AIS Midsem
AIS Midsem
2) Edward Awuriba has been the wetmaster for Sumbruingu Community Dank tsCI) only
ten days when SCH' website w scheduled tor a routine security patch update.
Unbeknown to Mr. Azuniba, eberetooks found out the timing of the patch update and
launched attacks right before SC['s update from a remote location. As n result of the
attack, SCB tost a significant amount of clients' private information. 5CB sutlered
from a(n)
A. haking attack.
I, zero-day attack
C. identity thett attack
D. eyher·extortion attack
) Prinee Esslam is the intemal auditor for S·AMOS[AR Limited Before investigating the
HRM / payroll cycle at S\JOSPAR, Prince decided to read up on the proper
segregation of duties reganding payroll disbursement prusesses. For strongest
segregation of duties, the - should distribute paychecks.
A. account+ payable department
I. cashier
C. internal audit department
D. eternal auditor
5) Which of the following fraudulent acts generally takes most time and effort''
A. Lapping accounts receivable
H. Selling stolen inventory to gct easl
C. Stealing inventory from the warehouse
D). Creating false journal entries to overstate revenue
u/IN'Lt-4 -2 el //
~ CamScanner
7) Computer systems are particultly loenshMe tu coinputer fraud becaue
A perpetrator can tel, destrv, or alter massive mount of data in very little
time, often leaving le evidence
II compute fraud can be much mote difficult to detect than other types of fraud
t computer program need to Pew mo«hfied illegally only one for them to operate
properly ft as logs the} are in use
D all of the above
) An ll auditor eamined we#logs that tracked very time a pron tned to login to th
omnpany wctite [he l] dot need a very long It of attempted Join attempt
that we varwu us«ernmnes frown the' sane ll' adrew lbe ll au»tot hkel sewg
perwn try to do which of te follow hog'
A. hijaslug attack
I phishng attal
t. ditiwnary attal
D password raking
Roland t an a suntant tot (ahty l'aper Company. which ha»w strict corporate policies
on approprate use of sotponte tesounes He Air» weel of February, Roland saw
Judas, the branch met patting a pack of A4 sheets into hi briefcase on his way
out the dot. his situation bet retleet a weakness in which apest of the control
entronment, a discussed in the COO Framework
t. Rid, management pllosoph
[H Intent and cthiel vale
tRestrut aces to sat
D Methods of asstmtg authority and responsibility.
I9)Of the following cam ples of fraud. when will be the mo difficult to prevent and
detect' Assure the cemnpamy enforces adequate segregation of duties
A. maul room cmphce stcals a chxuue teened from a customer ard destroys
the do umncnttwn
H lhe accounts reseable clerk does not record sales invoies fr friend or
lammly, so the can tescn tree god
t. An employee puts inventory behind the dumpster while unloading a vendor's
delivery truxl. then pnls up the mentor later in the day and puts it in her car.
D. credit manager issues stedrt cards to hunset and a staff accountant in the
sounting office, and when the credit cand talanes are just under
6lHs1,000 00, the staff ascouwntant wnites at the scounts as bad debt. The
credit manager then issues ms sands
f+tu,wt4u/44
3 ¥ if
~ CamScanner
?) Whieh of the following duties cold be pertoned by the same individual without
violating segregation of duties sontrot'
• lroramming ne tole lot counting software and testing accounting
software upgrades
I Apposing accounting software tamge requests and testing production
sheduhin software changes
t Apposing software change» and unplementng the upgraded software
D Managing asoants payable fun~trn and rerun code for accounting software
to mote efficient/ ptoesw discount due dates on vendor invoices
Ii\th a rited wk fore and a dets to maintain strong internal control, which
own/nation of lutes would veult in the lot rl eptre''
I plating the mentor thry ledgers ard teeth purchases in the
purchases journal
II, pptong a sale return on a u·tort's ,count and depositing customer,
checks in the bawl
t. Entenin parents to vcnden the cash disbursements journal and enterim
ash cencd from customers in the cash teepts journal.
D t'pdasting the general ledger and working in the iwcntoty warehouse
I4) lhe bet example ot an etetnc payroll transaction file financial total would most
hlely he
4. total number ot employee
B. sum of hours wwried
( sum ot net p»
D total of employees' svial sc,unt number
d l
~ CamScanner
m an uel Aboage
t) he total overtime hours ts t0 hour. Which data entry control would bet prevent
similar data entry errors in the futute'
I '
A. Scene check.
I. Valdut check
t Cheli digit
D. Reasonableness test
''l J I icn1" l\11111\II, ",111hl 1101 he u-.c:f11I if y,,u LUC rccuohn" the
7)\ lh1 of t1he 1 fol1l1 owing 1al ? ,
I) ta data entry input control that imvolcs checking the accuracy of input
data hy using it to retneve and diply other related information
A ahdit chesk
I. Duplicate data checl
c. Closed-loop verification
D. Check digit verification
I) All of the following controls for onlie entry ot a sale order would he useful except
A. check digit verification on the edi amount of the order.
B. validity check on the imventor item number.
C. field check on the customer ID and dollar amount of the order.
D. concurrent update control
20) A payroll clerk, accidentally entered an employee's hours worked for the week as 400
instead of 40. The data entry control tht would best prevent this error would be
A ache.k digit
I, batch total reconciliation
C. alimit check.
D. afield check.
2)When the accountant enter n sotret tamer number, the data entry screen displays
the customer name and address This an tuple of
A prompting
I4, pefomatting
t closed-loop verification
D, error checking
2IA isadata entry control tht enparts the ID number in transaction data to
a master file to venfy that the ID number eists
eonablenes test
lH user review
t data matching
D validity hel
24)A computer optator accidentally used the wrong mater file when updating
transaction file As a result, the master file data is now unreadable Which control could
et
have prevented this from happening'
A Header tesotd
II Validity check
C railer record
D. Panity check.
ntp@ et4 z l
~ CamScanner
2l f a firm es an t!RP, the best st to mitigate le ti»l of the detrtion of matet
data is to
A truently plate the IR!' s em
D. integrate the R!' stem nth all II function
t implement the I R]' «stem in three separate irtan«c
D. periodically audit the Rl' sy em
29)Consider the following revenue ele senano lhe company ha been epoed to
customnet dissatisfaction and the n!'tested control pro«lure to he nplemented i tu
tall and use bar-code scanners What is tle threat'
A The company ms be hipping the wrong quantities of merchanlie
IH lhe comnpany may be hippwng the wrong menhardi
( lhe company may be shrpug oner to the wrong auhdre»
D All of the above threats my apply to this enanio
34A serwus epowsure in the revenue syle is loss ol assets. What is the related threat and
Apple ble control proedare that address this epowsun'
A shipping errors; reconcilution of sales order with picking ticket and packing
hip
theft of cash; segregation of duties and mumization of cash handling
C. making sales that turn out to be uncollectible; force sales people to male
collection calls en customer with past due balance
D, poor perforanse, preparation and review of performance reports
?)Which of the following duties could be prtermed by the same individual and not
violate segregation of duty cont10ls?
A. handling cash and posting to customer accounts
[H, issuing redt memos and maintain customer acounts
C. handling cash and authorizing credit memos
D handling sash receipts and mailing supplier payments
)lt has been discovered that credit sales hnc been made to customers with a poor credit
rating If this continues, the company will face intasing uncollectible receivables and
loses due to bad debts. Separation of duties between nd should
help resolve the problem
A. shipping, billing dutie
I. credit approval, marketing
C. billing; credit approval
D. marketing, accounts receivable
t./attn.tMnA 4 77 y(/
~ CamScanner
~ ~~
34) suppose management wanted to increase the speed ol pn
es sin
''
custorner Dayymcnls.
l}
One way to speed up payment transaction pressing n to
A. ealD
h. use JED] analysis soft»wre
( eliminate credit sales
D etend the amount of credit otleted e customer
15)Segregation of duties control dtatc th,au the solltion and recording functions be
kept separate from each other. However, t acounts receivable department needs to
know when customers pay their imwe tyWht is a solution to this potential internal
control problem
A. Establish a lolbo arrangement wuh a tanl.
I Have customers send a emittance ahie with their payment.
(Have mailroom personnel prepare a remittance list which can be forwarded to
counts rcen able.
D. AMI of the above
6) ldentity in which of the following scenarios a company could adjust the balance due
the vendor ty issuing a debit memo.
A quantity different from that ordered
I damage to the goods
C goods that fail inspextnon tot quhity
D. All of the above are possible scenario s
37)Whh of the following would probably be the least etfective control to mitigate the
risl, of paying a phony imvoe payahle ft mentor purchases that were never made'!
A. Require three·way match for ll inventory purchase invoices.
BH Cancel all imvoi,es and supporting dumentatin when paid.
€ Only pay from origi nal imvwises
D. L.stablish strict access and authorization controls for the approved vendor
master file
Jlf duties are properly seyregated, the authorization function is performed by • the
recording function is performed b , and cash handling is performed by the
A accounts payable; punchsng: cashier
I. purchasing; accounts pyable; cashier
C purchasing; cashier; assounts payable
D, purchasing, accounts payable, treasurer
9)Direct labor must be tracl.cd and accounted tor as part of the production process.
Traditionally, direct labor was tnaked using but an Al enhancement is to
use to record and tna.l direct labor costs
A. job-time tickets; coded identification sands
[4. move tnkets, «oded identification ands
t employee carings records, job-time tickcts
D). time sands, cltron tumc entry terminals
•
5/
~ CamScanner
40) Which type of information belo should not be maintained by the AIS in accounting
for fied assets
A Identification/'serial number
Cot
(Improvement
D Malet value
4])Detailed data about reasons for warranty and tepair sot is considered an applicable
control used to mitigate the threat l
\ underproluton I]
overproduction
C poot prolust design
D) suboptimal investment of fied asset
l) Tonto Ventures determines the cost per delivery by summing the average cost of
loading, unloading, transporting, and maintenance. What coting approach doe» Tonto
Ventures ue''
A Joh-stdet
lH pn€cs
(activity-based
D umt-based
45)lf you believe not all adjusting cntnie were posted in the general ledger, you should
prepare a general ledger control report liting journal voucher in
A.numerical scqucncc
Ii. chronoloneal order.
(general ledger assount number under
D. any otder, sic you have to review them all an way
46) Maria Gonzale is an accountant at (ansa limited. Maria received the following error
message while making an au!justing entry to the general ledger·"Ihe amounts debited
and credited are not tual l'leas« orrt and try again." [his is an eamnple of a
A. validity chel
I. fetd check
t' zero-balance check.
[) oinpletenes test.
I/
~ CamScanner
. ~-
47) Although Gillette uses canned software in its business operations, it does so with th ·, 1
intention of creating a competitive advantage Identify how Gillette aims to gain a
rater competitive advantage twomn in canned sotlwaft
A From deciding how the software should be used
II From deciding what soltwate should he uad
t From the cost savings it gas try usag canned software
p From deciding when software shold t uscd
48)Identity the system below that end uers should not he allowed to develop
A \payroll pressing prota
I. program that perfonns "what·if statistical modeling
(Developing an application sing pvewritten software such as a spreadsheet or
database system
D. leparing a shedule or list suh as a depreciation schedule
Mt/is44 yo 4 I/
~ CamScanner
SECTION D [I0 Marks]
Answer the following ques tion ia the Supplementary Answer Shee t
Question One
The following data is extracted from tbe pyroll of SAJO5PAR limited for the month of
I
fl1•ur,
mate
(lHs
Grc~,
worked
lk,lu~rlon~ N,·t f'J)'
lay
GHs
GlHs GHs
l
i@swz [g? j?so, [is zooo @ooo '6oo
soi
.0¥ Ti @'too
'
11i'o11 l7~,~1
[%o%
'
04twp 4
~ CamScanner