Internal Audit Exam 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/102

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

What is reasonable assurance?

Conformance with the Global Internal Audit Standards - Due professional care!

2
New cards

Performance Measurements

Are created by the CAE with Senior management input and must be approved by the Board Audit Committee
 Provide the criteria against which the internal audit function judges its performance in key
areas.
 Provide a gauge for how well the internal audit function is accomplishing its mission/goals

3
New cards

What is Domain 4?

Managing the Internal Audit Function

4
New cards

How many principles in Domain 4?

4 (9,10,11,12)

5
New cards

What is another name for IA purpose, authority, and responsibility?

Mandate

6
New cards

Mandate

empowers the internal audit function to enhance the organization’s success by providing senior management and the board with objective assurance and advice.

7
New cards

Charter

formal document that includes the internal audit function's mandate, organizational
position, reporting relationships, scope of work, types of services, and other specifications.

8
New cards

What standard is the Mandate in?

6.1

9
New cards

Are the mandate and charter the same?

No

10
New cards

What standard is the Charter in?

6.2

11
New cards

Does the IA require a Charter?

Yes

12
New cards

What is the CAE responsible for?

Periodically assessing whether the IAF’s purpose, authority and
responsibility (mandate) defined in the charter continue to be adequate
for the IAF to accomplish its objectives.
Communicating the results of such an assessment to management and
the audit committee.

13
New cards

What does the IA Charter provide?

Formal criteria for review and understanding by management and the audit committee.
Facilitation of a periodic assessment of the adequacy of the internal audit function’s purpose, authority and responsibility, which
establishes the role of the internal audit function.
A formal, written agreement with management and the audit committee regarding the organization’s internal audit function

14
New cards

What is Principle 9?

Plan Strategically

15
New cards

What is standard 9.4?

Internal Audit Plan

16
New cards

What is the Internal Audit Plan?

The chief audit executive must create an internal audit plan that supports the achievement of the organization’s objectives. this standard incorporates risk-based planning and auditing concepts, resulting in a prioritized plan of engagements at least annually.

17
New cards

What is Standard 9.5?

Coordination and Reliance

18
New cards

What is CARES?

SCOPE of IA: Compliance, Achievement, Reliability, Effectiveness, Safeguarding of Assets

19
New cards

Standard 9.2?

Internal Audit Strategy

20
New cards

What is Internal Audit Strategy?

The chief audit executive must develop and implement a strategy for the internal audit function that supports the strategic objectives and success of the organization and aligns with the expectations of the board, senior management, and other key stakeholders.

21
New cards

What is standard 9.3?

Methodologies

22
New cards

What are methodologies?

Guide the internal audit function in a systematic and disciplined manner to implement its strategy, develop its internal audit plan, and conform with the Standards. (New standard)

23
New cards

Policies and procedures should be…

Consistent with the size of the internal audit function.

24
New cards

Standard 9.5?

Coordination and Reliance: coordinate with internal and external providers of assurance
services and consider relying upon their work. Coordination of services minimizes duplication of efforts, highlights gaps in coverage of key risks, and enhances the overall value added by providers

25
New cards

What is Principle 10?

Manage Resources

26
New cards

Standards in Principle 10?

  • Standard 10.1 – Financial Resource Management

  • Standard 10.2 – Human Resources Management

  • Standard 10.3 – Technological Resources

27
New cards

Standard 8.2?

Resources: evaluate whether internal audit resources are sufficient to fulfill the
internal audit mandate and achieve the internal audit plan. If not, the chief audit executive must develop a strategy to obtain sufficient resources and inform the board about the impact of insufficient resources and how any resource shortfalls will be addressed.

28
New cards

Financial Resource Management

manage the internal audit function’s financial resources; Develop a budget that enables the successful implementation of the internal audit strategy and achievement of the plan.

29
New cards

Human Resource Management

The chief audit executive must establish an approach to recruit, develop, and retain internal auditors who are qualified to successfully implement the internal audit strategy and achieve the internal audit plan.

30
New cards

Technological Resources

strive to ensure that the internal audit function has technology to support the internal audit process.

31
New cards

What three things come under managing resources?

Budget, Resources, Technology

32
New cards

Data analysis allows for…

100% testing that provides definitive results and
conclusions, continuous auditing, and fraud detection or prevention.
Automated Monitoring
Automated Working Papers
Department Administration and Management

33
New cards

What is Principle 11?

Communicate Effectively

34
New cards

Building Relationships and Communicating with Stakeholders

build relationships and trust with key stakeholders, including the board, senior management, operational management, regulators, and internal and external assurance providers and other consultants

35
New cards

Effective Communications

The chief audit executive must establish and implement methodologies to promote accurate, objective, clear, concise, constructive, complete, and timely internal audit communications.

36
New cards

Communicating Results

The chief audit executive must communicate the results of internal audit services to the board and senior management periodically and for each engagement as appropriate. The chief audit executive must understand the expectations of the board and senior management regarding the nature and timing of communications.

37
New cards

Communicating the Acceptance of Risks

The chief audit executive must communicate unacceptable levels of risk = Risk Appetite

38
New cards

What does QAIP stand for?

Quality Assurance Improvement Program

39
New cards

What is the QAIP designed for?

Evaluate the internal audit function and its conformance with the Global Internal Audit Standards. It is also an evaluation of whether internal auditors apply ethics and professionalism to these activities.

40
New cards

Principle 12?

Enhance Quality

41
New cards

Standard 8.3?

Quality

42
New cards

Quality =

Conformance + Performance

43
New cards

QAIP Framework

ongoing monitoring, periodic self- assessment, and external assessment. The output of these three activities includes findings, observations, and recommendations.
•  The QAIP Framework provides for embedding quality assurance and continuous improvement into an internal audit function.
• The framework considers three separate activities or sections within an internal audit activity: governance, professional practice, and communication.
• The QAIP Framework assumes that quality is built into (and not onto) the structure of the internal audit function.

44
New cards

Five Characteristics of a Successful QAIP

Policy

Methodology and process

People

Systems and information

Communication and reporting

45
New cards

Internet of Things

Network connection and transmission of information or data from physical devices, objects, or fixtures,.

46
New cards

Cybersecurity refers to:

technologies, processes, and practices designed to protests organizations information assets.

47
New cards

Cybersecurity vs. Information security

Cyber= just the network

Info= system or non-system; larger

48
New cards

Effective controls to address cybersecurity include:

Strong security frameworks

Identifying and controlling top risk to org. related to cyber

Cybersecurity awareness programs to all employees

Consideration of external and internal threats

Info security governance

Responce protocol

49
New cards

IT Auditor

works extensively in the area of computerized info systems; should have deep IT risk, control, and audit expertise

50
New cards

True or false: It is virtually impossible in today’s business world for any internal audit function to provide value-adding services to its organization unless the function is highly proficient in its knowledge of IT risks and controls and has the capability to effectively apply technology-based audit techniques.

True

51
New cards

What is the IT Auditing Certification called?

Certified Information System Auditor

52
New cards

Standards 10.1, 10.2, 10.3

Standard 10.1 – Financial Resource Management
Standard 10.2 – Human Resources Management
Standard 10.3 – Technological Resources

53
New cards

Information Technology Governance

Leadership, structure and oversight process that ensure org, IT supports objectives and strategies

54
New cards

What is the IT Governance Framework?

Pentagon shape;

organization and gov. structures,

strategic and operational planning,

IT org. and risk management,

service deliver and measurement,

executive leadership and support

55
New cards

COBIT 2019 definition

internationally accepted IT governance framework; best-known control and governance framework that address info technology

56
New cards

Selection risk

Selection of an IT solution that is misaligned with a strategic obj that may preclude the execution of the IT-dependent strategy

57
New cards

Development/acquisition and deployment risk

Problems encountered as the IT solution is being developed/acquired and deployed may cause unforeseen delays, cost overruns, or even abandonment of the project.

58
New cards

Availability risk

Unavailability of system when needed; may cause delays in decision-making, business interruptions, financial and regulatory reporting, lost revenue, customer dissatisfaction

59
New cards

Hardware/software risk

failure of hardware/software to perform properly may cause business interruptions, temporary or permanent damage to or destruction of data, and hardware/software repair or replacement costs.

60
New cards

Access risk

Unauthorized physical or logical access to the system may result in theft or misuse of hardware, malicious software modifications,
and theft, misuse, or destruction of data.

61
New cards

Causes for Access risk:

use of smartphones to access, modify, and store corporate data and open use of wireless networks for guest access to business data and
lack of strong user access or authentication

62
New cards

Confidentiality and privacy risk

Unauthorized disclosure of business
partners’ proprietary information or individuals’ personal information may result in loss of business, lawsuits, negative press, and reputation impairment.

63
New cards

Causes of confidentiality and privacy risk:

unimpeded access to system networks, software, and databases.

64
New cards

System reliability and info integrity risk

systematic errors or inconsistencies in processing may produce irrelevant, incomplete,
inaccurate, and/or untimely information. In turn, the bad information produced by the system may adversely affect the decisions that are based on the information.

65
New cards

Causes of system reliability and info integrity risk:

software programming errors, weak edit or data
verification controls, and unauthorized changes to software.

66
New cards

Fraud and malicious acts risk

Theft of IT resources, intentional misuse of
IT resources, or intentional distortion or destruction of information may
result in financial losses and/or misstated information that decision-
makers rely upon.

67
New cards

IT controls can be categorized as a:

top-down hierarchy of IT governance, management, and technical controls.

68
New cards

The top six layers of IT controls represent; The
bottom layer represents

  • IT general controls

  • application controls

69
New cards

General Controls (ITGCs)

apply to all computerized systems or
applications. mixture of software, hardware, and manual procedures that shape an overall control environment.

70
New cards

Application controls:

specific controls that differ with each
computerized application.

71
New cards

The objectives of IT general controls are

ensure the appropriate development and implementation of applications, as well as the integrity of program and data files and of computer operations.

72
New cards

Most common ITGCs

Logical access controls
Systems development life cycle (SDLC) controls
Program change management controls
Physical security controls
System and data backup and recovery controls

73
New cards

Logical access controls

Infrastructure, applications and data limit access

74
New cards

Application controls

built into each application (payroll, accounts payable, inventory management, etc.) and are designed to ensure that only correct, authorized data enter the systems and that the data are processed and reported properly.

75
New cards

Application controls include:

Input, processing, and output controls

76
New cards

Most common types of application controls:

Source document controls
Batch input controls
Online (real-time) input controls
Processing controls
Output controls
Management trail controls

77
New cards

Batch input controls:

Financial totals, record counts, hash totals (meaningless total of vendor numbers), batch total

78
New cards

Online (real-time) input controls:

Completeness check, field/format checks, sign check, pre-formatting, validity checks, check digits, limit(reasonableness) check, range check, sequence check, zero balance checks, input error correction

79
New cards

Processing controls

Run-to-run control totals, error listing, concurrency controls

80
New cards

Output controls

designed to ensure that application system outputs are valid, complete, and accurate and that security over outputs is properly maintained

81
New cards

Types of output controls:

Output review controls, distribution controls, end-user controls

82
New cards

What does GTAG stand for?

Global Technology Audit Guides: provide supplemental guidance

83
New cards

Fraud is defined as:

Any intentional act characterized by deceit, concealment, dishonesty, misappropriation of assets or information, forgery, or violation
of trust perpetrated by individuals or organizations to secure unjust or
illegal personal or business advantage

84
New cards

Fraud risk is:

possibility that fraud will occur and potential effects to org

85
New cards

What is the fraud certification:

CFE: Certified fraud examiner in forensic accounting

86
New cards

Forensic auditing uses accounting and audit knowledge in matters of:

having civil or criminal legal implications

87
New cards

Root causes of fraud

Supply of motivated offenders
Availability of suitable targets
Absence of capable guardians
Means, motivation and opportunity
Excuses/Rationalization

88
New cards

The fraud triangle requires what three things to be present?

financial pressure, rationalization, opportunity

89
New cards

Types of fraud

corruption, assets misappropriation, and fraudulent statement

90
New cards

corruption

improper use of power, e.g., bribery. It often leaves little accounting evidence. (Extortion, bribes/kickbacks, conflicts of interest, illegal gratuities)

91
New cards

Asset misappropriation

Stealing cash or other assets (Kiting, lapping, skimming)

92
New cards

Financial statement misrepresentation

Overstates assets or revenues or understates liabilities and expenses

93
New cards

Lapping

a person with access to customer payments and accounts
receivable records steals a customer’s payment. The shortage in that
customer’s account then is covered by a subsequent payment from
another customer.

94
New cards

Essential elements in preventing fraud are:

setting the correct tone at the top
and instilling a strong ethical culture

95
New cards

Safeguarding of assets:

protects entities against unauthorized use and
disposal of assets and intellectual property.

96
New cards

Fraud detection

Detective controls are those that are designed to identify occurrences of
fraud or symptoms that may be indicative of fraud.

97
New cards

What is an essential element in detecting fraud?

Employee feedback; i.e. whistleblower hotline

98
New cards

no controls can provide…

absolute assurance

99
New cards

When conducting fraud risk assessment, it is important to: 

involve individuals with varying knowledge, skills, and perspectives.

100
New cards

Responsibility for fraud controls:

Management is primarily responsible