IT Audit CH 12
IT Audit CH 12
IT Audit CH 12
1
2
Ethical issues and legal issues are essentially the same. ANS: F PTS: 1
Internal control systems are recommended but not required to prevent fraud.
ANS: F PTS: 1
1 14. Collusion among employees in the commission of a fraud is difficult to
prevent but easy to detect.
2 ANS: F PTS: 1
3 15. Database management fraud includes altering, updating, and deleting
an organizations data.
4 ANS: F PTS: 1
5 16. The fraud triangle represents a geographic area in Southeast Asia
where international fraud is prevalent.
6 ANS: F PTS: 1
7 17. Situational pressure includes personal or job related stresses that
could coerce an individual to act dishonestly.
8 ANS: T PTS: 1
9 18. Opportunity involves direct access to assets and/or access to
information that controls assets.
10 ANS: T PTS: 1
11 19. Cash larceny involves stealing cash from an organization before it is
recorded on the organiza-tions books and records.
12 ANS: F PTS: 1
13 20. Skimming involves stealing cash from an organization after it is
recorded on the organizations books and records
14 ANS: F PTS: 1
The most common access point for perpetrating computer fraud is at the
data collection stage. ANS: T PTS: 1
1 22. Changing the Hours Worked field in an otherwise legitimate payroll
transaction to increase the amount of the paycheck is an example of data
collection fraud.
2 ANS: T PTS: 1
3 23. Scavenging is a form of fraud in which the perpetrator uses a
computer program to search for key terms in a database and then steal
the data.
4 ANS: F PTS: 1
The objective of SAS 99 is to seamlessly blend the auditors consideration of
fraud into all phases of the audit process.
ANS: T PTS: 1
MULTIPLE CHOICE
a.
b.
c.
d.
minimize risk
justice
informed consent
proportionality
a.
b.
c.
d.
ANS: A PTS: 1
3. All of the following are factors in the fraud triangle except
a.
b.
c.
d.
ANS: C PTS: 1
4. Which characteristic is not associated with software as intellectual
property?
a.
b.
c.
b.
c.
d.
accounting records
accounting system
access controls
ANS: A PTS: 1
17. Business ethics involves
a.
b.
c.
d.
ANS: C PTS: 1
18. All of the following are conditions for fraud except
a.
b.
c.
d.
false representation
injury or loss
intent
material reliance
ANS: D PTS: 1
19. The four principal types of fraud include all of the following except
a.
b.
c.
d.
bribery
gratuities
conflict of interest
economic extortion
ANS: B PTS: 1
Conflicts of interest
Full and Fair Disclosures
Legal Compliance
Internal Reporting of Code Violations
All of the above are issues to be addressed
ANS: E PTS: 1
1
2
22. Computer fraud can take on many forms, including each of the
following except
ANS: D PTS: 1
23. What does the underlying assumption of reasonable assurance
regarding implementation of internal control mean?
a. Auditors are reasonably assured that fraud has not occurred in
the period.
b. Auditors are reasonably assured that employee carelessness can
weaken an internal control structure.
4
5
6
7
a.
b.
c.
d.
insert values
a.
b.
c.
d.
PTS: 1
4. Distinguish between exposure and risk.
ANS:Exposure is the absence or weakness of a control which increases the firms
risk of financial loss or injury. Risk is the probability of incurring such a loss or injury.
PTS: 1
5. Explain the characteristics of management fraud.
ANS:Management fraud typically occurs at levels above where the internal control
system is effective.Financial statements are frequently modified to make the firm
appear more healthy than it actually is.If any misappropriation of assets occurs, it
is usually well hidden.
PTS: 1
PTS: 1
9. What are the six broad classes of physical control activities
defined by SAS 78?
ANS:Transaction authorization, segregation of duties, supervision, access controls,
accounting records, independent verification
PTS: 1
A shell company fraud first requires that the perpetrator establish a false
supplier on the books of the victim company. The fraudster then manufactures
false purchase orders, receiving reports, and invoices in the name of the vendor
and submits them to the accounting system, which creates the allusion of a
legitimate transaction. Based on these documents, the system will set up an
account payable and ultimately issue a check to the false supplier (the fraudster).
15. Name three forms of computer fraud.
ANS:
Computer fraud includes:
The theft, misuse, or misappropriation of assets by altering computer-readable
records and files.
The theft, misuse, or misappropriation of assets by altering the logic of
computer software.
The theft or illegal use of computer-readable information.
The theft, corruption, illegal copying, or intentional destruction of computer
software.
The theft, misuse, or misappropriation of computer hardware.
PTS: 1
16. Name three types of program fraud.
ANS:
(1) creating illegal programs that can access data files to alter, delete, or
insert values into accounting records;
1 (2) destroying or corrupting a programs logic using a computer virus; or
2 (3) altering program logic to cause the application to process data
incorrectly.
PTS: 1
17. Define operational fraud.
ANS:
1. 19.
What is scavenging? ANS:
2. Scavenging involves searching through the trash of the computer center
for discarded output. PTS: 1
ESSAY
1. What fraud detection responsibilities (if any) are imposed on auditors by
the Sarbanes-Oxley Act?
ANS: Standard No. 2 places responsibility on auditors to detect fraudulent activity.
The standard emphasizes the importance of controls designed to prevent or detect
fraud that could lead to material misstatement of the financial statements.
Management is responsible for implementing such controls and auditors are
expressly required to test them.
PTS: 1
2.
PTS: 1
4. According to common law, there are five conditions that must be present
for an act to be deemed fraudulent. Name and explain each.
ANS:In order for an act to be deemed fraudulent under common law, it must
possess the following characteristics:false representation, meaning some
misrepresentation or omission must have occurred,material facts, meaning that the
facts must influence someones actions,intent, meaning there must have been the
intention to deceive others,justifiable reliance, meaning it did affect someones
decision, andinjury or loss must have occurred.
PTS: 1
5. Management fraud is regarded as more serious than employee fraud.
Three special characteristics have been discussed for management fraud. What
are they? Explain.
ANS:Management fraud is more insidious than employee fraud because it often
escapes detection until theorganization has suffered irreparable damage or loss.It
usually occurs at levels above the normal internal control system.There is typically
an intent to present a better picture of the business than is valid, often to
deceivecreditors and/or shareholders.If assets are misappropriated, the route is
quite devious involving a maze of business transactions.
PTS: 1
6. Four principal types of corruption are discussed. Name all four and
explain at least two.
ANS:Corruption involves an executive, manager, or employee of a business working
in collusion with an outsider. The four principal types of corruption are: bribery,
illegal gratuities, conflicts of interest, and economic extortion.
Bribery involves giving, offering, soliciting, or receiving things of value to influence
an official in theperformance of his or her lawful duties.
An illegal gratuity involves giving. receiving, offering, or soliciting something of
value because of an official act that has been taken.
A conflict of interest occurs when an employee acts on behalf of a third party
during the discharge of his or her duties or has self-interest in the activity being
performed.
Economic extortion is the use (or threat) of force (including economic sanctions)
by an individual or organization to obtain something of value.
PTS: 1
7. Misappropriation of assets can involve various schemes: expense
reimbursement fraud, lapping, and payroll fraud. Explain each and give an
example.
ANS:Expense reimbursement fraud involve fictitious charges to such accounts as
miscellaneous expenseto offset theft of an asset. Because the expense account is
closed to revenue at the end of the period, the period in which it could be detected
is short.
Lapping is a technique whereby an early theft is covered up by a later one, i.e.,
with the moveslapping over each other. The simplest example involves taking a
customers payment. A later payment is then credited to the first customers
account, not the second. And on it goes. This requiressome control over billing to
avoid tipping off the last customer.
Payroll fraud is the distribution of fraudulent paychecks to existent and/or
nonexistent employees.PTS: 1
8. Distinguish between skimming and cash larceny. Give an example of each
ANS: Skimming involves stealing cash from an organization before it is
10. Since all fraud involves some form of financial misstatement, how is
Fraudulent Statement fraud different?
ANS: Fraudulent statements are associated with management fraud. While all fraud
involves some form of financial misstatement, to meet the definition under this
class of fraud scheme, the statement itself must bring direct or indirect financial
benefit to the perpetrator. In other words, the statement is not simply a vehicle for
obscuring or covering a fraudulent act. For example, misstating the cash account
balance to cover the theft of cash does not fall under this class of fraud scheme. On
the other hand, understating liabilities to present a more favorable financial picture
of the organization to drive up stock prices does qualify.
PTS: 1
11. Explain the problems associated with lack of auditor independence.
ANS: Auditing firms who are also engaged by their clients to perform nonaccounting activities such as actuarial services, internal audit outsourcing services,
and consulting lack independence. They are essentially auditing their own work.
This risk is that as auditors they will not bring to managements attention detected
problems that may adversely affect their consulting fees. For example, Enrons
auditors Arthur Andersen were also their internal auditors and their
management consultants.
PTS: 1
12. Explain the problems associated with lack of director independence
ANS: Many boards of directors are comprised of individuals who are not
independent. Examples of lack of independence are directors who: have a personal
relationship by serving on the boards of other directors companies; have a business
trading relationship as key customers or suppliers of the company; have a financial
relationship as primary stockholders or have received personal loans from the
company; have an operational relationship as employees of the company.
PTS: 1
13. Explain the problems associated with Questionable Executive
Compensation Schemes
ANS: A survey by Thompson Financial revealed the strong belief that executives
have abused stock-based compensation. The consensus is that fewer stock options
should be offered than currently is the practice. Excessive use of short-term stock
options to compensate directors and executives may result in short term thinking
and strategies aimed at driving up stock prices at the expense of the firms longterm health. In extreme cases, financial statement misrepresentation has been the
vehicle to achieve the stock price needed to exercise the option.
PTS: 1
14. Explain the problems associated with inappropriate accounting practices.
16. Describe the factors that constitute the fraud triangle. Why is it important to
auditors?
ANS: The fraud triangle consists of three factors that contribute to or