Soal Ais
Soal Ais
Soal Ais
the use of biometrics as part of employee authentication is designed primarily to reduce the risk
of which thre
d.
Inaccurate time and attendance data
At what step in the audit process do the concepts of reasonable assurance and materiality enter into the
auditor's decision process ?
Select one:
a. planning
c. evidence collection
d. evidence evaluation
Which of the following XBRL components contains information about which items should be summed to
create a category total (e.g., which items comprise current liabilities)?
Select one:
a. Schema
b.
Style sheet
c.
Instance document
d.
Linkbase
e.
Taxonomy
Which of the following pairs of duties combines the functions of custody and authorization in a manner
that would allow an employee to conceal the theft of a customer’s payment?
Select one:
a.
c. None of the combinations involve the functions of custody and authorization in a manner that would
enable an employee to conceal theft of a customer’s payment
d. All of the combinations involve custody and authorization in a manner that would enable an
employee to conceal theft of a customer’s payment
Which of the following control procedures is designed to reduce the risk of theft of paychecks or
fraudulent distribution of paychecks?
Select one:
a.
Restriction of access to blank payroll checks
b.
Redepositing all unclaimed paychecks and investigating the reasons why the pay-checks were not
claimed
d.
e.
Which of the following is a computer technique that assists an auditor in understanding program logic
by identifying all occurences of specific variables?
Select one:
a. automated flowcharting
b. scanning routine
c. mapping program
d. program tracing
Which of the following is most likely the cost driver for accounts payable expenses associated with
processing supplier invoices?
Select one:
b.
Number of suppliers used
c.
d.
e.
The control procedure of cancelling the documents in a voucher package is designed to reduce the risk
of
Select one:
e.
theft of inventory
Select one:
b.
d.
Which of the following XBRL components can, if used too much, limit the potential benefits of
comparability across organizations?
Select one:
a.
Taxonomy extensions
b.
Presentation linkbases
c.
Style sheets
d. Schemas
n terms of quality control measures, the costs associated with issuing credit memos to customers who
return defective products is part of .
Select one:
a.
inspection costs
c.
prevention costs
d.
e.
Which of the following documents is no longer needed if a company uses the evaluated receipts system
(ERS) with its suppliers?
Select one:
a. Purchase order
b. Receiving report
c. Supplier invoice
d. Debit memo
e. None of the above
The development of an MPS would be most effective in preventing which of the following threats?
Select one:
a. excess production
b.
c.
loss of inventory
d.
Use of a separate checking account for payroll is designed to reduce the risk of the threat of .
Select one:
a.
c.
e.
Which of the following combinations of duties can the same employee perform without violating the
principle of segregation of duties?
Select one:
a. All three of the listed combinations can be performed by the same person without violating the
principle of segregation of duties
c. None of the three listed combinations should be performed by the same person because all three
combinations violate the principle of segregation of duties
e.
Which of the following procedures is NOT used to detect unauthorized program changes?
Select one:
a. reprocessing
b. parallel simulation
c. reprogramming code
Select one:
a.
b. Untimely payments
c.
d.
Fraudulent financial reporting is a concern in the GL/reporting cycle. The best control to deal with that
potential problem is
Select one:
a.
b.
d.
Creation and review of an audit trail is a detective control that can enable organizations to find and
correct problems arising from
Select one:
a. neither: unauthorized adjusting entries and inaccurate updating of the general ledger
b.
c.
both: unauthorized adjusting entries and inaccurate updating of the general ledger
d.
Which of the following is designed primarily to improve the efficiency of financial reporting?
Select one:
a.
XBRL
c.
XML
d.
IFRS
To implement proper segregation of duties, who should have the ability to create new records in the
employee master file used for processing payroll?
Select one:
a.
b.
Someone in HR
c.
A payroll clerk
d.
Any of the three people listed above could perform this task
e. None of the three people listed above should perform this task
Which control procedure would be most effective in reducing the risk of over- or-under-production?
Select one:
a.
Computer-integrated manufacturing
d.
Activity-based costing
e.
Which of the following types of fraud requires access to the accounts receivable master file?
Select one:
a. Theft of inventory
b. Kiting
d. Lapping
Which document is used to record adjustments to accounts payable based on the return of
unacceptable inventory to the supplier?
Select one:
a. purchase order
b. credit memo
c. receiving report
d. debit memo
hich of the following graph design principles is most important for ensuring that financial data are
accurately interpreted?
Select one:
b.
c.
d.
Select one:
b.
theft of inventory
c.
d.
disruption of operations
Which of the following controls would be most effective in mitigating the risk of inventory theft?
Select one:
a.
Use of lockboxes
b. Reconciling shipping documents to sales orders, picking lists, and packing slips
Select one:
b. Organizations can reduce the risk of fraudulent disbursements by sending their bank a list of all
checks issued, a process referred to as “Positive Pay.”
c. Issuing employees procurement cards is an example of the control procedure referred to as “general
authorization.”
Journal entries made by either the treasurer or controller should be subject to input edit and processing
controls. A data entry application control that is designed to ensure that the total debits in a journal
entry equal the total credits is called a ______
Select one:
a.
sign check
b.
reasonableness check
c.
equality check
d. zero-balance check
Question text
Select one:
a.
accrual
b.
deferral
c.
revaluation
d. correction
e.
estimate
For good internal control in an ERP system, sales staff should be permitted to
Select one:
Question text
Select one:
a.
move ticket
b. operations list
c.
bill of materials
d.
job-time ticket
Select one:
b. controller
c. treasurer
d. unit managers
Which of the following is an important part of the audit trail?
Select one:
a.
trial balance
b.
flexible budgets
c.
journal vouchers
d. data warehouse
Select one:
a.
b.
toner cartridges for laser printers
d.
e.
The control procedure of comparing a voucher package to vendor invoices is designed to reduce the risk
of .
Select one:
b. theft of inventory
Select one:
b. It is easier to verify the accuracy of invoices for purchases of services than invoices for purchases of
raw materials
c. A voucher package usually includes a debit memo.
the first objective in an IS audit is ensuring the overall security of the system. Select all of the following
controls that would be effective in minimizing the overall security threats faced by an information
system
c. Key verification
d. limiting logical access to the system using authentication and authorizing controls
The sixth objective in an IS audit is protecting data files. Select all of the following controls that would be
effective in minimizing the threats to a company's data files.
a. Storage of data in secure file library and restriction of physical access to data files
Which part of the throughput formula provides information about the impact of equipment downtime
on overall productivity?
Select one:
a. None of the above
b. Productive capacity
c.
d.
Yield
The production cycle is a recurring set of business activities and related data processing operations
associated with the manufacture of products. What is its second step?
Select one:
a.
product design
b. product operations
Select one:
a.
b. The same person maintains both accounts receivable and accounts payable
c. The same person handles customer payments and has access to blank checks.
d. The same person approves sales orders that exceed a customer’s credit limit and processes and
reconciles the bank account.
e.
Which threat is most likely to result in the largest losses in a short period of time?
Select one:
a. Theft of inventory
Which of the following control procedures is designed to reduce the risk of check alteration fraud?
Select one:
The HRM department is responsible for updating the payroll master database for internally initiated
changes related to employment.
Select one:
a. False
b.
True
The theory underlying the Balanced Scorecard is that improvements in the ___________________
section will lead to improvements in the ______ section, leading to improvements in the
______________ section, ultimately creating better results in the financial section.
Select one:
a.
c.
Violating which of the following principles of graph design would result in distorting the magnitude of a
trend in sales?
Select one:
a. Both
b.
Neither
c.
Starting the y-axis at zWhich of the following controls reduce the risk of issuing paychecks to a
“phantom” or “ghost” employee?
Select one:
a.
b.
c.
d.
Which document lists the current amount and year-to-date totals of gross pay, deductions, and net pay
for one employee?
Select one:
a.
paycheck
b.
time card
c. earnings statement
d.
payroll register
Question text
Which system is most likely to be used by a company that mass-produces large batches of standard
items in anticipation of customer demand?
Select one:
a.
MRP-II
b. throughput
c.
activity-based costing
d.
lean manufacturing
Which of the following checks is not an input edit and processing control needed to ensure that journal
entries made by the treasurer are accurate and complete?
Select one:
a. back validation
b. closed-loop verification
c. validity check
For effective internal control, which of the following duties can the person who handles customer
payments also perform?
Select one:
Select one:
Which document is used to authorize the release of merchandise from inventory control (warehouse) to
shipping?
Select one:
a. shipping order
b. picking ticket
c. sales invoice
d. packing slip
Many companies use a _________ to record daily arrival and departure times of the employees who are
paid on an hourly basis.
Select one:
a.
punch card
b.
time card
c.
time sheet
d. entry card
he focus of an operational audit is on which of the following ?
Select one:
c. safeguarding assets
d. internal controls
Select one:
a. cashier
b. controller
c. accounts payable
d. purchasing agent
Select one:
b.
theft of inventory
c.
disruption of operations
d.
Question 110
Question text
The integrated database underlying an ERP system results in which of the following general threats to
the revenue cycle?
Select one:
hich of the following is a concurrent audit technique that monitors all transactions and collects data on
those that meet certain characteristics specified by auditor ?
Select one:
a. SCARF
b. ITF
c. snapshot techniques
d. audit hooks
a. It determines why, how, when, and by whom the audit will be performed
b. An audit program is prepared to show the nature, extent and timing of the procedures needed to
achieve audit objectives and minimize audit risk
c. A typical audit has a mix of audit procedures, such as observations, documentation reviews, sending
confirmation, an analytical review.
d. Among the final steps in audit planning is establishing the audit's scope and objectives
e. Except for the smallest audit, an audit team with necessary experience and expertise is formed
Select one:
a.
HRM
b.
accounting
c.
timekeeping
d.
payroll
he second objective in an IS audit is ensuring proper program development and acquisition. Select all of
the following controls that would be effective in minimizing the program development and acquisition
threats faced by an information system
Select one or more:
Which of the following control procedures is designed to reduce the risk of ordering unneeded
inventory?
Select one:
d.
e.
Select one:
a.
b.
e.
Unauthorized disclosuse of a payroll service bureau or a PEO provides which of the following benefits?
Select one:
a.
c.
d.