Question

1. The programmed verification of a customer number is a ____ control. a. preventive    b....

1. The programmed verification of a customer number is a ____ control.

a. preventive    b. detective c. corrective d. application

2. In general, material irregularities perpetrated by which of the following are most difficult to detect?

a. cashier b. key-punch operator c. internal auditor d. controller

3. Which of the following is least likely to be evidence the auditor examines to determine whether operations are in compliance with the internal control systems?

a. records documenting usage of EDP programs b. canceled supporting documents c. confirmations of accounts receivable d. signatures on authorization forms

4. When an auditor considers a client's internal control, which of the following is ordinarily a type of control activity that is considered?

a. risk assessment over cash disbursements. b. segregation of duties over payroll c. inclusion of the president as a member of the audit committee d. management's monitoring policies over cash receipts

5. Proper segregation of functional responsibilities calls for separation of the

a)

Authorization, approval, and execution functions.

b)

Authorization, execution, and payment functions.

c)

Receiving, shipping, and custodial functions.

d)

Authorization, recording, and custodial functions.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Question No. (1)

Answer -

The programmed verification of a customer number is a Preventive control.

Hence, Option - (a) is Correct.

.

Question No. (2)

Answer -

In general, material irregularities perpetrated by controller are most difficult to detect.

Hence, Option - (d) is Correct.

.

Question No. (3)

Answer -

Confirmations of accounts receivable is least likely to be evidence the auditor examines to determine whether operations are in compliance with the internal control systems.

Hence, Option - (c) is Correct.

.

Question No. (4)

Answer -

When an auditor considers a client's internal control, segregation of duties over payroll is ordinarily a type of control activity that is considered.

Hence, Option - (b) is Correct.

.

Question No. (5)

Answer -

Proper segregation of functional responsibilities calls for separation of the authorization, recording, and custodial functions.

Hence, Option - (d) is Correct.

Add a comment
Know the answer?
Add Answer to:
1. The programmed verification of a customer number is a ____ control. a. preventive    b....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Which of the following is not evidence of internal control? 19. records documenting access to computer programs inv...

    Which of the following is not evidence of internal control? 19. records documenting access to computer programs invoices supporting a journal entry а. b. confirmations of cash balances C. d. authorization signature on a purchase order

  • MULTIPLE CHOICE QUESTIONS! 1)In obtaining an understanding of an entity's internal control relevant to audit planning,...

    MULTIPLE CHOICE QUESTIONS! 1)In obtaining an understanding of an entity's internal control relevant to audit planning, an auditor is required to obtain knowledge about the a) Controls related to each principal transaction class and account balance. b) Consistency with which controls are currently being applied. c) Effectiveness of controls that have been implemented. d) Design of the controls pertaining to internal control components. 2) In a good system of segregation of duties, which of the following duties should be segregated?...

  • 1. Which of the following is not a control that is designed to protect investment securities?...

    1. Which of the following is not a control that is designed to protect investment securities? a. custody over securities should be limited to individuals who have record-keeping responsibility over the securities b. securities should be properly controlled physically in order to prevent unauthorized usage c. access to securities should be vested in more than one individual d. securities should be registered in the name of the owner 2. A control that involves reprocessing transactions that are rejected during initial...

  • need all the answers just answers 16. Analytical procedures include: a. Horizontal (Trend) Analysis. b. Vertical...

    need all the answers just answers 16. Analytical procedures include: a. Horizontal (Trend) Analysis. b. Vertical Analysis. C. Both a and b above. d. None of the above. able. 17. Which of the following conditions is not indicative of fraud: a. Last-minute adjustments that significantly affect financial results. b. Unusual discrepancies between the entity's records and confirmation replies c. Small size of internal audit department. d. Undue time pressures imposed by management to resolve complex or contentious issues. 18. Controls...

  • Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee

    1. Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee? A. Management's failure to renegotiate unfavorable long-term purchase commitments.B. Recurring operating losses that may indicate going concern problems.C. Evidence of a lack of objectivity by those responsible for accounting decisions.D. Management's current plans to reduce its ownership equity in the entity. 2. After obtaining an understanding of internal control and arriving at a preliminary assessed level...

  • 1. Consider the following statements:        I. Per COSO, Control Activities are the policies and procedures...

    1. Consider the following statements:        I. Per COSO, Control Activities are the policies and procedures that help insure that management’s          directives are carried out.       II. A Reliance Strategy is used when control risk is considered High.       a. I is true; II is true       b. I is true;   II is false       c. I is false; II is true       d. I is false; II is false 2. Management's attitude toward aggressive financial reporting and its...

  • 3. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be most effective...

    3. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be most effective in addressing the error or irregularity. For each control you identify, indicate (1) which of the six physical control areas is involved, (2) if it is a preventive, detective, or corrective control, and (3) which of the four internal control objectives is addressed. A small business owner with a limited budget hires a part time bookkeeper who prepares a. all checks for cash disbursements...

  • For the following terms find the correct definition below and place the letter of that response...

    For the following terms find the correct definition below and place the letter of that response in the blank space next to the term. Each definition is used only once. A control procedure that reduces to practically zero the risk of an A. Val IT undetected error or irregularity B. detective controls A process whereby management identifies possible events that C. fidelity bond represent a problem to the firm and then identifies appropriate responses to those problems D. internal control...

  • Can somebody help me answer this questions? Question 1 View Policies Current Attempt in Progress The...

    Can somebody help me answer this questions? Question 1 View Policies Current Attempt in Progress The internal control procedures in Dayton Company result in the following provision Identify the principles of internal control that are being followed in each case. (a) Employees who have physical custody of assets do not have access to the accounting records (b Each month the assets on hand are compared to the accounting records by an internal auditor d! Aprenumbered shipping document is prepared for...

  • is/are an example of a detective control. 7) A) Physical access controls B) Encryption C) Emergency...

    is/are an example of a detective control. 7) A) Physical access controls B) Encryption C) Emergency response teanms D) Log analysis of both 8) COBIT S management practice APO01.08 stresses the importance of employee compliance with the organization's information security policies and overall performance of business processes A) continuous improvement of B) continuous reviewing C) continuous monitoring D) continuous auditing 9) Which of the following is not a requirement of effective passwords? A) Passwords should be changed at regular intervals...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT