AIS Final Prt 3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:35 AM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

73 Terms

1
New cards

Inaccurate financial statements

Processing integrity controls

Use of packaged software

Training and experience in applying accounting standards and XBRL

Audits

2
New cards

Fraudulent financial reporting

audits

3
New cards

Poorly designed reports and graphs

Responsibility accounting

Balanced scorecard

Training on proper graph design

4
New cards

Inaccurate adjusting entries

Data entry processing integrity controls

Spreadsheet error protection controls

Standard adjusting entries

Reconciliations and control reports

Audit trail creation and review

5
New cards

Unauthorized adjusting entries

Access controls

Reconciliations and control reports

Audit trail creation and review

6
New cards

Inaccurate updating of general ledger

Data processing integrity controls

Reconciliations and control reports

Audit trail creation and review

7
New cards

Inaccurate or invalid general ledger data

Data processing integrity controls

Restriction of access to the general ledger (“G/L”)

Review of all changes to G/L data

8
New cards

Unauthorized disclosure of financial statement

Access controls

Encryption

9
New cards

*Loss or destruction of data

Backup and disaster recovery procedures

10
New cards

Inaccurate payments

Process integrity controls

Supervisory review

Employee review of earnings statement

11
New cards

Failure to make required payments

& Untimely payments

Configuration of system to make required payments using current instructions from IRS

(Publication Circular E)

12
New cards

Theft or fraudulent distribution of paychecks

Restriction of physical access to blank payroll checks and the check signature machine

Restriction of access to the EFT system

Prenumbering and periodically accounting for all payroll checks and review of all EFT direct deposit transactions

Require proper supporting documentation for all paychecks

Use of a separate checking account for payroll, maintained as an imprest fund

Segregation of duties (cashier versus accounts payable; check distribution from hiring/firing; independent reconciliation of the payroll checking account)

Restriction of access to payroll master database

Verification of identity of all employees receiving paychecks

Redepositing unclaimed paychecks and investigating cause

13
New cards

Errors in payroll processing

Data processing integrity controls: batch totals, crossfooting of the payroll register, use of a payroll clearing account and a zero-balance check

Supervisory review of payroll registers and other reports

Issuing earnings statements to employees

Review of IRS guidelines to ensure proper classification of workers as either employees or independent contractors

14
New cards

Inaccurate time and attendance data

Biometric authentication

Segregation of duties (reconciliation of job-time tickets to timecards)

Supervisory review

15
New cards

Inaccurate updating of master data

Data processing integrity controls

Regular review of all changes to master payroll data

16
New cards

Unauthorized changes to payroll master data

Segregation of duties: HRM department updates master data, but only payroll department issues paychecks

Access controls

17
New cards

Violations of employment laws

Thorough documentation of hiring, performance evaluation, and dismissal procedures

Continuing education on changes to employment laws

18
New cards

Hiring unqualified or larcenous employees

Sound hiring procedures, including verification of job applicants’ credentials, skills, references, & employment history

Criminal background investigation checks of all applicants for finance-related positions

19
New cards

*Inaccurate/Invalid master data

Data processing integrity controls

Restriction of access to master data

Review of all changes to master data

20
New cards

*Unauthorized disclosure of sensitive information

Access controls

Encryption

Tokenization (of customer personal information)

21
New cards

Disruption of operations

Backup and disaster recovery plans

Network and logical access controls

22
New cards

Loss of inventory or fixed assets due to fire or disasters

Physical safeguards

Insurance

23
New cards

Sub optional investments in fixed assets

Proper approval of fixed-asset acquisitions, including use of requests for proposals to solicit multiple competitive bids

24
New cards

Poor performance

Training

Performance/managerial reports

25
New cards

Theft of Fixed Assets

Physical inventory of all fixed assets

Restriction of physical access to fixed assets

Maintaining detailed records of fixed assets, including disposal

26
New cards

Over & under production

Production planning systems

Restriction of access to production orders & schedules

Review and approval of production orders & schedules

27
New cards

Poor product design resulting in excess costs

Analysis of costs arising from product design choices

Analysis of warranty and repair costs

28
New cards

Incomplete or inaccurate orders

Data entry edit controls (see Chapter 13)

Restriction of access to master data

29
New cards

Invalid orders

Digital or written signatures

30
New cards

Uncollectable accounts

Credit limits checked and if sale exceeds limit, specific authorization needed

Specific authorization to approve sales to new customers or sales that exceed a customer’s credit limit

Review aging of accounts receivable reports

31
New cards

Stockouts and excess inventory

Perpetual inventory control system

Use of bar codes or RFID

Training

Periodic physical counts of inventory

Sales forecasts and activity reports

32
New cards

Loss of customers

CRM systems, self-help websites, and proper evaluation of customer service ratings

33
New cards

Picking the wrong items or the wrong quantity

Automation of picking using bar-code and RFID technology

Reconciliation of picking lists to sales order details

34
New cards

Theft of inventory

Restriction of physical access to inventory

Documentation of all transfers of inventory between

receiving and inventory employees

RFID and bar-code technology

Restrict ability to cancel sales

Control creation of and shipments to “one-time” customers

Periodic physical counts of inventory and reconciliation to recorded quantities

Segregate custody versus receiving of inventory

35
New cards

Shipping errors

(fail to ship the goods, wrong quantities, wrong items, ship to wrong address, duplication)

Reconciliation of shipping documents with sales orders, picking lists, and packing slips

Use RFID systems to identify delays

Data entry via bar-code scanners and RFID edit controls

Data entry edit controls (if shipping data entered on terminals)

Configuration of ERP system to prevent duplicate shipments

36
New cards

Failure to bill the customer

Separation of shipping and billing functions

Periodic reconciliation of invoices with sales orders, picking tickets, and shipping documents

37
New cards

Billing Errors

Configuration of system to automatically enter pricing data

Restriction of access to pricing master data

Data entry edit controls

Reconciliation of shipping documents (picking tickets, bills of lading, & packing list) to sales orders

38
New cards

Posting errors in accounts receivable

Data entry edit controls

Reconciliation of batch totals

Mail monthly statements to customers

Reconciliation of subsidiary accounts to general ledger

39
New cards

Inaccurate or invalid credit memos

Segregation of duties of credit memo authorization from both sales order entry and customer account maintenance

Configuration of system to block credit memos unless there is either corresponding documentation of return of damaged goods or specific authorization by management

40
New cards

Cash flow problems

Lockbox arrangements, EFT, or credit cards

Discounts for prompt payment by customers

Cash flow budgeting

41
New cards

Purchasing items not needed

Perpetual inventory system

Review and approval of purchase requisitions

Centralized purchasing function

42
New cards

Purchasing items at inflated prices

Price lists

Competitive bidding

Review of purchase orders

Budgets

43
New cards

Purchasing goods of poor quality

Purchasing only from approved suppliers

Review and approval of purchases from new suppliers

Tracking and monitoring product quality by suppliers

Holding purchasing managers responsible for rework & scrap costs

44
New cards

Unreliable suppliers

Requiring suppliers to possess quality certification (e.g., ISO 9000)

Collecting and Monitoring supplier delivery performance data

45
New cards

Purchasing from unauthorized suppliers

Maintaining a list of approved suppliers and configuring the system to permit purchase orders only to approved suppliers

Review and approval of purchases from new suppliers

EDI specific controls (access, review of orders, encryption, policy)

46
New cards

Kickbacks

Prohibit acceptance of gifts from suppliers

Job rotation and mandatory vacations

Requiring purchasing agents to disclose financial &  personal interests in suppliers

Supplier audits

47
New cards

Accepting unordered items

Requiring existence of approved purchase order prior to accepting any delivery

48
New cards

Mistakes in counting

Do not inform receiving employees about quantity ordered

Require receiving employees to sign receiving report

Incentives

Use of bar codes and RFID tags

Configuration of the ERP system to flag discrepancies between received & ordered quantities that exceed tolerance threshold for investigation

49
New cards

Not verifying receipt of services

Budgetary controls

Audits

50
New cards

Errors in supplier invoice

Verification of invoice accuracy

Requiring detailed receipts for procurement card purchases

ERS

Verification of freight bill and use of approved delivery channels

51
New cards

Mistakes in posting to accounts payable

Data entry edit controls

Reconciliation of detailed accounts payable records with the general ledger control account

52
New cards

Failure to take advantage of discounts for prompt payments

Filing of invoices by due date for discounts

Cash flow budgets

53
New cards

Paying for items not received

Requiring that all supplier invoices be matched to supporting documents acknowledged by both receiving & inventory control

Budgets (for services)

Verification of all receipts for travel expenses

Use of corporate credit cards for travel expenses

54
New cards

Duplicate payments

Requiring a complete voucher package for all payments

Policy to pay only from original copies of supplier invoices

Cancelling all supporting documents when payment is made

55
New cards

Theft of Cash *@2

Physical security of blank checks and check-signing machine

Periodic accounting of all sequentially numbered checks by cashier

Access controls to EFT terminals

Use of dedicated computer and browser for online banking

ACH blocks on accounts not used for payments

Separation of check-writing function from accounts payable

Requiring dual signatures on checks greater than a specific amount

Regular reconciliation of bank account with recorded amounts by someone independent of cash disbursements procedures

Restriction of access to supplier master file

Limiting the number of employees with ability to create one-time suppliers and to process invoices from one-time suppliers

Running petty cash as an imprest fund

Surprise audits of petty cash fund

56
New cards

Check alteration

Check-protection machines

Use of special inks and papers

”Positive Pay” arrangements with banks

57
New cards

start / end

<p></p>
58
New cards

End (of a process)

<p></p>
59
New cards

activity in process

<p></p>
60
New cards

gateway

<p></p>
61
New cards

flow

<p></p>
62
New cards

annotation info

<p></p>
63
New cards

doc

<p></p>
64
New cards

multiple copies of one paper doc

<p></p>
65
New cards

electronic output

<p></p>
66
New cards

electronic data entry

<p></p>
67
New cards

electronic input and output device

<p></p>
68
New cards

computer processing

<p></p>
69
New cards

manual operation

<p></p>
70
New cards

database

<p></p>
71
New cards

magnetic tape

<p></p>
72
New cards

paper document file

n = numberically

a = alphabetically

d = date

<p>n = numberically</p><p>a = alphabetically</p><p>d = date</p>
73
New cards

journal / ledger

<p></p>