or entit% o$erating conditions  xcessive $ressure for management to meet debt
re$a%ment or other debt covenant re9uirements 5 6anagement or the board of directors;
$ersonal net worth is materiall% threatened b% the entit%;s financial $erformance

Opportunities ' 1 *ignificant accounting estimates involve subjective judgments o r uncertainties


that are difficult to verif%  /neffective board of d irector or audit committee oversight over
financial re$orting 5 Cigh turnover or ineffective accounting# internal audit# or information
technolog% staff 3 Wea, internal controls : *ignificant related $art% transactions

Attitudes/Rationalization' 1 /na$$ro$riate or ineffective su$$ort of the entit%;s ethics and values


 nown histor% of violations of laws and regulations 5 6anagement;s $ractice of ma,ing
overl% aggressive or unrealistic forecasts to anal%sts# creditors# and other third $arties
(erms' +is, factors for conditions of fraud
&iff' "hallenging
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

1=) /ncentives and o$$ortunities are two conditions that are generall% $resent when financial
statement fraud occurs
A) (rue
!) False
Answer' A
(erms' "onditions $resent when material misstatements due to fraud occur
&iff' as%
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills


"o$%right  213 4earson ducation# /nc
1>) Fraud is more $revalent in large businesses than small businesses and no t-for-$rofit
organiations
A) (rue
!) False
Answer' !
(erms' Fraud $revalence in organiations
&iff' as%
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

1@) (he same three fraud triangle ris, conditions a$$l% to fraudulent financial re$orting and
misa$$ro$riation of assets
A) (rue
!) False
Answer' A
(erms' Fraud triangle ris, conditions
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

1) <An attitude# character# or set of ethical values exist that allow management or em$lo%ees to
commit a dishonest act G< describes the o$$ortunities condition included in the fraud triangle
A) (rue
!) False
Answer' !
(erms' O$$ortunities conditions included in fraud triangle
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

2) An ineffective board of director oversight over financial re$orting is an exam$le of an


incentivesB$ressures ris, factor
A) (rue
!) False
Answer' !
(erms' Fraud ris, factor describing incentivesB$ressures
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

12
"o$%right  213 4earson ducation# /nc
1) A common incentive for com$anies to mani$ulate financial statements is a decline in the
com$an%;s financial $ros$ects
A) (rue
!) False
Answer' A
(erms' Fraud ris, factor describing incentivesB$ressures
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

) (he $ressure to do <whatever it ta,es< to meet goals is one of the main reasons wh% financial
statement fraud occurs
A) (rue
!) False
Answer' A
(erms' +is, factors related to incentives# o$$ortunities# and attitudes
&iff' 6oderate
Objective' LO 11-
AA"*!' +eflective thin,ing s,ills

Learning Objective 11-5

1) Auditor;s need to exhibit $rofessional s,e$ticism when auditing a client (his auditing
standard is best ex$ressed b% which of the following?
A) (he auditor neither assumes dishonest% or honest% of management
!) (he auditor assumes dishonest% of management
") (he auditor assumes honest% of management
&) (he auditor assumes management lac,s integrit%
Answer' A
(erms' 4rofessional s,e$ticism when auditing a client
&iff' 6oderate
Objective' LO 11-5
AA"*!' +eflective thin,ing s,ills

11
"o$%right  213 4earson ducation# /nc
) Which of the following matters related to the auditor;s consideration of material misstatements
due to fraud are re9uired to be documented?
A) +easons su$$orting a conclusion that there is no t a significant ris, of material im$ro$er
ex$ense recognition
!) 4rocedures $erformed to obtain information necessar% to identif% and assess the ris,s of
material fraud
") +esults of the internal auditor;s $rocedures $erformed to address the ris, of management
override of controls
&) &iscussions with management regarding the hiring of a new $lant manager
Answer' !
(erms' Auditing standards re9uiring auditors to document matters related to auditor
consideration of material misstatements due to fraud
&iff' 6oderate
Objective' LO 11-5
AA"*!' +eflective thin,ing s,ills

5) As $art of the brainstorming sessions# auditors are directed to em$hasie'


A)
Cow management could $er$etrate
and conceal fraudulent financial (he audit team;s res$onse to
re$orting $otential fraud ris,s
7es 7es

!)
Cow management could $er$etrate
and conceal fraudulent financial (he audit team;s res$onse to
re$orting $otential fraud ris,s
8o 8o

")
Cow management could $er$etrate
and conceal fraudulent financial (he audit team;s res$onse to
re$orting $otential fraud ris,s
7es 8o

&)
Cow management could $er$etrate
and conceal fraudulent financial (he audit team;s res$onse to
re$orting $otential fraud ris,s
8o 7es

Answer' A
(erms' Auditors directed to em$hasie in brainstorming sessions
&iff' 6oderate
Objective' LO 11-5
AA"*!' +eflective thin,ing s,ills

1
"o$%right  213 4earson ducation# /nc
:) An auditor uses ........ in9uir% to corroborate or contradict $rior information
A) assessment
!) declarative
") interrogative
&) informational
Answer' A
(erms' /n9uir% used to ascertain whether information alread% obtained is correct
&iff' "hallenging
Objective' LO 11->
AA"*!' +eflective thin,ing s,ills

=) When the auditor sus$ects that fraud ma% be $resent# auditing standards re9uire the auditor to'
A) terminate the engagement with sufficient notice given to the client
!) issue an adverse o$inion or a disclaimer of o$inion
") obtain additional evidence to determine whether material fraud has occurred
&) re-issue the engagement letter
Answer' "
(erms' +e9uirements of auditor when fraud is sus$ected
&iff' "hallenging
Objective' LO 11->
AA"*!' +eflective thin,ing s,ills

>) With whom should the auditor communicate whenever he or she determines that senior
management fraud ma% be $resent# even if the matter might be considered inconse9uential?
A) 4"AO!
!) Audit committee
") An a$$ro$riate level of management that is at least one level ab ove those involved
&) (he internal auditors
Answer' !
(erms' Auditor communicate with whom when senior management fraud ma% be $resent
&iff' "hallenging
Objective' LO 11->
AA"*!' +eflective thin,ing s,ills

@) What t%$es of in9uir% techni9ues might an auditor use when ma,ing in9uiries of client
$ersonnel? What are the uses of each techni9ue?
Answer' (here are three main t%$es of in9uir% available for use b% auditors (hese are
information in9uir%# assessment in9uir%# and interrogative in9uir% /nformation in9uir% is used to
obtain information about facts and details that the auditor does not have Assessment in9uir% is
used to corroborate or contradict $rior information /nterrogative in9uir% is often used wh en the
auditor see,s res$onses from an individual about his or h er ,nowledge of an event or
circumstances
(erms' /n9uir% techni9ues
&iff' "hallenging
Objective' LO 11->
AA"*!' +eflective thin,ing s,ills

>
"o$%right  213 4earson ducation# /nc
) 4"AO! *tandard : states that fraud of an% magnitude b% senior management is at least a
significant deficienc% in internal controls
A) (rue
!) False
Answer' A
(erms' *enior management fraud
&iff' 6oderate
Objective' LO 11->
AA"*!' +eflective thin,ing s,ills
(o$ic' 4ublic

12) 6ost frauds are discovered via a ti$


A) (rue
!) False
Answer' A
(erms' Fraud
&iff' as%
Objective' LO 11->
AA"*!' +eflective thin,ing s,ills
(o$ic' 4ublic

11) /nterrogative in9uir% is often confrontational


A) (rue
!) False
Answer' A
(erms' /n9uir% techni9ues
&iff' 6oderate
Objective' LO 11->
AA"*!' +eflective thin,ing s,ills
(o$ic' 4ublic

1) Auditors ma% ex$and other substantive $rocedures to address the heightened ris,s of fraud
A) (rue
!) False
Answer' A
(erms' Fraud ris, areas
&iff' 6oderate
Objective' LO 11->
AA"*!' +eflective thin,ing s,ills
(o$ic' 4ublic

@
"o$%right  213 4earson ducation# /nc
lOMoARcPSD|7737011

Chapter 10 final - Auditing and assurance test bank Ch 10

Auditing and assurance services (‫)ةروصنملا ةعماج‬

StuDocu is not sponsored or endorsed by any college or university


Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)
lOMoARcPSD|7737011

Chapter 10
Multiple-Choice Questions

1. Which of the following is responsible for establishing a private company’s internal control?
easy a. Management.
a b. Auditors.
c. Management and auditors.
d. Committee of Sponsoring Organizations.

2. Which of the following is not one of the three primary objectives of effective internal control?
easy a. Reliability of financial reporting
d b. Efficiency and effectiveness of operations
c. Compliance with laws and regulations
d. Assurance of elimination of business risk.

3. (Public) The Public Company Accounting Oversight Board states that reasonable assurance allows a:
easy a. small likelihood of ineffective internal controls.
b b. remote likelihood that material misstatements will not be prevented or detected by
internal control.
c. likelihood that material misstatements will not be prevented or detected by internal
control.
d. high likelihood that material misstatements will not be prevented or detected by
internal control.

4. Two key concepts that underlie management’s design and implementation of internal control
easy are:
c a. costs and materiality.
b. absolute assurance and costs.
c. inherent limitations and reasonable assurance.
d. collusion and materiality.

5. Internal controls can never be considered as absolutely effective because:


easy a. their effectiveness is limited by the competency and dependability of employees.
a b. not all organizations have internal audit departments.
c. controls are designed to prevent and detect only material misstatements.
d. internal controls prevent separation of duties.

6. A major control available in a small company, which might not be feasible in a big company, is:
easy a. a wider segregation of duties.
d b. a voucher system.
c. fewer transactions to process.
d. the owner-manager’s personal interest and close relationship with personnel.

7. (Public) Which of the following is responsible for establishing internal controls for a public company?
easy a. Management.
a b. The PCAOB.
c. Management and auditors.
d. Committee of Sponsoring Organizations.

8. Which of the following parties provides an assessment of the effectiveness of internal control
medium over financial reporting for public companies?
a

Management Financial statement auditors

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

a. Yes Yes
b. No No
c. Yes Yes
d. No No

9. An act of two or more employees to steal assets or misstate records is frequently referred to as:
easy a. collusion.
a b. a material weakness.
c. a control deficiency.
d. a significant deficiency.

10. When the auditor attempts to understand the operation of the accounting system by tracing a
easy few transactions through the accounting system, the auditor is said to be:
c a. tracing.
b. vouching.
c. performing a walk-through.
d. testing controls.

11. (SOX) Which section of the Sarbanes-Oxley Act requires management to issue an internal control
easy report?
c a. 202
b. 203
c. 404
d. 408

12. (SOX) Sarbanes-Oxley requires management to issue an internal control report that includes two
easy specific items. Which of the following is one of these two requirements?
a a. A statement that management is responsible for establishing and maintaining an adequate
internal control structure and procedures for financial reporting.
b. A statement that management and the board of directors are jointly responsible for
establishing and maintaining an adequate internal control structure and procedures for
financial reporting.
c. A statement that management, the board of directors, and the external auditors are jointly
responsible for establishing and maintaining an adequate internal control structure and
procedures for financial reporting.
d. A statement that the external auditors are solely responsible.

13. (SOX) When management is evaluating the design of internal control, management evaluates whether
easy the control can do which of the following?
c
Detect material misstatements Correct material misstatements
a. Yes Yes
b. No No
c. Yes No
d. No Yes

14. (SOX) Internal control reports issued by public companies must identify the framework used to
easy evaluate the effectiveness of internal control. Which of the following is the most common
b framework in the U.S.?
a. Effective Internal Control Framework - AICPA
b. Internal Control - Integrated Framework - COSO
c. Enterprise Internal Control - COSO
d. Enterprise Internal Control - AICPA

15. (Public) When one material weakness is present at the end of the year, management of a public company
easy must conclude that internal control over financial reporting is:
c a. insufficient.

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

b. inadequate.
c. ineffective.
d. inefficient.

16. (Public) The auditor’s tests to understand the client’s internal controls might include which of the
easy following types of procedures?
a
Observation of employees Inquiries of personnel
a. Yes Yes
b. No No
c. Yes No
d. No Yes

17. Which of management’s concerns with respect to implementing internal controls is the auditor
easy primarily concerned?
b a. Efficiency of operations.
b. Reliability of financial reporting.
c. Effectiveness of operations.
d. Compliance with applicable laws and regulations.

18. Which of the following activities would be least likely to strengthen a company’s internal
easy control?
b a. Separating accounting from other financial operations.
b. Maintaining insurance for fire and theft.
c. Fixing responsibility for the performance of employee duties.
d. Carefully selecting and training employees.

19. (Public) Management must disclose material weaknesses in internal control:


medium a. whenever the weakness is deemed significant to a single class of transactions.
c b. whenever the weakness is significant to overall financial reporting objectives.
c. if the weakness exists at the end of the year.
d. only if the auditor identifies the weakness as significant.

20. When auditing a private company, the auditor should obtain an understanding of internal control
easy sufficient to:
b a. provide reasonable protection against client fraud and defalcations by client employees.
b. assess control risk.
c. provide a basis for suggestions to the client for improving the accounting system.
d. provide a method for safeguarding assets, checking the accuracy and reliability of
accounting data, promoting operational efficiency, and encouraging adherence to
prescribed managerial policies.

21. (Public) The initial presumption in the audit of a public company is that control risk is:
medium a. low.
a b. moderate.
c. high.
d. low or moderate, but not high.

22. In the audit of a private company, the auditor will test controls when control risk is initially
assessed at:
medium
c Low Moderate High
a. Yes No Yes
b. No No Yes
c. Yes Yes No
d. No Yes No

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

23. (Public) The auditor’s study of a public company’s internal control is:
medium a. required by GAAS.
c b. required by the AICPA.
c. required by the Sarbanes-Oxley Act.
d. recommended by the AICPA.

24. The auditor’s consideration of a private company’s internal control is:


medium a. required by GAAP.
b b. required by GAAS.
c. required by the IRS.
d. recommended by the SEC.

25. Internal controls can never be regarded as completely effective. Even if company personnel
medium could design an ideal system, its effectiveness depends on the:
d a. adequacy of the computer system.
b. proper implementation by management.
c. ability of the internal audit staff to maintain it.
d. competency and dependability of the people using it.

26. Even with the most effectively designed internal control, the auditor must obtain audit evidence,
medium beyond testing the controls, for every:
c a. transaction.
b. financial statement account.
c. material financial statement account.
d. financial statement account that will be relied upon by third parties.

27. The essence of an effectively controlled organization lies in the:


medium a. effectiveness of its independent auditor.
d b. effectiveness of its internal auditor.
c. attitude of its employees.
d. attitude of its management.

28. (Public) To issue a report on internal control over financial reporting for a public company, an auditor
medium must:
c a. evaluate management’s assessment process.
b. independently assess the design and operating effectiveness of internal control.
c. evaluate management’s assessment process and independently assess the design and
operating effectiveness of internal control.
d. test controls over significant account balances.

29. (Public) Which of the stock exchanges require listed companies to have an audit committee composed
medium entirely of independent directors?
a
NYSE NASDAQ
a. Yes Yes
b. No No
c. Yes No
d. No Yes

30. Which of the following factors may increase risks to an organization?


Medium
a Geographic dispersion of
company operations Presence of new information technologies
a. Yes Yes
b. No No
c. Yes No

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

d. No Yes

31. Which of the following statements is correct with respect to separation of duties?
medium a. Employees should not have temporary and permanent custody of assets.
b b. Employees who authorize transactions should not have custody of related assets.
c. It is permissible to allow an employee to open cash receipts and record those receipts.
d. Employees who authorize transactions should have recording responsibility for these
transactions.

32. Authorizations can be either general or specific. Which of the following is not an example of a
medium general authorization?
b a. Automatic reorder points for raw materials inventory.
b. A sales manager’s authorization for a sales return.
c. Credit limits for various classes of customers.
d. A sales price list for merchandise.

33. The most important type of protective measure for safeguarding assets is:
medium a. adequate separation of duties among personnel.
c b. proper authorization of transactions.
c. the use of physical precautions.
d. adequate documentation.

34. Which of the following is correct with respect to the design and use of business documents?
medium a. Not all documents used for internal purposes need to be prenumbered.
a b. Documents should be designed for single purposes only to avoid confusion in their use.
c. Documents should be designed to be understandable only by those who use them.
d. Documents designed for external use must be prenumbered.

35. (Public) PCAOB Standard 2 requires auditors to evaluate the effectiveness of the audit committee’s
medium oversight of the company’s:
a
External financial Efficiency of Internal control over financial
reporting operations reporting
a. Yes No Yes
b. No No Yes
c. Yes Yes No
d. No Yes No

36. Which of the following is correct?


medium a. Approval is a policy decision implemented by employees.
c b. Approval occurs as a matter of general policy and includes significant transactions only.
c. Authorization is a policy decision for either a general class of transactions or specific
transactions.
d. Approval should be given by the employee responsible for recording the transaction.

37. Which of the following principles is not necessary for the proper design and use of documents
medium and records?
a a. Designed for a single use to increase efficiency of operations.
b. Constructed in a manner that encourages correct preparation.
c. Prepared at the time a transaction takes place.
d. Designed for multiple uses to increase efficiency of operations.

38. Narratives, flowcharts, and internal control questionnaires are three common methods of:
medium a. testing the internal controls.
b b. documenting the auditor’s understanding of internal controls.
c. designing the audit manual and procedures.
d. documenting the auditor’s understanding of a client’s organizational structure.

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

39. _____ deal with ongoing or periodic assessment of the quality of internal control by
medium management.
b a. Quality monitoring activities
b. Monitoring activities
c. Oversight activities
d. Management activities

40. (Public) Smaller public companies face challenges implementing effective internal control due to
medium ______.
c a. a lack of expertise
b. reduced importance
c. limited resources
d. limited available guidance

41. Which of the following is not one of the levels of an absence of internal controls?
medium a. Major deficiency.
a b. Material weakness.
c. Significant deficiency.
d. Control deficiency.

42. Which of the following is the correct definition of “control deficiency?”


medium a. A control deficiency exists if the design or operation of controls does not permit company
a personnel to prevent or detect misstatements on a timely basis.
b. A control deficiency exists if one or more deficiencies exist that adversely affect a
company’s ability to prepare external financial statements reliably.
c. A control deficiency exists if the design or operation of controls results in a more than
remote likelihood that controls will not prevent or detect misstatements.
d. A control deficiency exists if the design or operation of controls results in a more than
probable likelihood that controls will prevent or detect misstatements.

43. A(n) _______ deficiency exists if a necessary control is missing or not properly formulated.
medium a. control
c b. significant
c. design
d. operating

44. To determine if significant internal control deficiencies are material weaknesses, they must be
medium evaluated on their:
a
Likelihood Significance
a. Yes Yes
b. No No
c. Yes No
d. No Yes

45. The purpose of an entity’s accounting information and communication system is to ______.
medium
d Record and
Monitor process
transactions transactions Initiate transactions
a. Yes Yes Yes
b. No No No
c. Yes No No
d. No Yes Yes

46. A procedure that would most likely be used by an auditor in performing tests of control

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

medium procedures that involve segregation of functions and that leave no transaction trail is:
b a. inspection.
b. observation.
c. reperformance.
d. reconciliation.

47. If the results of tests of controls support the design and operations of controls as expected, the
medium auditor uses ____ control risk as the preliminary assessment.
b a. a lower
b. the same
c. a higher
d. either a lower or higher

48. Internal controls normally include procedures designed to provide reasonable assurance that:
medium a. employees act with integrity when performing their assigned tasks.
b b. transactions are executed in accordance with management’s authorization.
c. decision processes leading to management’s authorization of transactions are sound.
d. collusive activities would be detected by segregation of employee duties.

49. Which of the following is correct?


medium a. A significant deficiency is always a material weakness.
d b. A control deficiency is always a material weakness.
c. A material weakness is less significant that a control deficiency.
d. A material weakness is always a significant deficiency.

50. Which of the following is not a likely procedure to support the operating effectiveness of internal
medium controls?
d a. Inquiry of client personnel.
b. Observation of control-related activities.
c. Reperformance of client procedures.
d. Completing an internal control questionnaire.

51. (Public) Before making the final assessment of internal control at the end of an integrated audit, the
medium auditor must:
a
Test controls Perform substantive tests of details
a. Yes Yes
b. No No
c. Yes No
d. No Yes

52. (Public) Significant deficiencies and material weaknesses in internal control of a public company must
medium be reported to which of the following?
c a. The Public Company Accounting Oversight Board.
b. Members of management who are responsible for the related area of the company.
c. Audit committee of the company’s board of directors.
d. The AICPA.

53. Of the following statements about internal controls, which one is not valid?
medium a. No one person should be responsible for the custodial responsibility and the recording
d responsibility for an asset.
b. Transactions must be properly authorized before such transactions are processed.
c. Because of the cost-benefit relationship, a client may apply controls on a test basis.
d. Control procedures reasonably ensure that collusion among employees cannot occur.

54. Which of the following best describes the inherent limitations that should be recognized by an
medium auditor when considering the potential effectiveness of internal control?

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

a a. Procedures that depend on segregation of duties can be circumvented by collusion.


b. Competent and honest client personnel provide an environment conducive to accounting
control and provide absolute assurance that effective control will be achieved.
c. Procedures designed to assure the execution and recording of transactions in accordance
with proper authorizations are effective against irregularities perpetrated by management.
d. The benefits expected to be derived from effective internal accounting control usually do
not exceed the costs of such control.

55. Which of the following is not one of the subcomponents of the control environment?
medium a. Management’s philosophy and operating style.
c b. Organizational structure.
c. Adequate separation of duties.
d. Commitment to competence.

56. It is important for the CPA to consider the competence of the clients’ personnel because their
medium competence bears directly and importantly upon the:
b a. cost/benefit relationship of the system of internal control.
b. achievement of the objectives of internal control.
c. comparison of recorded accountability with assets.
d. timing of the tests to be performed.

57. Audit evidence concerning proper segregation of duties normally is best obtained by:
medium a. direct personal observation of the employee who applies control procedures.
a b. making inquiries of co-workers about the employee who applies control procedures.
c. preparation of a flowchart of duties performed and available personnel.
d. inspection of third-party documents containing the initials of who applied control
procedures.

58. Proper segregation of functional responsibilities calls for separation of:


medium a. authorization, execution, and payment.
b b. authorization, recording, and custody.
c. custody, execution, and reporting.
d. authorization, payment, and recording.

59. Internal controls are not designed to provide reasonable assurance that:
medium a. all frauds will be eliminated.
a b. transactions are executed in accordance with management’s authorization.
c. access to assets is permitted only in accordance with management’s authorization.
d. company personnel comply with applicable rules and regulations.

60. Which of the following statements about auditor documentation of the client’s internal controls
medium is correct?
d a. Documentation must include flow charts.
b. Documentation must include procedural write-ups.
c. No documentation is necessary although it is desirable.
d. No one particular form of documentation is necessary.

61. Significant deficiencies are matters that come to an auditor’s attention and should be
medium communicated to an entity’s audit committee because they represent:
b a. material frauds perpetrated by high-level management.
b. internal control deficiencies that could adversely affect a company’s ability to initiate,
record, process, or report external financial statements reliably.
c. flagrant violations of the entity’s documented conflict-of-interest policies.
d. intentional attempts by client personnel to limit the scope of the auditor’s field work.

62. How must significant deficiencies and material weaknesses be communicated to those charged
medium with governance?

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

c a. Either oral or written communication is acceptable.


b. Oral communication is required.
c. Written communication is required.
d. Written communication is required for material weaknesses, but oral communication is
allowed for significant deficiencies.

63. Which of the following statements, if any, is correct?


challenging a. The NASDAQ market requires listed companies to have audit committees that have only
a independent directors.
b. The NASDAQ market requires listed companies to have audit committees that have a
minority of the positions held by independent directors.
c. The NASDAQ market recommends, but does not require, listed companies to have audit
committees.
d. The NASDAQ market recommends, but does not require, listed companies to have audit
committees that have a minority of the positions held by independent directors.

64. (SOX) The Sarbanes-Oxley Act requires:


challenging a. all public companies to issue reports on internal controls.
a b. all public companies to define adequate internal controls.
c. the auditor of public companies to design effective ICFR.
d. the auditor of public companies to provide recommendations to correct material
weaknesses.

65. When considering internal control, an auditor should be aware of the concept of reasonable
challenging assurance, which recognizes that the:
d a. segregation of incompatible functions is necessary to ascertain that internal control is
effective.
b. employment of competent personnel provides assurance that the objectives of internal
control will be achieved.
c. establishment and maintenance of internal control is an important responsibility of the
management and not of the auditor.
d. costs of internal control should not exceed the benefits expected to be derived from
internal control.

66. The financial statements are not likely to correctly reflect GAAP if the:
challenging a. controls affecting the reliability of financial reporting are inadequate.
a b. company’s controls do not promote efficiency.
c. company’s controls do not promote effectiveness.
d. company’s control do not promote compliance with applicable rules and regulations.

67. The primary emphasis by auditors is on controls over:


challenging a. classes of transactions.
a b. account balances.
c. both a and b, because they are equally important.
d. both a and b, because they vary from client to client.

68. Compared to a public company, the most important difference in a nonpublic company in
challenging assessing control risk is the ability to assess control risk at _______ for any or all control-related
objectives.
d a. low
b. moderately low
c. medium
d. high

69. An auditor should consider two key issues when obtaining an understanding of a client’s
challenging internal controls. These issues are:
c a. the effectiveness and efficiency of the controls.

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

b. the frequency and effectiveness of the controls.


c. the design and utilization of the controls.
d. The implementation and efficiency of the controls.

70. The independent auditor should acquire an understanding of the internal audit function as it
challenging relates to the independent auditor’s study and evaluation of internal control because the:
c a. audit programs, working papers, and reports of internal auditors can often be used as a
substitute for the work of the independent auditor’s staff.
b. procedures performed by the internal audit staff may eliminate the independent auditor’s
need for an extensive study and evaluation of internal control.
c. work performed by internal auditors may be a factor in determining the nature, timing, and
extent of the independent auditor’s procedures.
d. understanding of the internal audit function is an important substantive test to be
performed by the independent auditor.

71. To be effective, an internal audit department must be independent of:


challenging a. operating departments.
c b. the accounting department.
c. both a and b.
d. either a or b, but not both.

72. Hanlon Corp. maintains a large internal audit staff that reports directly to the chief financial
challenging officer. Audit reports prepared by the internal auditors indicate that the system is functioning as
d it should and that the accounting records are reliable. An independent auditor will probably:
a. eliminate tests of controls.
b. increase the depth of the study and evaluation of administrative controls.
c. avoid duplicating the work performed by the internal audit staff.
d. place limited reliance on the work performed by the internal audit staff.

73. External financial statement auditors must obtain evidence regarding what attributes of an
challenging internal audit (IA) department if the external auditors intend to rely on IA’s work?
d a. Integrity
b. Objectivity
c. Competence
d. All of the above

74. When planning an audit, the auditor’s assessed level of control risk is:
challenging a. determined by using actuarial tables.
c b. calculated by using the audit risk model.
c. an economic issue, trading off the costs of testing controls against the cost of testing
balances.
d. calculated by using the formulas provided in the AICPA’s auditing standards.

75. When a compensating control exists, the absence of a key control:


challenging a. is no longer a concern because there is no longer a significant deficiency or material
a weakness.
b. is still a major concern to the auditor.
c. could cause a material loss, so it must be tested using substantive procedures.
d. is magnified and must be removed from the sampling process and examined in its entirety.

76. After considering a client’s internal controls, an auditor has concluded that it is well designed
challenging and is functioning as intended. Under these circumstances the auditor would most likely:
c a. perform tests of controls to the extent outlined in the audit program.
b. determine the control procedures that should prevent or detect errors and irregularities.
c. not increase the extent of predetermined substantive tests.
d. determine whether transactions are recorded to permit preparation of financial statements
in conformity with generally accepted accounting principles.

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

77. To obtain an understanding of an entity’s control environment, an auditor should concentrate on


challenging the substance of management’s policies and procedures rather than their form because:
a
a. management may establish appropriate policies and procedures but not act on them.
b. the board of directors may not be aware of management’s attitude toward the control
environment.
c. the auditor may believe that the policies and procedures are inappropriate for that
particular entity.
d. the policies and procedures may be so weak that no reliance is contemplated by the
auditor.

Essay Questions

78. Describe each of the three broad objectives management typically has for internal control. With
medium which of these objectives is the auditor primarily concerned?

Answer:
The three objectives are:
• Reliability of financial reporting. Management has both a legal and professional
responsibility to be sure that the information is fairly presented in according with
reporting requirements such as GAAP.
• Efficiency and effectiveness of operations. Controls within an organization are meant
to encourage efficient and effective use of its resources to optimize the company’s
goals.
• Compliance with laws and regulations. Public and non-public organizations are
required to follow many laws and regulations. Some relate to accounting only
indirectly, such as environmental protection and civil rights laws. Others are closely
related to accounting, such as income tax regulations and fraud.

The auditor is primarily concerned with the objective of reliable financial reporting.

79. Briefly describe the responsibilities of management and external auditors for internal controls.
medium
Answer:

Management is responsible for establishing and maintaining the entity’s internal controls.
For public companies, management is also required by Section 404 to publicly report on
the operating effectiveness of those controls. In contrast, the auditor’s responsibilities
include understanding and testing internal control over financial reporting. For public
company clients, the auditor is also required by Section 404 to issue an audit report on
management’s assessment of its internal controls, including the auditor’s opinion on the
operating effectiveness of those controls.

80. (Public) There are four steps in the auditor’s process of understanding internal control and assessing
medium control risk for a public company. Step one is obtain and document an understanding of
internal control: design and operation. What are the remaining three steps?

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

Answer:
The remaining three steps are:
• Assess control risk.
• Design, perform, and evaluate tests of controls.
• Decide planned detection risk and substantive tests.

81. Certain principles dictate the proper design and use of documents and records. Briefly describe
medium several of these principles.

Answer:
• Documents should be prenumbered consecutively to facilitate control over missing
documents and as an aid in locating documents when they are needed at a later date.
• Documents and records should be prepared at the time a transaction takes place, or as
soon as possible thereafter, to minimize timing errors.
• Documents and records should be designed for multiple uses, when possible, to
minimize the number of different forms. For example, a properly designed and used
shipping document can be the basis for releasing goods from storage to the shipping
department, informing billing of the quantity of goods to bill to the customer and the
appropriate billing date, and updating the perpetual inventory records.
• Documents and records constructed in a manner that encourages correct preparation.
This can be done by providing internal checks within the form or record. For example,
a document might include instructions for proper routing, blank spaces for
authorizations and approvals, and designated column spaces for numerical data.

82. Management’s identification and analysis of risk is an ongoing process and is a critical
medium component of effective internal control. An important first step is for management to identify
factors that may increase risk. Identify at least five factors, observable by management, which
may lead to increased risk in a typical business organization.

Answer:
There are many factors that may lead to increased risk in an organization. Some examples
include:
• failure to meet prior objectives,
• decreasing quality of personnel,
• increasing geographic dispersion of company operations,
• increasing significance and complexity of core business processes,
• introduction of new information technologies, and
• entrance of new competitors.

83. During a financial statement audit of a private company, three steps must be completed by the
medium auditor before concluding that control risk is low. What are these steps?

Answer:
The three steps that must be completed by the auditor before concluding that control risk is
low are:
1. obtaining an understanding of the control environment, risk assessment procedures,
accounting information and communication system, and monitoring methods at a
fairly detailed level;
2. identify specific controls that will reduce control risk and make an assessment of
control risk; and
3. test the effectiveness of controls.

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

84. What are the two primary factors that auditors consider in determining if an entity is auditable?
medium
Answer:
The two primary factors are the integrity of management and the adequacy of accounting
records.

85. Define the following terms: control deficiency, significant deficiency, and material weakness.
medium
Answer:
• A control deficiency exists if the design or operation of controls does not permit
company personnel to prevent or detect misstatements on a timely basis.
• A significant deficiency exists if one or more control deficiencies exist that results in
more than a remote likelihood that a misstatement that is more than inconsequential
will not be prevented or detected.
• A material weakness exists if a significant deficiency, by itself, or in combination with
other significant deficiencies, results in a more than remote likelihood that internal
control will not prevent or detect material financial statement misstatements.

86. Describe three inherent limitations of internal control.


medium
Answer:
The effectiveness of internal controls depends on the competency and dependability of the
people using it. Inherent limitations of internal control include:
• employee carelessness,
• lack of understanding,
• management override, and
• collusion.

87. The internal control framework developed by COSO includes five so-called “components” of
medium internal control. Discuss each of these five components.

Answer:
Five components of internal control are:
• The control environment. The control environment consists of the actions, policies,
and procedures that reflect the overall attitudes of top management about control and
its importance to the company.
• Risk assessment. This is management’s identification and analysis of risks relevant to
the preparation of financial statements in accordance with GAAP.
• Information and communication. This is the set of manual and/or computerized
procedures that identifies, assembles, classifies, analyzes, records, and reports a
company’s transactions and maintains accountability for the related assets.
• Control activities. These are the policies and procedures that help ensure necessary
actions are taken to address risks in the achievement of the company’s objectives.
• Monitoring. This is management’s ongoing and periodic assessment of the quality of
internal control performance to determine that controls are operating as intended and
modified when needed.

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

88. Discuss what is meant by the term “control environment” and identify four control environment
medium subcomponents that the auditor should consider.
Answer:
The control environment consists of the actions, policies, and procedures that reflect the
overall attitudes of top management, directors, and owners of an entity about control and
its importance to the entity. Subcomponents include integrity and ethical values,
commitment to competence, board of directors or audit committee participation,
management’s philosophy and operating style, organizational structure, assignment of
authority and responsibility and human resource policies and practices.

89. Describe the auditor’s responsibilities related to communications regarding internal control
challenging matters.

Answer:
The auditor must communicate significant deficiencies and material weaknesses in writing
to those charged with governance as soon as they become aware of their existence. The
communication is usually addressed to the audit committee and to management. Timely
communications may provide management an opportunity to address control deficiencies
before management’s report on internal control must be issued. In some instances,
deficiencies can be corrected sufficiently early such that both management and the auditor
can conclude that controls are operating effectively as of the balance sheet date.

90. The text suggested a five-step approach to identify deficiencies, significant deficiencies, and
challenging material weaknesses. Describe this approach.

Answer:
1. Identify existing controls. Because deficiencies and material weaknesses are the
absence of adequate controls, the auditor must first know which controls exist.
2. Identify the absence of key controls. Internal control questionnaires, flowcharts, and
walkthroughs are useful tools to identify where controls are lacking and the likelihood
of misstatement is therefore increased.
3. Consider the possibility of compensating controls. A compensating control is one
elsewhere in the system that offsets the absence of a key control. When a
compensating control exists, there is no longer a significant deficiency or material
weakness.
4. Decide whether there is a significant deficiency or material weakness. The
likelihood of misstatements and their materiality are used to evaluate if there are
significant deficiencies or material weaknesses.
5. Determine potential misstatements that could result. This step is intended to identify
specific misstatements that are likely to result because of the significant deficiency or
material weakness. The importance of a significant deficiency or material weakness is
directly related to the likelihood and materiality of potential misstatements.

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

91. Auditing standards related to the audits of private companies specify the extent to which
challenging auditors can rely on evidence about internal controls obtained in prior years. Briefly describe
this guidance.

Answer:
When auditors plan to use evidence about the operating effectiveness of internal control
obtained in prior audits, SAS 110 requires them to test their effectiveness at least every
third year. If auditors determine that a key control has been changed since it was last
tested, they should test it in the current year. When there are a number of controls tested in
prior audits that have not been changed, SAS 110 requires auditors to test some of those
controls each year to ensure there is a rotation of controls testing throughout the three-year
period.

92. Adequate separation of duties is an important control activity. Discuss the four general
challenging guidelines for separation of duties to prevent both intentional and unintentional misstatements
that are of significance to auditors.

Answer:
The general guidelines are:
• Custody of assets should be separated from accounting,
• Authorizing transactions should be separated from custody of related assets,
• Operational responsibility should be separated from record-keeping, and
• Duties within IT should be separated.

Other Objective Answer Format Questions

93. Match seven of the terms (a-i) with the definitions provided below (1-7):
medium a. Control environment
b. Control activities
c. Independent checks on performance
d. Internal control
e. Monitoring
f. Separation of duties
g. General authorization
h. Specific authorization
i. Risk assessment

e 1. Management’s ongoing and periodic assessment of the quality of internal


control performance to determine that controls are operating as intended and
modified when needed.

g 2. Company-wide policies for the approval of all transactions within stated


limits.

a 3. The actions, policies, and procedures that reflect the overall attitudes of top
management, directors, and owners of an entity about control and its
importance to the entity.

f 4. Segregation of the following activities in an organization: custody of assets,


accounting, authorization, and operational responsibility.

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

i 5. Management’s identification and analysis of risks relevant to the preparation


of financial statements in accordance with generally accepted accounting
principles.

b 6. Policies and procedures that help ensure necessary actions are taken to address
risks in the achievement of the entity’s objectives.

d 7. A process designed to provide reasonable assurance regarding the


achievement of management’s objectives in the following categories: (1)
reliability of financial reporting, (2) effectiveness and efficiency of operations,
and (3) compliance with applicable laws and regulations.

94. If, when obtaining an understanding of control activities of a relatively small client, the auditor
easy identified no control activities, the auditor would probably set a high assessment of control risk.
a a. True
b. False
95. If, when obtaining an understanding of control activities of a relatively small client, the auditor
easy identified no control activities, the auditor would probably determine the client were
a unauditable.
a. True
b. False

96. When internal controls are effective, then substantive audit tests are more reliable; thus, the
easy extent of substantive tests should be reduced.
b a. True
b. False

97. Auditors of private companies may rely on prior periods’ tests of controls for a period not to
easy exceed four years.
b a. True
b. False

98. In an audit of a non-public company, the less control risk there is, the smaller the amount of
easy planned substantive evidence that is required.
a a. True
b. False

99. As a client’s information system becomes more complex, it is likely that an auditor will
easy decrease reliance on controls and increase substantive tests to support a control risk assessment.
b a. True
b. False

100. When a company designs and implements internal controls, cost of the controls is not a valid
easy consideration.
b a. True
b. False

101. (Public) PCAOB Standard 2 requires auditors to perform walkthroughs to assist in understanding
easy internal control.
a a. True
b. False

102. Adequate documents and records is a subcomponent of the control environment.


easy a. True
b b. False

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

103. For proper internal control, there should be adequate separation of duties. However, the extent
easy of separation of duties considered “adequate” depends heavily on the size of the organization.
a a. True
b. False

104. In an audit of a non-public company, the auditor’s assessment of control risk and the extent of
medium tests of controls are inversely related.
a a. True
b. False

105. Smaller companies usually have more extensive internal controls than larger companies which
medium result in fewer frauds being committed at small companies.
b a. True
b. False

106. (Public) To issue an unqualified opinion on internal control over financial reporting, there must be no
medium identified material weaknesses and no restrictions on the scope of the audit.
a a. True
b. False

107. (SOX) The Sarbanes-Oxley Act of 2002 requires that public companies issue an internal control report.
medium a. True
a b. False

108. The most important component of internal control is risk assessment.


medium a. True
b b. False

109. The primary emphasis by auditors when evaluating and testing internal control is on controls
medium over classes of transactions rather than controls over account balances.
a a. True
b. False

110. When internal controls over a given financial statement account are assessed as highly effective,
medium the auditor need not obtain audit evidence for that account beyond testing the controls.
b a. True
b. False

111. The chart of accounts is a control and is closely related to the controls related to adequate
medium documents and records.
a a. True
b. False

112. Auditing standards prohibit reliance on the work of internal auditors due to the lack of
medium independence of the internal auditors.
b a. True
b. False

113. If an auditor wishes to rely on the work of internal auditors (IA), the auditor must obtain
medium satisfactory evidence related to the IA’s competence, integrity, and objectivity.
a a. True
b. False

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


lOMoARcPSD|7737011

114. Procedures used to obtain an understanding of internal control are normally performed on fewer
medium transactions than procedures used to test controls.
a a. True
b. False

115. For most uses, flowcharts are superior to narratives as a method of communicating the
medium characteristics of internal control.
a a. True
b. False

116. When documenting their understanding of a client’s internal controls, auditors are required to
medium use narratives.
b a. True
b. False

Arens/Elder/Beasley

Downloaded by Alika Mahayani (alika_mahayani@yahoo.co.id)


Auditing and Assurance Services, 15e (Arens)
Chapter 12 The Impact of Information Technology
Technology on the Audit Process

Learning Objective 12-1

1) The continued integration of IT in accounting systems can impact a company by:


A) increasing the costs of handing a arge amount of data!
") increasing the number of manua contros
co ntros needed!
#) giving management higher-$uaity information more $uic%y than a manua system& thus
heping management in their decision ma%ing process!
') decreasing the segregation of duties!
Ans(er: #
Terms: IT effects on organiation
organia tion
'iff: *asy
Objective: LO 12-1
AA#+": ,efective thin%ing
thin%ing s%is
s%is

2) hich of the foo(ing is not a benefit of using IT-based


IT-based contros.
A) Abiity
Abiity to process arge voumes of transactions
") Abiity
Abiity to repace manua contros (ith computer-based contros
#) ,eduction in misstatements due to consistent processing of transactions
') ,eduction in interna contro evauation in setting contro ris%
Ans(er: '
Terms: /ot a benefit
benefi t of using IT-based
IT-based contros
contro s
'iff: *asy
Objective: LO 12-1
AA#+": ,efective thin%ing
thin%ing s%is
s%is

0) 'iscuss ho( the integration of IT into accounting systems enhances interna contro!
Ans(er: *nhancements to interna contro resuting from the integration
integration of IT into
into accounting
systems incude:
 Computer controls replace manual controls!
controls! ,epacing manua procedures (ith programmed
contros that appy chec%s and baances to each processed transaction and that process
information consistenty can reduce human error that is i%ey to occur in traditiona manua
environments!
 Higher quality information is available!
available! IT systems typicay provide management (ith more
and higher $uaity information faster than most manua systems!
Terms: Integration of IT into accounting systems enhances interna
interna contro
'iff: oderate
Objective: LO 12-1
AA#+": ,efective thin%ing
thin%ing s%is
s%is

1
3) #ontro ris% may be reduced for a company (ith a compe4 IT system (hen compared to a
company that reies primariy on manua contros!
A) True
") 5ase
Ans(er: A
Terms: #ontro ris% reduced
reduced for company (ith compe4 IT system
system
'iff: *asy
Objective: LO 12-1
AA#+": ,efective thin%ing
thin%ing s%is
s%is

Learning Objective 12-2

1) One of the uni$ue ris%s of protecting hard(are and data is:


A) ac% of traditiona authoriation!
") the decreased ris% of oss or destruction of data fies if data is stored in a centraied ocation!
#) the ease at (hich the IT system can be instaed and maintained!
') the unauthoried access to the IT system resuting in improper changes in soft(are programs
and master fies!
Ans(er: '
Terms: ,is%s specific to to IT environment
'iff: oderate
Objective: LO 12-2
AA#+": ,efective thin%ing
thin%ing s%is
s%is

2) 66666666 is not a ris% specific to the IT environments!


A) ,eiance on the functioning capabiities of hard(are and soft(are
") Increased human invovement
#) Loss of data due to insufficient bac%up
') 7nauthoried access
Ans(er: "
Terms: ,is%s specific to
to IT environment
'iff: *asy
Objective: LO 12-2
AA#+": ,efective thin%ing
thin%ing s%is
s%is

0) hich of the foo(ing is not a ris% in an IT system.


A) /eed for IT e4perienced staff
") +eparation of IT duties from accounting functions
#) Improved audit trai
') 8ard(are and data vunerabiity
Ans(er: #
Terms: ,is%s in an IT system
'iff: *asy
Objective: LO 12-2
AA#+": ,efective thin%ing
thin%ing s%is
s%is

2
3) isstatements in the financia statement may not be detected (ith the increased use of IT due
to:
I! the
the oss
oss of
of a visi
visib
bee audi
auditt trai
trai!
!
II! reduced
reduced huma
human n invov
invoveme
ement!nt!
A) I ony
") II ony
#) both I and II
') neither I or II
Ans(er: A
Terms: ,is%s in an IT system
'iff: *asy
Objective: LO 12-2
AA#+": ,efective thin%ing
thin%ing s%is
s%is

9) #omputers process information consistenty for a transactions! This creates a ris% that:
A) auditors (i not be abe to access data
da ta $uic%y!
$uic%y!
") auditors (i not be abe to determine if data is processed consistenty!
consistenty!
#) erroneous processing can resut in the accumuation of a great number of misstatements in a
short period of time!
') a of the above!
Ans(er: #
Terms: #haracteristics of IT
IT and ris%
'iff: oderate
Objective: LO 12-2
AA#+": ,efective thin%ing
thin%ing s%is
s%is

) hat are three specific ris%s to IT systems.


Ans(er: The three specific ris%s to IT systems
systems incude ris%s to hard(are and data& a reduced
audit trai& and the need for IT e4perience and separation of IT duties!
Terms: ,is%s in an IT system
'iff: *asy
Objective: LO 12-2
AA#+": ,efective thin%ing
thin%ing s%is
s%is

;) +ince IT systems can often initiate transactions automaticay&


automaticay& proper authoriation depends on
on
soft(are procedures and accurate master fies used to ma%e the authoriation decision!
A) True
") 5ase
Ans(er: A
Terms: ,is%s specific to
to IT environment
'iff: oderate
Objective: LO 12-2
AA#+": ,efective thin%ing
thin%ing s%is
s%is

0
<) One potentia disadvantage of IT systems is the reduction or e imination of source documents&
(hich reduces the visibiity of the audit trai!
A) True
") 5ase
Ans(er: A
Terms: 'isadvantage of IT systems
'iff: *asy
Objective: LO 12-2
AA#+": ,efective thin%ing s%is

Learning Objective 12-0

1) Od and ne( systems operating simutaneousy in a ocations is a test approach %no(n as:
A) piot testing!
") horionta testing!
#) integrative testing!
') parae testing!
Ans(er: '
Terms: Od and ne( systems operating simutaneousy
'iff: *asy
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

2) hich of the foo(ing is a component of genera contros.


A) =rocessing contros
") Output contros
#) "ac%-up and contingency panning
') Input contros
Ans(er: #
Terms: #omponent of genera contros
'iff: *asy
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

0) hich of the foo(ing statements reated to appication contros is correct.


A) Appication contros reate to various aspects of the IT function incuding soft(are ac$uisition
and the processing of transactions!
") Appication contros reate to various aspects of the IT function incuding physica security
and the processing of transactions in various cyces!
#) Appication contros reate to a aspects of the IT function!
') Appication contros reate to the processing of individua transactions!
Ans(er: '
Terms: Appication contros
'iff: *asy
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

3
3) >enera contros incude a of the foo(ing except:
A) systems deveopment!
") onine security!
#) processing contros!
') hard(are contros!
Ans(er: #
Terms: >enera contros
'iff: *asy
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

9) hich of the foo(ing describes the process of impementing a ne( system in one part of the
organiation& (hie other ocations continue to use the cu rrent system.
A) =arae testing
") Onine testing
#) =iot testing
') #ontro testing
Ans(er: #
Terms: =rocess impementing ne( system in one part of organiation
'iff: *asy
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

) A 66666666 is responsibe for controing the use of computer programs& transaction fies and
other computer records and documentation and reeases them to the operators ony (hen
authoried!
A) soft(are engineer
") chief computer operator
#) ibrarian
') data contro operator
Ans(er: #
Terms: +eparation of IT duties
'iff: *asy
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

;) +ecurity contros shoud re$uire that users enter a?n) 6666666 6 before being ao(ed access to
soft(are and other reated data fies!
A) echo chec%
") parity chec%
#) sef-diagnosis test
') authoried pass(ord
Ans(er: '
Terms: ,e$uired for access to IT programs or fies from terminas
'iff: *asy
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

9
<) Typica contros deveoped for manua systems (hich are sti important in IT systems
incude:
A) management@s authoriation of transactions!
") competent personne!
#) ade$uate preparation of input source documents!
') a of the above!
Ans(er: '
Terms: Typica contros deveoped for manua systems sti important in IT systems
'iff: oderate
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

) hich of the foo(ing contros prevent and detect e rrors (hie transaction data are
processed.
A) +oft(are
") Appication
#) =rocessing
') Transaction
Ans(er: #
Terms: #ontros that prevent and detect errors (hie transaction data are processed
'iff: oderate
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

1B) hen purchasing soft(are or deveoping in-house soft(are:


A) cost shoud be the ony factor!
") e4tensive testing of the soft(are is generay not re$uired!
#) a team of both IT and non-IT personne shoud be invoved in the dec ision process!
') the ibrarian and the IT manager shoud be the ony ones invoved in the decision process!
Ans(er: #
Terms: >enera contros
'iff: oderate
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

11) Output contros need to be designed for (hich of the foo(ing data integrity objectives.
A) 'etecting errors after the processing is competed
") =reventing errors before the processing is competed
#) 'etecting errors in the genera edger adjustment process
') =reventing errors in separation of duties for IT personne
Ans(er: A
Terms: Output contros need to be designed for
'iff: oderate
Objective: LO 12-0
AA#+": ,efective thin%ing s%is


12) A contro that reates to a parts of the IT system is caed a?n):
A) genera contro!
") systems contro!
#) universa contro!
') appications contro!
Ans(er: A
Terms: #ontro that reates to a parts of IT system
'iff: oderate
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

10) #ontros that are designed for each soft(are appication and are intended to hep a company
satisfy the
transaction-reated audit objectives are:
A) user contros!
") genera contros!
#) audit contros!
') appication contros!
Ans(er: '
Terms: #ontros (hich appy to a specific eement of the system&
'iff: oderate
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

13) hich of the foo(ing is not an e4ampe of an appications contro.


A) "ac%-up of data is made to a remote site for data security!
") There is a preprocessing authoriation of the saes transactions!
#) There are reasonabeness tests for the unit seing price of a sae!
') After processing& a saes transactions are revie(ed by the saes department!
Ans(er: A
Terms: Appication contros
'iff: oderate
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

19) hich of the foo(ing is not a genera contro.


A) #omputer performed vaidation tests of input accuracy!
") *$uipment faiure causes error messages on monitor!
#) There is a separation of duties bet(een programmer and operators!
') There are ade$uate program run instructions for operating the computer!
Ans(er: A
Terms: >enera contro
'iff: oderate
Objective: LO 12-0
AA#+": ,efective thin%ing s%is

;
Ans(er:
1! %
2! e
0! j
3! n
9! i
! a
;! 
<! h
Terms: Appication controsF >enera controsF =arae testingF =arae simuationF Input
'iff: oderate
Objective: LO 12-0 and LO 12-9
AA#+": ,efective thin%ing s%is

12) The embedded audit modue approach re$uires the auditor to insert an audit modue in the
cient@s appication system to to identify specific types of transactions!
A) True
") 5ase
Ans(er: A
Terms: *mbedded audit modue approach
'iff: oderate
Objective: LO 12-9
AA#+": ,efective thin%ing s%is

10) The objective of the computer audit techni$ue %no(n as the test data approach is to
determine (hether the cient@s computer programs can correcty process vaid and invaid
transactions!
A) True
") 5ase
Ans(er: A
Terms: Test data approach
'iff: oderate
Objective: LO 12-9
AA#+": ,efective thin%ing s%is

13) =arae simuation is used primariy to test interna contros over the cient@s IT systems&
(hereas the test data approach is used primariy for substantive testing!
A) True
") 5ase
Ans(er: "
Terms: =arae simuation
'iff: oderate
Objective: LO 12-9
AA#+": ,efective thin%ing s%is

2;
19) >eneraied audit soft(are is used to test automated contros!
A) True
") 5ase
Ans(er: A
Terms: >eneraied audit soft(are
'iff: oderate
Objective: LO 12-9
AA#+": ,efective thin%ing s%is

Learning Objective 12-

1) A database management system:


A) ao(s cients to create databases that incude information that can be shared across mutipe
appications!
") stores data on different fies for different purposes& but a(ays %no(s (here they are and ho(
to retrieve them!
#) ao(s $uic% retrieva of data& but at a cost of inefficient use of fie space!
') ao(s $uic% retrieva of data& but it needs to update fies continuay!
Ans(er: A
Terms: 'atabase management system
'iff: oderate
Objective: LO 12-
AA#+": ,efective thin%ing s%is

2) hen auditing a cient (ho uses a database management system& the auditor is principay
a(are of eevated ris% due to the fact that:
A) mutipe users can access and update data fies!
") the accounting information is ony in one pace!
#) the database administrator may ac% appropriate acco unting %no(edge!
') mutipe users coud a access the data simutaneousy causing a system shutdo(n!
Ans(er: A
Terms: 'atabase management systems and eevated ris%
'iff: oderate
Objective: LO 12-
AA#+": ,efective thin%ing s%is

0) >enera contros may incude fire(as (hich are used to protect from:
A) erroneous interna handing of data!
") insufficient documentation of transactions!
#) iogica programming commands!
') unauthoried e4terna users!
Ans(er: '
Terms: >enera contros use fire(as to protect
'iff: oderate
Objective: LO 12-
AA#+": ,efective thin%ing s%is

2<
3) hat toos do companies use to imit access to sensitive company data.
A)
*ncryption techni$ues 'igita signatures 5ire(a
Hes Hes Hes

")
*ncryption techni$ues 'igita signatures 5ire(a
Hes /o /o

#)
*ncryption techni$ues 'igita signatures 5ire(a
/o Hes Hes

')
*ncryption techni$ues 'igita signatures 5ire(a
Hes Hes /o

Ans(er: A
Terms: Toos companies use to imit access to sensitive data
'iff: oderate
Objective: LO 12-
AA#+": ,efective thin%ing s%is

9) ,ather than maintain an interna IT center& many companies outsource their basic IT functions
such as payro to an:
A) e4terna genera service provider!
") independent computer service center!
#) interna contro service provider!
') interna auditor!
Ans(er: "
Terms: Outsourced services
'iff: oderate
Objective: LO 12-
AA#+": ,efective thin%ing s%is

2
) hen the auditor is obtaining an understanding of the independent computer service center@s
interna contros the auditor shoud:
A) use the same criteria used to evauate the cient@s interna contros!
") use different criteria because the service center resides outside the company!
#) use the same criteria used to evauate the cient@s interna contros but omit tests of
transactions!
') use different criteria for the service center by incuding substantive tests of baances!
Ans(er: A
Terms: +ervice center@s interna contros
'iff: #haenging
Objective: LO 12-
AA#+": ,efective thin%ing s%is

;) any cients have outsourced their IT functions! The difficuty the independent au ditor faces
(hen a computer service center is used is to:
A) gain the permission of the service center to revie( their (or%!
") find compatibe programs that (i anaye the service ce nter@s programs!
#) determine the ade$uacy of the service center@s interna contros!
') try to abide by the Code of Professional Conduct to maintain the security and confidentiaity
of cient@s data!
Ans(er: #
Terms: Outsourced IT functions
'iff: #haenging
Objective: LO 12-
AA#+": ,efective thin%ing s%is

<) A service center:


A) must have an auditor hired by the =#AO" test the contros of the service cen ter!
") audit cannot be reied upon by those outside of the firm!
#) can engage a #=A firm to issue a report on their interna contros for use by a customers and
their independent auditors!
') must ma%e a of their systems avaiabe to any e4terna party!
Ans(er: #
Terms: +ervice auditors
'iff: #haenging
Objective: LO 12-
AA#+": ,efective thin%ing s%is

) hat do auditing standards re$uire (hen a compan y outsources some of their IT re$uirements
to an independent computer service center.
Ans(er: Auditing standards re$uire the auditor to consider the need to obtain an understanding
and test the service center@s contros if the provider@s appication invoves processing significant
financia data!
Terms: Outsources IT re$uirements to independent computer service center
'iff: #haenging
Objective: LO 12-
AA#+": ,efective thin%ing s%is

0B
1B) 5ire(as can protect company data and soft(are programs!
A) True
") 5ase
Ans(er: A
Terms: 5ire(as protect company data
'iff: *asy
Objective: LO 12-
AA#+": ,efective thin%ing s%is

11) LA/s in% e$uipment (ithin a singe or sma custer of buidings and are used (ithin a
company !
A) True
") 5ase
Ans(er: A
Terms: LA/s in% e$uipment
'iff: *asy
Objective: LO 12-
AA#+": ,efective thin%ing s%is

12) hen auditing a cient (hose information is processed by an outside service provider& it is
not acceptabe for the auditor to rey on the audit report of another independent auditor (ho has
previousy tested the interna contros of the service provider& rather than testing the service
provider@s contros himsef or hersef!
A) True
") 5ase
Ans(er: "
Terms: Information processed by outside service provider
'iff: oderate
Objective: LO 12-
AA#+": ,efective thin%ing s%is

01

You might also like