CRMA Study Guide McKeever-2
CRMA Study Guide McKeever-2
Course Overview
Thank you for using the McKeever CRMA Study System as a tool to help
you pass The IIA CRMA Exam.
Passing the exam portion of the CRMA exam involves 2 parts – 1) passing
Part 1 of the CIA Exam and 2) passing the CRMA Exam.
The actual CRMA Exam questions are confidential. As a result, the material
and practice questions presented are representative of the body of
knowledge tested by the CRMA Exam. They are not actual questions from
current or past CRMA Exams. The material has been developed and
compiled to the best of the author’s knowledge and from applying CRMA
principles as a Risk Management Practitioner.
The McKeever CRMA Study System will help you prepare for the CRMA
Exam as follows:
1) describes the many areas covered by the CRMA Exam
2) presents over 300 practice questions similar to what you will see on the
CRMA Exam
4) provides you with guidance for correct answers and feedback about not
correct answers
5) helps you identify areas on the CRMA Exam that will require your
additional study time
The IIA web site lists a variety of study material and references to use in
passing Part 1 of the CIA Exam. The IIA web site also contains a listing of
references to use for the CRMA Exam.
The McKeever CRMA Study System covers the CRMA Exam in-depth.
John J. McKeever
CRMA, CCSA, CQA, CFE, CPC, CBC
For his achievements as a seminar leader, The Institute of Internal Auditors has
awarded John the designation of Distinguished Adjunct Faculty Member.
In addition John has authored numerous research papers that have addressed
the concepts of process improvement in business, employee empowerment, and
the management of effective teams. Using these tools, he has guided and
encouraged thousands of domestic and international professionals to move
toward process and business improvements.
John has degrees in Business Administration and Management from
Northeastern University, a Master of Science Degree in Management from
Stevens Institute of Technology, and a graduate level Certificate in Total Quality
Management from the University of Phoenix. He is a Certified Quality Auditor, a
Certified Fraud Examiner, a Certified Business Manager, a Certified Professional
Consultant, and holds a Certification in Risk Management Assurance. In addition,
John holds both a Control Self-Assessment Qualification and a Certification in
Control Self-Assessment.
He is a member of the American Society for Quality, The Institute of Internal
Auditors, The Association of Business Professionals in Business Management,
and the Association of Certified Fraud Examiners.
Index
Course Overview
Appendices
Application Questions
Overview
CRMA® and the McKeever CRMA Study
System
Certificate in Risk Management Assurance (CRMA)
Internal auditors at any experience level, in almost all positions, will benefit
from this certification program.
Visit the IIA’s web site www.theiia.org. There you will find a number of
valuable resources listed to help you pass both Part 1 of the CIA Exam and
the CRMA Exam.
CRMA Exam
The CRMA Exam tests a candidate’s understanding of important risk
management fundamentals, processes, and related topics such as risks,
controls, and business objectives.
Registration
Candidates are given 2 hours to complete the CRMA Exam. For detailed
topic outlines, visit www.theiia.org/certification. Exam topics and format
are subject to change as approved by The IIA Board of Regents.
The McKeever CRMA Study System provides the following to help you
successfully pass the CRMA Exam:
2) explains, in detail, the information you need about the contents of each
domain on the CRMA Exam and demonstrates techniques to address multiple-
choice question
3) provides over 300 sample questions, with answers and explanations, similar to
the ones you will see on the CRMA Exam - not the actual questions that may
appear on the CRMA Exam since the actual exam questions are confidential
4) provides an extremely valuable resource for both self-study mode and group
training
5) helps you identify areas where you need additional study prior to the exam
For group study we recommend no less than 16 hours of team study. This time
should include reviews of both the content in the modules and review of the
Sample Questions with Answers and Explanations.
While studying the material you will see a STOP sign with a sample question. Try
to determine the “best answer”. Then look at the answer and explanation in the
Application Questions, Answers & Explanation module.
Review the Application Questions module after studying the Domain modules.
The answer for each question with an explanation how to arrive at the "best
answer" is contained in the Application Questions, Answers & Explanations
module.
Prior to taking the actual CRMA Exam we suggest that you become very
comfortable with both the format of the exam and the type of questions you may
see on the actual exam. That way you will have the full 2 hours of the exam time
to answer the actual questions efficiently without wasting time.
Practice the use of the Pearson Vue system used for the CRMA Exam.
Go to the Pearson Vue web site, download a copy of the full-featured Tutorial
Demo Test at http://www.pearsonvue.com/iia/ and install it onto your hard drive.
Use the full-featured Tutorial Demo Test a number of times concentrating on
using the various features of that test. The Pearson Vue Tutorial Demo shows a
variety of formats. The CRMA Exam uses ONLY 100 questions that are multiple-
choice format - text and graph formats (no video, pictures, or essay).
Use both the "About Pearson VUE exams" and the full-featured Tutorial Demo
Test downloaded from the Pearson web site as part of your study BEFORE you
arrive at the testing center and again immediately before starting the CRMA
Exam at the testing center. Especially learn to use the following features of the
Pearson Vue System – not listed in any particular order (the "About Pearson
VUE Exams" downloaded with the Tutorial Demo is an excellent place to learn
about these capabilities):
a) Navigator
g) if you are taking the exam in a language other than English, make certain you
know how to see the English version of that question, in case needed
2) After using the Pearson Vue full-featured Tutorial Demo Test, then use the
Sample CRMA Questions on The IIA web site to review the type of questions on
the actual CRMA Exam. The Sample CRMA Questions on The IIA web site are
typical of what you will see on the CRMA Exam but are not presented using the
format of the CRMA Exam - the multiple-choice questions portion of the Pearson
Vue full-featured Tutorial Demo Test is the format used on the actual CRMA
Exam.
3) After using the Pearson Vue full-featured Tutorial Demo Test and reviewing
the Sample CRMA Questions on The IIA web site then try to answer the Sample
Questions in the Application Questions module of the McKeever CRMA Study
System. Then review and evaluate your answers and explanations in the
Application Questions, Answers & Explanations module.
Consider acquiring any of the additional references lists on The IIA web site.
By this time you should feel comfortable with both the format of the CRMA Exam
and the type of questions you will see on the actual exam.
If you need additional study in an area covered on the CRMA Exam read the
content of that module in this workbook as many times as you need to. If you
need more in-depth understanding in an area use some of the references listed
on The IIA web site.
If you are ready to take the exam schedule a time and complete your information.
Be certain you made an appointment to take the test and know the exact location
of the test center. The address and directions are located at
http://www.pearsonvue.com/iia/.
On the day of the exam wear comfortable clothing as the exam is 2 hours long.
If you would like email notification when new Pleier Corporation titles are
available send an email to [email protected] with the following information:
Name: _____________________________________
Company: __________________________________
Address: ___________________________________
City: ___________________________________
Country: __________________________________
Note: If you purchase your product directly from Pleier Corporation your product is
registered.
Author
DOMAIN I:
ORGANIZATIONAL
GOVERNANCE
RELATED TO RISK
MANAGEMENT
1) Key external factors (drivers and trends) that may impact the objectives of
the organization
2) Needs and expectations of key external stakeholders (e.g., involved,
interested, influenced)
With this in mind, the deliberate structure of an organization should facilitate and
coordinate the efforts of all of the subdivided sets and move uniformly toward one
efficient and effective effort.
All organizations have permeable boundaries that at least should separate them
from other organizations. This is called differentiation. This distinction defines
individual organizations, functions, and purposes. In terms of competition,
differentiation of purpose, product, or service will distinguish one organization
from another. From the competitive perspective this differentiation is what will
cause a customer or client to choose one company or organization over another.
Some reasons for these customers or clients differentiated choices could be
price, location, customer service, quality, likeability of the company, and
compatibility with customer needs and wants.
Organizations probably had more defined and distinctive boundaries in the past
However, in these more contemporary times the boundaries of organizations
have become and must be more permeable or flexible. In order to survive it is
now necessary that organizations share with each other information, cooperate,
and collaborate. The sharing of technology, ideas, and components as well as
international trade are just some examples of the necessity for more permeable
boundaries of today’s organizations.
Further, organizations can be subdivided into two distinct classes that directly
relate to the organizations focus and ability to address their risks and hence their
success. These classes of internal and externals risk will be discussed later in
detail. Internal risks include training; capabilities of staff and employees; the lack
of physical controls such as locks, cameras; and passwords to name a few.
Internal risks can be understood and fixed. Generally, there is or can be some
control over internal risks
External risks on the other hand are the elements that keep an impact on the
organization but that the organization has little or no control over occurrences of
these risks. Consequently, the organization, although having little or no control
over the advent of these external risks, must plan for and manage these external
risks. External risks can include the environment, weather, interest rates, the
economy, international relations, international suppliers, exchange rates, politics,
government rules, and government regulations.
The two subcategories of organizations that relate to both the internal and
external risks are an open organization system and a closed organization
system. A closed system does not depend on the environment in which it
operates. The management of a closed system would be relatively simple to
understand and manage; with no external influences to worry about, the closed
organization system would most likely be stable and predictable. A closed
organization would be totally autonomous, enclosed and sealed off from the
outside world of external influences. Although possible, it is unlikely that a
completely closed organization system by definition could exist in today’s
business environment.
8. The Senior Vice President of Operations reports directly to the Chairman and
President of Products Inc. This is a family-owned company which has grown
substantially over the past few years. Now named Products International its
growth can be attributed mostly to the purchase of three international companies.
These newly-purchased companies provide similar products as the parent
company and were also looking to expand to international markets. As all of
these companies provide generally the same products which type of operating
environment is Products International?
Categories:
An open system must interact with the environment. This is a more likely
situation in today’s environment. Open systems can be very complex and must
require innovative and proactive management. Open systems have to find and
obtain needed resources, interpret and act on environmental changes (external
risks), dispose of outputs, control and coordinate internal and external activities,
and manage environmental changes. Sometimes working closely with
competitors and international markets their complexity increases. Remember as
complexity increases so does risk.
Probably most importantly is the tone that is established and emulated by upper-
level management. The words, speeches, posters, and newsletters are all fine
but without a sincere tone of support and belief from upper-level management, all
of the words, speeches, posters, and newsletters are just that and will have little
impact on the intended direction of the organization.
Next from the top down are middle-level managers. Middle-level managers are,
or should be concerned, with the functioning of individual departments such as
accounts payable, marketing, operations, and human resources to name a few.
These middle-level managers must interrelate the functioning of their respective
departments to the overall goals and objectives of the overall organization.
These middle-level managers must design and implement effective interrelations
of politics, technology, cooperation, along with risk and control management
among interfacing departments.
Lower-level management is, or should be, concerned with the day to day
operations of employees who have the hands on function of tangible tasks within
the organization. The overall organization goals and objectives must still be kept
in focus as these day to day tasks are accomplished. The objectives of these
day to day tasks at these lower levels should work together with the objectives
set by the upper-level management.
Therefore it is important that wherever and by whom the tone may be set, be that
an ethical tone, a management tone, a risk management tone, and a control
tone, that this tone be monitored for success. This monitoring control should be
established by those, upper management levels, which set the original tone.
Most importantly, adjustments should be made if the monitoring indicates that the
original tone, objectives, or goals are not being achieved. The key word here is
adjustment. A monitoring control without adjustment or action is a waste of
time.
Operative Goals:
It is in these lower levels of management where operative goals are most
apparent. Operative goals define what is actually trying to be accomplished
and should define specific short-term measurable outcomes.
Waiting to adjust for the major issues is crisis management while making minor
adjustments of deviations from accepted criteria is a preventive control.
Therefore, this can be interpreted that the overall guidelines for the direction of
an organization is set by upper management communicated to everyone and is
the responsibility of everyone to manage so that the achievement of objectives
can be achieved.
In terms of the risk culture, it is important that all those involved in the
achievement of objectives understand the risk that will stop the achievement of
the objectives as well as the consequences of not addressing those risks.
These consequences can be measured by understanding the risk appetite of the
organization.
In the simplest terms, the risk appetite is how much risk a person or
organization is willing to accept in order to achieve their objectives. Risk
appetite is directly related to the organizations strategy.
Management should consider its risk appetite as its alignment with its resources
including, people, processes, and infrastructure design. This alignment is
necessary to respond to the internal and external risks both appropriately and
effectively. This sounds simple enough. However, herein is the problem. Even
if a person or organization identifies a pending risk, the consequences of the
acceptance of that risk can very well be misunderstood.
Therefore, not only a complete understanding of what the risk is but also the
consequences of not completely addressing that risk must be identified by upper-
level management and emulated sincerely to everyone involved.
Action on risk is important. The four steps in risk assessment are: identify
measure, prioritize, and act. Some general actions of risk management
include: avoidance, reduction, sharing, and acceptance. Nevertheless, when
considering action by controls the right type of controls applied at the right time
and in the right amount should be considered.
Keep in mind that all things operate within an environment. Entities, individual
people as well as large and small organizations operate within an environment.
Hence, they are subject to changes by that environment. As the environment
changes so do the objectives, the risks, and so should the controls that address
those risks.
The Larger And More Complex An Entity The More Influence The
Environment Will Have Upon The Risks. Therefore, The Risk Appetite And
Overall Risk Philosophy Entity Should Be Fluid.
The mission or vision statement is generally very high-level and not very specific.
For example, a mission statement could be “our mission is to maintain the
highest quality of service to our customers”. However, this does not indicate
how to accomplish this.
Next on the list are objectives. Objectives are generally more specific than the
mission statement. An example might be: in order to enhance the customer
experience, so to expand our customer base. We will address our customers’
needs, modify, and adjust our services and products to satisfy our customers’
needs.
Next on the list are goals. Goals are the next level down and become more
specific. Goals should be Specific, Measurable, Accomplishable, Results-
orientated, and Time-bound (SMART). Goals are much more specific than the
objectives or mission.
A good way to consider this is to analyze SMART. Specific means that the goal
should identify exactly what is to be done. Measurable means that there is a
mechanism in place to monitor the activity to make sure it is operating as
intended. (Important with any monitoring “control” there must be a physical
monitoring mechanism and action to do something appropriate with what was
monitored). Results-orientated means that some deliverable or output is required
from the activity of the goal. If there is no measurable output then why do it?
Time-bound means that the goal should be accomplished within a specific time.
For example: our goal is to identify our customers’ needs each month where we
will identify and address the satisfied customers as well as the not satisfied
customers. With this information, we will provide reports to our planning
organization every month at monthly staff meetings and then follow up for the
effectiveness of results. A goal has much more detail and specifics than the
objectives or mission statements.
There is another subtask and category that can be attached to the goals. This is
strategy. Strategy is down to another level of detail. Strategy identifies how,
specifically the goals will be accomplished.
In addition, there are two subcategories of strategy. They are tactical and
strategic planning. Tactical planning is generally short-term. This means, by
definition, one year or less. Therefore, strategic planning is longer than one year.
(These are text book definitions) good for test and exams. However, in real
business setting short-term planning may be more or less than 12 months. The
definitions are less consequential in a real business setting as long as the
process owners understand the concept.
Here is an example: we will obtain, from a statistical model, surveys from each
customer every month. From the 15 questions asked our statisticians and data
compilers will present an evaluation of the survey results. Adjustments will be
made each month to enhance customer experiences and address customer
concerns (tactical). Further, a compilation of the monthly data will be complied
annually. A combination of the monthly data and the annual data will be used as
input to determine and evaluate costs of research and development physical
plant and equipment investment and staff investment on the five year plan.
Adequate and appropriate adjustments will be made to ensure that we
consistently maintain the highest quality of customer service (strategic).
Changes in plans become obvious here. Note how this finally connected back to
the broad mission statement.
Possibly professional risk and control experts may be comfortable with these
textbook type definitions. However, most process owners would not be. Process
owners may even become confused and intimidated and even fall into the trap of
building piles of paper to satisfy the textbook definitions and miss the overall
concept or risk and control management. In a real business setting, keep it
simple.
Just as the definition above it was important, with MBO, that the overall mission
statement be kept in mind and that the objectives being developed by the
superiors and subordinates work toward that overall mission.
Even if there are slight differences in these objectives all of the objectives within
the company, at all levels, should be relative to each other and connect.
It is Unlikely that All Possible Risks All of the Time Can be Diminished or
Totally Eliminated.
There are often two reasons for any inappropriate acceptance of risk. One is that
the world changes rapidly. When a certain risk has been addressed and as
action has begun, the risk situation may change introducing new risks. The
problem is that these new risks may not have been adequately identified
and addressed. Therefore, changes in the environment in which the risk is
operating may cause an inappropriate acceptance of risk. Another reason for the
inappropriate acceptance of risk is a lack of understanding the
consequences.
45. The Rental For You And Save Company, providing day-to-day items for short-
term use, has been in business for 22 years. This company provides products for
short-term use such as lawn furniture, household furniture, electronics, and even
tools. The company’s objective is to help customers who may need such items
for short-term use and who realize that it is not worthwhile to purchase such
items. The average rental time is one month. Contracts are signed with the
renters to return the items in the same condition as they were rented.
Although the number of times an item can be rented can vary depending on the
product, the average number of rental times for all items is currently 14.4 times.
Prior to five years ago, the average number of times for all items was 19.8. In
general, the more wear and tear on rented items the fewer times they can be
rented. In order to maintain company success the average time objective for all
items rented is 13.6 times. There has been a steady decrease from 19.8 to 14.4
over the past five years. Management began to become very concerned with this
trend particularly when the number reached 14.4. This difference between the
13.8 objective and the old number of 19.8 compared to the 13.8 objective vs. the
new number of 14.4 can best be described as:
a. risk appetite
b. risk assessment
c. a statistical process SPC risk variation range
d. risk tolerance
The end holds the consequences that may require handling in a reactionary
mode if the consequences are not anticipated and addressed adequately in a
preventive mode. The consequences of accepting risk in today's business
environment are far more apparent than they were even a few years ago. Rapid
changes with laws and regulations, embarrassment and reputation in various
news media, as well as global economic situations have substantially increased
the opportunities for pending risks.
Autocratic is very strict in its approach. Power is at the top. Subordinates have
little say in decision-making; they only follow orders.
POWER
This environment has a high degree of control over individuals and less
opportunity for employee participation and input.
ROLE
ACHIEVEMENT
• there is flexibility, the employee acts in the way considered suitable for the
tasks
PERSON / SUPPORT
22. Which of the following would be the best organizational culture to implement
organizational objectives when there were concerns with wrongdoing activities?
a. role
b. power
c. achievement
d. person / support
Since 1977, the anti-bribery provisions of the FCPA have applied to all U.S.
persons and certain foreign issuers of securities. With the enactment of
additional amendments in 1998, the anti-bribery provisions of the FCPA now
applies to foreign firms and persons who cause, directly or through agents, an
act in furtherance of such a corrupt payment to take place within the territory of
the United States.
The FCPA also requires companies whose securities are listed in the United
States to meet specific accounting provisions. These accounting provisions,
which were designed to operate in tandem with the anti-bribery provisions of the
FCPA, require corporations covered by the provisions to: 1) make and keep
books and records that accurately and fairly reflect the transactions of the
corporation and 2) devise and maintain an adequate system of internal
accounting controls.
• restricting the amount of and type of consulting work that auditors can
perform for their publicly traded companies
• requiring CEOs and CFOs, under SOX, to certify their company financial
statements
The most contentious aspect of SOX is Section 404, which requires management
and the external auditor to report on the adequacy of the company's Internal
Control over Financial Reporting (ICFR).
Intentionally not complying with the SOX and Public Company Accounting
Oversight Board (PCAOB) guidelines has more serious consequences than not
complying by “accident”. SOX specifies with intent and without intent (for
example it was a mistake) errors. The “with intent” and “without intent”
specifications become an issues for legal debate.
So comparing the definitions of fraud with the requirements of SOX would imply
that not complying with the various sections of SOX could be construed as a
fraudulent act.
As can be seen here sections 302 and 404 are the final exams. In addition, as
can be seen here are the implications of other SOX section violations other than
sections 302 and 404 and their substantial consequences.
All these and many more regulations are fine but the management of risk goes
far beyond and deeper than general management, laws, and regulations. In
order to have an adequate risk management risk environment it is necessary that
there be an inherent belief in the right way to do things. The right way to do
things simply means the actions to achieve objectives ethically, efficiently, and
effectively. This inherent belief must be part of the nature of all those involved
within the process at all levels and in all functions.
Note: the goal of risk management should be to ensure that everyone is working
with the same level of understanding of risk and controls; everyone is working
toward the achievement of the overall organizations goals and objectives; and
everyone understands the organization’s management of the risk appetite.
A term often used in today’s risk management environment is “tone at the top”.
However, this term by itself is not enough. There must be sincere tone at the
top.
Within any process, there is risk. Simply there is risk in making anything work.
With this in mind, it is necessary that some risk be accepted. If no risk was
willing to be accepted then nothing could get done. It is not a question of what
risk is being accepted but a question of understanding the risk that is being
accepted. This acceptance is called risk appetite or risk tolerance,
http://www.theiia.org/guidance/standards-and-practices/professional-practices-
framework/
Glossary of terms
Attribute Standards
1000. C1 - The nature of consulting services must be defined in the internal audit
charter.
1010 – Recognition of the Definition of Internal Auditing, the Code of Ethics, and
the Standards in the Internal Audit Charter
The mandatory nature of the Definition of Internal Auditing, the Code of Ethics,
and the Standards must be recognized in the internal audit charter. The chief
audit executive should discuss the Definition of Internal Auditing, the Code of
Ethics, and the Standards with senior management and the board.
The internal audit activity must be independent, and internal auditors must be
objective in performing their work.
Interpretation
Independence is the freedom from conditions that threaten the ability of the
internal audit activity to carry out internal audit responsibilities in an unbiased
manner. To achieve the degree of independence necessary to effectively carry
out the responsibilities of the internal audit activity, the chief audit executive has
direct and unrestricted access to senior management and the board. This can be
achieved through a dual-reporting relationship. Threats to independence must
be managed at the individual auditor, engagement, functional, and organizational
levels.
The chief audit executive must report to a level within the organization that allows
the internal audit activity to fulfill its responsibilities. The chief audit executive
must confirm to the board, at least annually, the organizational independence of
the internal audit activity.
1) Principles that are relevant to the profession and the practice of internal
auditing.
The Code of Ethics together with The Institute of Internal Auditors' Professional
Practices Framework and other relevant IIA pronouncements provide guidance
to internal auditors serving others. "Internal auditors" refers to IIA members,
recipients of / or candidates for IIA professional certifications, and those who
provide internal auditing services within the definition of internal auditing.
Internal auditors are expected to apply and uphold the following principles:
1. Integrity
The integrity of internal auditors establishes trust and thus provides the basis
for reliance on their judgment.
2. Objectivity
Internal auditors exhibit the highest level of professional objectivity in
gathering, evaluating, and communicating information about the activity or
process being examined. Internal auditors make a balanced assessment of
all the relevant circumstances and are not unduly influenced by their own
interests or by others in forming judgments.
3. Confidentiality
Internal auditors respect the value and ownership of information they receive
and do not disclose information without appropriate authority unless there is a
legal or professional obligation to do so.
4. Competency
Internal auditors apply the knowledge, skills, and experience needed in the
performance of internal audit services.
Rules of Conduct
1. Integrity
Internal auditors:
1.1. Shall perform their work with honesty, diligence, and responsibility.
1.2. Shall observe the law and make disclosures expected by the law and the
profession.
1.3. Shall not knowingly be a party to any illegal activity, or engage in acts that
are discreditable to the profession of internal auditing or to the organization.
1.4. Shall respect and contribute to the legitimate and ethical objectives of the
organization.
2. Objectivity
Internal auditors:
2.1. Shall not participate in any activity or relationship that may impair or be
presumed to impair their unbiased assessment. This participation includes those
activities or relationships that may be in conflict with the interests of the
organization.
2.2. Shall not accept anything that may impair or be presumed to impair their
professional judgment.
2.3. Shall disclose all material facts known to them that, if not disclosed, may
distort the reporting of activities under review.
3. Confidentiality
Internal auditors:
3.1. Shall be prudent in the use and protection of information acquired in the
course of their duties.
3.2. Shall not use information for any personal gain or in any manner that would
be contrary to the law or detrimental to the legitimate and ethical objectives of the
organization.
4. Competency
Internal auditors:
4.1. Shall engage only in those services for which they have the necessary
knowledge, skills, and experience.
4.2. Shall perform internal audit services in accordance with the International
Standards for the Professional Practice of Internal Auditing (Standards).
4.3. Shall continually improve their proficiency and the effectiveness and quality
of their services.
Which of the following are not excerpts from the professional practice guidelines
for internal auditors?
a. shall not accept anything that may impair or be presumed to impair their
professional judgment.
b. internal auditors make a balanced assessment of all the relevant
circumstances and are not unduly influenced by their own interests or
by others in forming judgments.
c. this participation includes those activities or relationships that may be
in conflict with the interests of the organization.
d. none of the above
Risk-Based Auditing
David McNamee was one of the primary authors of a research study performed
for and published by the Institute of Internal Auditors. Progressive internal audit
departments were studied to see if they were doing anything differently than
traditional internal auditing. The following graph compares and contrasts the
findings. There are a number of major changes in orientation reported, beginning
with the change from control-based to risk-based audits. The change in
focus is evident in the second item, the change in auditor orientation from
reactive, after-the-fact observers to coactive, real-time participants. As you
read through the other items think about how the new paradigm places internal
audit at a higher position in the organization – working on enterprise-wide
management programs and business processes. The focus has changed from
detail controls testing to covering significant business risks.
However, the foundation of a fraud event is ethics not fraud by itself. Ethics is
the underlining platform from which fraud is perpetrated in the first place.
However, ethics is not tangible. It is not something that can be held in one’s
hand, seen, felt, or even sensed in any other way. So what is ethics? If it cannot
be sensed, how can we determine if ethics or the lack of ethics is even present?
If the foundation or weakness in the foundation from which fraud may be initiated
is vague then how can it be determined if fraud even existed. It seems all left to
interpretation.
To compound all of this is the term ethical values. Ethical values are the
inherent believes of right and wrong within a person or group of persons.
Therefore, the word values must be the clue since the word values is the only
new word in the phrase. However, here we have another vague term, values.
Values are not tangible just like the concept or philosophy of ethics is not
tangible.
It seems that instead of two vague terms we now have a vague phrase. No
wonder there is fraud that just goes on and on. It seems that the underlying
foundation of right and wrong is just vague. So here we have it two non-tangible
words, a non-tangible phrase, and tangible humans. What a combination. An
added variable is that humans can and do adapt to the environment as the
environment changes around them. So maybe humans are non-tangible but are
vague as well.
The judicial system is full of individuals who say they have done nothing wrong,
their interpretation of ethics. Although their interpretation may not be an
accepted interpretation by general society it is none the less an interpretation.
From the readings, of experts, it can be concluded that ethical values, a vague
phrase, is developed within humans at an early age. This foundation of ethical
values is then managed within humans to conform to the accepted guidelines of
the environment and of society in which they live and operate. This concept also
is true of companies and the environment in which they operate.
Nevertheless, here is the problem. If the word ethics is vague and the phrase
“ethical values” is vague then the interpretation must also be vague. Therefore,
the interpretation of ethics within society must be vague as well. Now we begin
to see the root cause of questionable activities and its interpretation.
Taking this a step further what causes a human to vary within the elastic
boundaries of ethical interpretation? This is actually a simple question. It has to
be motivation of financial gain. However, is this always the case? Wait if we
consider that financial gain is not always the motivator that will or can cause
humans to misinterpret ethical values. We must reconsider greed and
entitlement.
If a person’s inner beliefs are that they recognize acceptable right and wrong and
abide by those beliefs but environmental situations change which can cause
changes in these fundamental beliefs then a person may deviate from personal
fundamental beliefs.
Based on this theory it could be said that ethical values are inherent within each
of us. Further that these ethical values are flexed by our own needs and external
forces. Further that our ethical values may not only be flexed by financial needs
and wants but as well by perceived and intangible needs and wants as well.
Ethics - A Definition:
Ethics (also known as moral philosophy) is a branch of philosophy that
addresses questions about morality — that is, concepts such as good
and evil; right and wrong; virtue and vice; justice; and other concepts.
Now that the definition of ethics and ethical values has been made perfectly
clear we can perceive from the definitions that what may be accepted in one
culture may not be accepted in another. So to go a step further what may be
accepted in one business environment may not be accepted in another.
Further whatever is accepted can change as the respective environment
changes. Therefore, the variation of the interpretation of ethics prevails as
needs, opportunity, entitlement, pressures, and greed change.
• What is ethics?
COSO along with other integrated control models including Enterprise Risk
Management (ERM) are some of the more contemporary tools that can be used
for this purpose.
The COSO model utilizes a combination of three control objectives and five
components. The three control objectives in the COSO literature were combined
from the five Institute of Internal Auditors control objectives.
Three control objectives: (from the original Institute of Internal Auditors control
objectives model)
• financial
• operational
• compliance
• control environment
• risk assessment
• control activities
• monitoring
• communications
An excellent resource for developing the tests and test questions in any of the
dimensions of COSO is: Control Model Implementation Best Practices, by
James Roth ISBN 0-89413-390X, available from the Institute of Internal Auditor
book store www.theiia.org. This book has hundreds of test steps and questions
already in the COSO format. The material in the book can be directly applied to
the COSO model.
After identifying the risk, measure and prioritize the identified risk. Measuring
and prioritizing can be combined in one process.
A good approach to any situation is to utilize the simplest approach and simplest
tools first then increase the complexity of the tools and approach, as the situation
deems necessary.
Putting this into perspective the probability is: how often something can
happen and the impact is what will happen when it happens.
The fourth step in the risk assessment process is to take action on the risk
identified, measured, and prioritized. Controls are the key to action. The
application of the right type and the right amount of controls applied at the
right time will help manage risk. However, keep in mind that it is highly
unlikely that all risk can be managed to zero all of the time.
Rule Of Thumb:
The More Volatile and Complex a Process is the Higher the Probability of
Risk.
The Internal Audit Department is often referred to as the “eyes and ears” of the
Board of Directors. It is incumbent upon the Internal Audit Department to give
these internal stakeholders as much information as possible about apparent and
impending risk within the organization.
It is therefore necessary that the Internal Auditors performs their duties with due
diligence that they are capable and able to perform this need. Internal Auditors
performing within the parameters of their professional standards and maintaining
a current awareness of changes to these standards is a must if they are to
perform their duties with professionalism and due diligence.
However, this is mutual. It is also incumbent upon management and the Board
of Directors to do their parts. These internal stakeholders, including the Audit
Committee, should be proactive with the Internal Audit Department.
Other internal stakeholders in a company are the employees at all levels - not
just management but the non-management employees as well. The
question is often asked who is responsible for the adequate administration
of controls within a company. The answer often given is management.
Well that is not true. The answer should be every employee. Every
employee within a company should be conscious and responsible for
controls and the achievement of objectives within their area of
responsibility. This goes back to common sense. In most companies, there
are more non-management employees than there are management employees.
So why would only a small percentage of employees be responsible for controls?
Therefore, all employees are internal stakeholders. They should all have a part
and a conscious understanding of what is needed to help the company that they
are employed in succeed.
Suppliers as well could exert some extensive influence. For example, suppliers
could hold up shipments of needed material for various reasons. Before
continuing, it is wise to consider that an organization uses various suppliers in
order to minimize the risk of one supplier’s total control (a preventive control).
In terms of stockholders, they may have some influence but it is mostly indirect.
If stockholders are not happy with the operations of the company, the stock price
would probably decrease. Stockholders and investors are concerned with factors
that could cause financial pressures to upper-level management and as well to
employees who may have invested in the company. These pressures could in
turn create collateral consequences even questionable acts.
The key to success with this communication is the sincere buy-in by all the
internal stakeholders. This means that posters, signs, speeches, written policies,
procedures, and such do not work by themselves. This means that upper-level
management must sincerely communicate and emulate the need for a common
mission and provide adequate training and direction to all levels of internal
stakeholders so that everyone can help move the company toward the common
goal.
The key with policies and procedures is do they work. Do the policies and
procedures help everyone work toward the overall objectives of the company or
organization? If not they need to be adjusted.
So the next question is how does an organization know if the policies and
procedures are working. The answer is with the implementation and
application of an effective monitoring control. An effective monitoring control
can detect when and if the application of existing policies and procedures are
decreasing in effectiveness. As this happens minor adjustments in the policies
and procedures can be made to move the organization to the efficient and
effective achievement of its objectives.
With the advent and implementation of the U.S. Foreign corrupt Practice Act and
the U.K. Bribery Act along with similar laws in other countries combined with the
interrelations in the international market place third party business relationships
have become extremely complex.
Some guidelines: the company should establish strict and specific policies and
procedures for the relationship with third-party vendors and supplies. These
policies and procedures should be coauthored by legal professionals as well as
management. All employees, internal stakeholders, and external stakeholders
should review them and agree to abide by them.
• one primary system or process employed consistently and uniformly for all
third-party relations
• an adequate and proactive due diligence of third-party entities which
should and must be free both from bias and from any real or perceived
conflict of interest
• management oversight, (monitoring) provided with proactive involvement
by upper-level management
• communications of the values and compliance with laws and regulations
agreed to by the third-party entities
• an agreement completed from the third-party entities of their agreement
and commitment
• finally does the organization reject the relationship with those third-party
entities who will not comply with the philosophy and culture of the
organization
17. Stakeholders in a company can take many forms. They can range from the
Board of Directors to every employee at any level within the company. External
stakeholders can be stockholders or other investors, customers, suppliers,
contractors, and others. Internal stakeholders consist of executives; upper-level,
middle-level, and lower-level management; and non-management employees. In
terms of ethics and the ethical tone, who should establish and monitor the ethical
tone for the external stakeholders and their relationship with the company?
Third-Party Relationships
Strategic risk. Strategic risk is the risk to earnings or capital arising from
adverse business decisions or improper implementation of appropriate
decisions. Strategic risk can exist when there is an aggressive effort to remain
competitive or boost earnings, or using third-party relationships without fully
performing due diligence reviews or implementing the appropriate risk
management infrastructure to oversee the third party relationship. Strategic risk
also arises if management does not possess adequate expertise and experience
to properly oversee the activities of the third party.
Reputation risk. Reputation risk is the risk to earnings or capital arising from
negative public opinion. Of all risks, this risk can probably be the most harmful
both in the long-term and short-term. Third-party relationships that do not meet
the expectations of customers or clients expose the company to reputation risk.
Poor service, disruption of service, inappropriate sales recommendations, and
violations of consumer law allowed by third party relationships can result in
litigation, loss of business or both.
This is particularly true when the third party's employees interact directly with
customers or clients and employ situations or actions are not consistent with the
policies and standards of the parent company. In addition, publicity about
adverse events surrounding the third parties may increase (reputational risk).
Compliance risk. Compliance risk is the risk to earnings or capital arising from
violations of laws, rules, or regulations, or from nonconformance with
internal policies and procedures or ethical standards. This risk exists when
products, services, or systems associated with the third-party relationship are not
properly reviewed for compliance, or when the third party's operations are not
consistent with law, ethical standards, and policies and procedures of the parent
company.
Transaction risk. Transaction risk is the risk to earnings or capital arising from
problems with service or product delivery. Transaction risk is evident in each
product or service offered by the third party on behalf of the parent company.
Transaction risk can increase when the products, services, delivery channels,
and processes that are designed or offered by a third party do not fit with the
parent company’s, customer demands, or strategic objectives. A third party's
inability to deliver, on behalf of the parent company, products and services,
whether arising from fraud, error, inadequate capacity, or technology failure,
exposes the parent company to transaction risk.
Credit risk. Credit risk is the risk to earnings or capital arising from an obligor's
failure to meet the terms of any contract with the bank or otherwise to
perform as agreed. Credit risk may arise under many third-party scenarios.
Third parties that market or originate products or services on behalf of the parent
company can increase credit risk if management does not exercise effective due
diligence over, and monitoring of, the third party activities. Third-party
arrangements can have substantial effects on the quality of receivables and other
credit performance indicators when the third party conducts account
management, customer service, or collection activities. Improper oversight of
third parties who solicit and refer customers can also result in substantial credit
risk. The credit risk for some of these third-party programs may reflect back to
the parent company.
Country risk. In addition, the parent company may be exposed to country risk
when dealing with a foreign-based service provider. Country risk is the risk that
economic, social, and political conditions and events in a foreign country
that will adversely affect the parent company’s financial interests.
Therefore, it can be seen that there are substantial opportunities of risk when
engaging with third party relationships. Going back to basics, the higher the risk
the more control should be employed. This includes the control of audit.
3. The We Make It For You company provides custom-made products and parts
on demand for a number of domestic and international companies. In general, the
parts are made to specification and then shipped to the ordering company for
inclusion in their final products. In terms of risk which of the following categories
of risk would or should most concern the We Make It for You company?
a. country risk
b. transaction risk
c. credit risk
d. reputation risk
Summary:
Risk and control management and the achievement of overall
objectives is the responsibility of everyone. However, in order
for this to be successful upper-level management and the Board
of Directors must recognize and manage the internal and
external risk as well establish a risk appetite (the amount of risk
that is willing to be accepted in order to achieve objectives).
Further, it is the responsibility of the Board of Directors and
management to effectively communicate and monitor this risk
philosophy and culture to everyone.
1.1 Which of the following best defines Answer 2 is the correct answer. Permeable
product or service differentiation? boundaries by definition are the boundaries
that separate one organization from another.
This differentiation could include price;
1. social entities or environment product or service characteristics; qualities;
and even customer service. The concept is
2. permeable boundaries simple, why would a customer purchase from
one organization or company instead of
another with similar products or services. In
3. goal-directed activities order to succeed it is important that a company
define and distinguish itself from the
4. specific objectives competition. Further companies must adapt to
the constantly changing environment.
1.2 Companies can be subdivided into two Answer 4 is the correct answer. Generally,
distinct categories. Which category requires there are two categories in which a business
the most innovative and proactive will operate. They are the open and closed
management. categories. The closed category means that a
company operates totally within its own
environment with no influence from any
1. closed
outside forces. This is an unlikely operating
situation in today’s world. An open category
2. internal risk subcategory means that a company operates in an
environment influenced by external forces.
These forces can be from suppliers, investors,
3. risk and control based category interest rates, economy, and regulations to
name a few. More likely in today’s world
4. open because of the changing world managers have
to adapt to these constant changes if they are
to succeed. Answers 2 & 3 are random words.
An open environment requires a proactive and
innovative management.
1.3 when upper-level management is Answer 4 is the correct answer. The other
establishing a cultural philosophy they must answers are nice common words but do not
understand and adjust for: apply to this question. The only answer that
may even warrant some consideration would
be answer 1. However, answer 1 is narrow
1. internal and external politics
only addressing the politics. Politics can be a
risk but only one risk. Answer 4 implies
2. internal controls multiple internal risks and external risks. It is
much better to understand the implications of
as many internal and external risks as possible
3. feedback when developing a cultural philosophy.
1.4 Generally within any organization there are Answer 2 is the correct answer. A point of
multiple levels of management: upper, high, confusion could be that lower-level
middle and lower. Where the upper levels management is responsible for the day-to-day
address more conceptual issues, the lower operations. This includes that they are
levels are more responsible for day to day responsible for the implementation of the
hands on operations. Which level of company ethical philosophy. This may be true
management is responsible for the to a degree. However, it is upper-level
implementation and effectiveness of an ethical management who will establish, communicate,
culture? and monitor the effectiveness of the ethical
culture that they establish. The responsibility
rests with upper-level management. Even
1. lower
though other levels of management may help
with the implementation, the higher levels of
2. upper management are responsible.
3. high
4. middle
1.5 Communication is often a challenge among Answer 4 is the correct answer. All of these
people. What may be understood in one answers would help minimize the noise in the
communication effort may not be in another. communication channel. A simple approach is
Basic components in the communication effort to know your audience. That in this case is the
that may cause a communication effort to receivers of the message. Monitoring for
succeed or fail could include bias, politics, effectiveness is very important. Monitoring
personalities, preconceived opinions, and even can determine quickly if the message is being
the time of day. All of these and others are distorted and hence a correction can be made.
called noise in the communication channel.
What would be the best way to minimize this
noise when communicating an ethical policy
from upper-level management to the
employees?
1.6 What type of goals define what to Answer 2 is the correct answer. This is an
accomplish with a definitive outcome? exact definition question. The question is the
definition of operative goals. The other
answers are valid terms but not the answer to
1. organizational goals this question.
2. operative goals
3. corporate goals
4. accounting goals
1.7 The amount of risk that a person or Answer 2 is the correct answer. This is an
organization is willing to accept can best be exact definition question. The definition of risk
defined as: appetite is in the question itself.
1. risk tolerance
2. risk appetite
3. acceptable risk
4. residual risk
1.8 In terms of what to accomplish which of Answer 2 is the correct answer. The order of
the following is most specific in scope? specificity is: 1) mission, with the broadest
scope, 2) objectives with a little more detail,
and 3) goals which are generally very specific
1. mission statement
describing how to get it done (details). The
acronym SMART is associated with goals.
2. goal statement That is specific, measurable, accomplishable,
results-orientated, and time-bound (when it will
be accomplished).
3. objective statement
1.9 Goal statements are specific in terms of Answer 4 is the correct answer. This is a
what to accomplished, how to accomplish it, definition question. The two answers to
and when to accomplish it. However to consider here are tactical planning and
actually accomplish the mission it is necessary strategic planning. These are specific
to indentify the day-to-day operations of the subcategories of goal accomplishment. In
specifics for accomplishment. Which of the pure definition terms, tactical planning is
following subcategory would generally help generally for one year or less. Strategic
with the accomplishments of two years or planning is for one year or more. Although in
more? business these times may be more of less by a
little amount. However, strategic planning is a
longer future view of planning
1. tactical planning
accomplishment.
4. strategic planning
1.10 The basic functions of management are: Answer 2 is the correct answer. This is an
exact definition answer. Planning, organizing,
staffing, directing, and controlling (POSDC) are
1. planning, organizing, authority, the basic functions of management.
responsibility, controlling
1.11 The complexity of business in today’s Answer 1 is the correct answer. Section 11 of
environment requires the implementation of Sarbanes-Oxley addresses corporate fraud and
specific rules and regulations by which accountability. This section and other sections
companies must operate. Which of the of Sarbanes-Oxley hold executives and
following includes a very specific section for management responsible for wrongful acts and
corporate fraud and accountability? retaliation against informants. This law holds
those in top-level management accountable to
make certain that the tone and appropriate
1. Sarbanes-Oxley
culture is communicated downward
throughout the organization and is working.
2. the Foreign Corrupt Practice Act
1.12 The Public Company Accounting Answer 4 is the correct answer. The Public
Oversight Board supplemented The Sarbanes- Company Accounting Oversight Board
Oxley law. In order to manage the adequacy of encourages the use of integrated control
risk and controls this Board encourages the frameworks to analyze the adequacy or risk
use of: and control management. At the time this
literature was compiled from this Board COSO
an integrated control model was already in
1. an annual risk assessment
existence so COSO was recommended in the
literature. Since then The Enterprise Risk
2. a reporting mechanism to report to the Management (ERM) model was developed.
internal auditors ERM is an expanded version of COSO. ERM is
now also an applicable tool for this Board of
Director’s recommendations.
3. a methodology to analyze and compile an
integrated risk assessment
1.13 Ethical beliefs are the inner beliefs of Answer 4 is the correct answer. All of these
humans to recognize right and wrong forces could change or impact an individual’s
acceptable within the environment and society inner ethical values and beliefs. Further all of
in which they live. What forces could have an answers 1, 2 & 3 can change frequently.
impact on an individual’s inner ethical beliefs? Therefore, the ethical values and culture must
be constantly monitored to make sure that the
accepted ethical values and culture are not
1. internal forces
compromised by any of these forces.
3. external forces
1.14 Risk assessment involves identifying the Answer 2 is the correct answer. This is a major
risk, measuring the risk, prioritizing the risk, issue with those accepting risk. In many cases
and acting on the risk as necessary. However those accepting risk just do not understand
even with all this, some risk must be accepted. what can happen if the risk is not addressed
Which of the following is the most significant adequately. The remaining answers are not
problem with accepting risk? relevant to this question and probably not
relevant to business as well.
1. the risk is so complex that it cannot be
identified therefore risk must be accepted
1.15 Boards of Directors are considered Answer 4 is the correct answer. All of these
internal stakeholders. Especially in light of the answers are appropriate for a Board of
many recent laws and regulations, they are Directors to ask their management.
held specifically accountable for their actions
and the company actions. Which of the
following questions should these stakeholders
be asking of their management?
1.16 A good control when dealing with Answer 1 is the correct answer. This is the
external stakeholders (suppliers) is: best control from the answer choices.
Answers 2 & 3 are more or less random
thoughts. Although they might be controls to
1. have multiple suppliers who can provide
consider, they are not better than answer 1.
the same or compatible products or Answer 4 requires caution and can be a red
services flag of questionable activity (conflict of
interest) and other concerns. Generally, sole
2. make sure that the contract with the source suppliers should only be used as a last
suppliers is exact with no options that can resort. Company legal advice is very
impact the company they supply appropriate when working with sole source
suppliers.
3. make sure the supplier is physically close
to the company they supply to minimize
transportation costs
1.17 Which of the following are some of the Answer 4 is the correct answer. Every one of
ways that third party relations with suppliers these answers can impact a company.
and vendors can impact a company? Therefore, it is important that a company make
sure that the third party is aware of the
company culture and philosophy related to
1. reputation risk
ethics; risk and control culture; and
management. Further, make certain that
2. compliance risk compliance with this culture will be monitored
and adjusted as needed.
3. transaction risk
1.18 What are two risks of which a company Answer 4 is the correct answer and best
should be concerned when dealing with third answer. A company must be concerned with
party vendors or suppliers? all of the risks in the answers when dealing
with third party vendors and suppliers. Any
and all combinations of these risks occurring
1. country risk and reputation risk
can have a negative impact on the company.
The company must monitor and make sure
2. transaction risk and credit risk these risks are controlled.
DOMAIN II:
PRINCIPLES OF RISK
MANAGEMENT
PROCESSES
The objective of this module is to better prepare the participant to pass the
Certification in Risk Management Assurance Exam by discussing and
analyzing the technical dimensions of this domain while discussing
techniques to best manage multiple-choice questions.
Establishing Objectives
Back to basics: These are the three basic elements of business objectives, risks,
and controls which should be addressed in that order. The very first element and
the foundation necessary to be able to address the implementation and
adequacy of risk management is an objective. Any process, physical task, or
human effort must have an objective, a clear focus of what is trying to be
accomplished.
Generally, the amount of detail to accomplish the objectives increases with the
definition of goals. However, no matter if the mission, objectives, or goals are
being discussed it is necessary that a clear focus of what to try to accomplish is
in mind.
Below are the criteria, most often associated with the definition of goals.
However, they can be utilized for establishing adequate objectives as well:
To perform a benchmark:
The definition of residual risk is the risk that remains after management
responses to risk. So residual risk by definition is after specific risks have been
determined by whatever means then appropriate and adequate controls have
been applied. However, even after the appropriate and adequate controls have
been applied some risk still remains (residual risk). Remember it is nearly
impossible to protect against all possible risk in every situation all of the time.
The more complex and volatile that a process is the more likely there will
be some remaining risk. Also the environment may change after the controls
have been put in place, hence remaining risk.
This is a good place to mention the two types of apparent risk. They are
internal and external risks. Internal risks are risks apparent within the process.
For example, inadequate training of new staff, inadequate security locks.
External risks are external to the process such as weather, changes in laws, and
changes to regulations.
More definitions:
Control risk: This is the apparent risk when applied controls failed to reduce
risk to an acceptable level. So if controls did not stop the risk, then there could
be residual risk.
Audit risk: This simply means that audit reached wrong conclusions and
someone relied on those wrong conclusions. Hence, decisions were made
based on those wrong conclusions, which instead of adding controls to minimize
risk may have actually added risk and slowed the achievement of objectives.
What is next?
All these definitions are nice but something needs to be done to make the risk
and control management work.
The first step. There are four necessary steps in risk management. In this
order they are: IDENTIFY, MEASURE, PRIORITIZE, AND ACT. So no matter
what definitions are used these four steps must be conducted in this order.
Therefore, in simple language you have to know risk when you see it. Then that
risk must be measured by some acceptable means such as quantification like
alphanumerical criteria. Then these alphanumeric criteria should be prioritized,
generally but not always, by the most significant issues first. Then action should
be taken, (this means applying the proper controls, at the right time, in the
right amount) to the risk.
The next step. One technique that has been useful in identifying measuring and
prioritizing risk is risk mapping. There are a number of risk mapping formats.
Sometimes called a risk map or heat map this tool helps identify the relationship
between the probability and the impact of a potential risk. Because of the many
variations, it is important to understand the objective and the audience when
developing a risk map.
NOTE: A few areas of caution with the risk map. First high, medium and low can
mean different things to different people. Therefore, it is important to quantify
the specifics of what high, medium, and low mean. Next, process owners
could fall into the trap of only considering high impact risk. A consideration
is that a risk with a low impact but frequent occurrence (high probability) could be
a higher overall risk than a risk with a high impact that does not occur often. The
risk map, in pictorial form, helps minimize the possibility of falling into this trap.
Another simple tool used to conduct a risk assessment is the absolute risk
assessment model. In this case a column table is developed. Using a
spreadsheet is a good example. The first column contains the identified risk, the
next column contains the probability, the next column contains impact, and the
next column contains the time. When the factors in all of the columns are
populated and multiplied the result, which considered all of these three
elements, will indicate a measured and prioritized relationship of the
identified risk.
Risk assessment tools such as risk maps and the absolute risk model help
identify risk but focus primarily on measuring and prioritizing risk to be acted
upon by the process owners. So referring back to the definitions of the types of
risk, inherent risk is the risk absent of any controls. Residual risk is the risk after
management’s response to risk.
These tools help focus (identify, measure, and prioritize) on the risk on which
management WILL need to act. So the acting on risk, applying controls, has not
taken place while these tools are being developed. The application of controls
will not take place until after the risk assessment tools have depicted the
risk issues.
To put it into context there are three stages of risk assessment: IDENTIFY,
MEASURE, PRIORITIZE. Risk assessment tools are just that they help assess
risk. Risk assessment tools are used in the identification, measurement, and
prioritization of the stages of risk assessment, before any controls are put in to
place.
Now that the risk has been identified, measured, and prioritized adequate
controls should be applied to manage the risk Identified, measured, and
prioritized, ACT (risk management). There are a number of ways to approach
this risk management. These ways are control the risk with appropriate and
adequate controls; share the risk; or accept the risk. Just a note, controlling the
risk is straight forward. However, accepting the risk and sharing the risk can
raise some concerns. The question becomes do the individuals who are sharing
or accepting the risk really understand what they are sharing or accepting.
Summary
Risk is a concept that managers use to express their concerns about the probable
effects of an uncertain environment. Because the future cannot be predicted with
certainty, managers have to consider a range of possible events that could take
place. Each of these events could have a material effect on the enterprise and its
objectives.
• the objectives of the activity being reviewed and the means by which that
activity is controlled
• the significance of risks to the activity and the means by which the risk is
kept to an acceptable level
When planning an audit engagement for parties outside the organization, internal
auditors must establish a written understanding with those clients about the
objectives, scope, respective responsibilities, and other expectations including
restrictions on the distribution of the results of the engagement and access to
engagement records.
o assets at risk
o type of threat
o time
o effectiveness of controls
Exposure is the total value at risk without regard to the probability for a
negative event.
Types of Risk
Although all risks are generally referred to just “that risk” in many real business
situations it is appropriate to categorize risks into specific groups. For example,
specific definitions are not only useful for test-taking purposes but can be useful
when trying to focus on a specific remedy for identified risk.
Strategic risk results from all employees not working together in harmony
toward the common goals and objectives of the organization in a timely and
efficient effort.
Financial risks are a result of the cash flow relationship between receivables
(including cash) and payables. In other words financial risk is the organization
receiving more than it is incurring in expenses (making a profit). Alternatively, an
organization has more expenses than income (incurring a loss). An additional
question becomes how long an organization can sustain a loss. An added area
of financial risk is an organization’s ability to obtain or satisfy debt. Appendix 2
lists and discusses in more depth “Financial Ratios Useful in Risk
Management”.
Internet technology risk is the inappropriate use of the internet and company
intranet capabilities.
Outsourcing risk results from the outsourced vendor provides inferior quality
products or services. This results in increased negative reputation to both the
outsourced vendor as well as the organization doing the outsourcing.
Marketing or sales risk is simply the risk of appropriately and adequately selling
the organizations goods and services. In relationship as this risk increases
revenues decrease as impacting financial risk.
• probability of failure
• location
• people
• money
• assets
• intellectual property
• future
See Application Questions, Answers & Explanations module for the answer.
In order to complete a risk assessment and manage that risk it is first necessary
to identify the risk. Next, the risk must be measured. After this, the risk must
be prioritized. Finally, action (risk management) must be taken in order to
eliminate or minimize the risk (controls). Remember that it is probably not likely
that all risk will be eliminated completely no matter what controls are put into
place. This is because some controls may fail, outlive their life usefulness, some
risk may be accepted by the process owners, or be circumvented by intent.
External Risks
External risks are the impacts of risk occurrence that that are not in the direct
control of business process owners. However the business process owners
must be aware of these external risks and manage them. These external risks
can have significant impact on the achievement of objectives.
• regulation changes
• weather
• unions
• technology changes
• impacts of competition
• overall economics
• international risk
• political risk
One of the more basic ways to manage risk is to avoid the risk altogether. This
simply means that if a risk is identified avoid any exposure to that risk. A simple
example of this would be if a possibility of dangerous driving conditions were
identified (risk) not driving would be (risk avoidance). In business not making a
substantial investment when an apparent risk of loss of assets in that investment
was identified is avoiding the risk altogether.
Another approach to managing risk is by controlling the actual risk. This simply
means that some risk was identified and is realized as part of the process. The risk
is just there. To manage this risk the process owner would (realizing the risk)
establish and employ appropriate controls at the right time in the appropriate
amount. Relating to a practical example, if a homeowner lived in an area that
experienced frequent and extensive power outages and it is necessary that the
homeowner have constant power, possibly for medical needs, a backup power
system may be appropriate (a control). However, the cost of the backup power
system (a control to manage the loss of power risk) must be weighed against the
willingness to accept the loss of power risk. Another consideration could be
considering the cost of a backup power system as compared to moving to a hotel
that had power (another control to manage the risk of loss of power).
An example of this could be that at some point in the past it was necessary to
have multiple levels of security (including guards) and other security devices
securing the assets in a building. The cost of these security controls is and was
expensive. In the past, they were appropriate. However today there are no
assets in the building but the security devices and guards are still protecting the
empty building. In this case, not only are these controls no longer effective but
also the extensive cost of these security controls are actually counterproductive.
There is a cost of a control that is no longer needed (the risk is no longer
apparent).
Probably approaching the identification of risk using the old adage keep it simple
may be the best approach. However, it is necessary to remember that in today’s
process environment the complexity of processes and the ever-changing
environment in which they operate can add complications and intimidation to the
risk identification process. Following this, it is virtually impossible for any one
person or group of persons to understand all of the variations and possibilities of
risk in today’s complex business environments. Therefore, it is necessary to rely
on as many sources and inputs as possible to help identify apparent risk.
So what sources can be utilized? Well first history, remember that what has
happened in the past may very well happen in the future. Realizing that
technology and the worldly environment change so rapidly some judgment and
common sense may need to be applied when gauging past events to current
events and the probability of future events occurring.
Another way to identify risk is to work backwards. This means start with the
controls or basic controls and ask how well are the control categories working.
Remember that the less controls work the more risk increases.
These are some common control objectives originated in an early version of the
Institute of Internal Auditor Standards. These control objectives not only are a
reference to internal audit but are an excellent framework for business process
owners as well.
• Safeguarding assets
Using the backward approach for risk identification address each of these control
objectives and determine any weakness in each control objective. Weakness in
one or more parts of these control objectives may result in risk. The amount of
risk is inversely proportional to the amount of weakness in each category. For
example if it was determined that there was a weakness in the security of assets
control (there are some security controls in place but not the amount of controls
to optimize the management of risk) the amount of risk that was determined as
not controlled should require a decision to accept or control.
10. There are four basic tasks necessary when conducting a risk management
exercise. These tasks are: identify the risk, measure the risk, prioritize the risk,
and act on the risk. Which of the following would not be considered part of the
act task?
a. share
b. avoid
c. prioritize
d. accept
See Application Questions, Answers & Explanations module for the answer.
Summary
The key word when dealing with risk analysis is “estimating”. Risk analysis is not
a science nor is it a one-time process. The business changes and as it does
necessary adjustments must be made to accommodate to the new business
environment.
Reminder: The Efforts and Costs to Control Risks should be Compatible with the
Cost and Impact of the Risks - Except In Extraordinary Circumstances.
Which one of these approaches is most appropriate depends upon the situation
and the timing of the process being analyzed.
Probabilistic Risk
In terms of controls preventive controls are probably the best way to manage
outsourced risk. Such controls as: background checks, references, financial
checks, and the establishment of contracts are some wise approaches for these
preventive controls. Further legal advice is very appropriate when establishing a
relationship with outsourced activities. Do not hesitate to consult legal
professionals.
Contracts can vary in detail and specificity. However, contracts should be designed
with a detail understanding of the relationship and the risks that will be apparent
specific to each outsourced relationship. Some typical inclusions in outsourced
contracts may be: right to audit clauses and penalties for non-compliance, for
example penalties imposed when the quality of services, product, or deadlines are
not reached. In some cases, incentives for exceeding quality expectations or
deadlines may even be appropriate.
Remember that the contract and the amount of detail contained in the contract is a
control. Therefore, this complexity and detail should be guided by the opportunity
for risk with the outsourced activity. Get legal advice.
It is wise that the internal audit partner with the legal professionals and the process
owners consult when the process owners are engaging in outsourced activities.
The internal audit professionals bring a perspective of risk and control management
to the project. The legal professionals bring a legal perspective and the process
owners an operations perspective.
Objective, historical, and calculated risks can be easily measured for use in a
quantitative risk model. Subjective risk factors are not as easily measured. Here
are two approaches, which are generally used in this order to minimize the bias that
comes with subjective risk assessment.
1. Intuition
Studies have shown that experienced risk and control experts can use intuition
to arrive at reasonable estimates of risk that cannot be measured accurately
from mathematical risk formulas. This type of measurement should be done on-
site where the full range of influence (observations, interviews, and analysis)
can be understood.
The Delphi Technique and other group decision tools, such as Control / Risk
Self-Assessment are useful in pooling the experience and intuition of a larger
group of subject matter experts. With these tools consensus about the issues
and corrective action is based on expertise from the perspectives of several
subject matter experts. These consensus techniques help to minimize
measurement bias (because of debate) by canceling out personal bias.
• each panelist privately ranks the items and weighs the risks for each of
the items on the list
• the coordinator gives a copy of the composite listing and the individual
listings back to the respective experts
• the experts compare their own lists with the composite list and may make
adjustments to their lists in light of the group's judgment
• repeat the steps until consensus is reached (this will usually happen in a
few rounds)
The following diagram outlines the risk management approach and the
interrelationships among the various components involved.
• dollars at risk
Risk Terms
Risk is a concept. It is a measure of uncertainty (probabilities). In business
processes the uncertainty involves the achievement or the barriers to achieve
organizational objectives. Risk may have positive or negative consequences.
Generally, positive consequences are known as opportunities and negative
consequences are called threats or risks.
Threat is a combination of the risk, the consequence of that risk, and the likelihood
that the negative event will take place. The type of threat is actually an expression
of the type of consequence such as fire, flood, error, omission, delay, fraud,
breakdown, and obsolescence. Threats are always present; controls keep them in
check (as long as the controls are effective).
The duration of the consequence affects its severity. This can be well described
with an example of a computer center. Most computer center managers will tell
you, if the computer is down for an hour, that's one consequence. However, if the
computer is down for a day that's another, and if it is down for a week that is
another and much more severe!
Finally, risk also can be referred to as "High", "Medium", or "Low." Taken literally,
that would mean that the probability of occurrence was respectively great, average,
or remote. A caution when using these types of terms: These terms can
mean different things to different people or organizations. It is important when
using such terms that specifics (such as quantifications) be attached to these
generic words.
Summary:
• the management of risk follows the assessment of risk, just like treatment
follows diagnosis. To manage risk is the essence of good management.
Risk Analysis
15. Objectives are a very important element for the success of any process.
Which of the following would most likely be the root cause when the
consequences of risk among and within various processes are not adequately
considered?
See Application Questions, Answers & Explanations module for the answer.
Summary
Time is how long is an asset out of service and when did it go out of service?
Two things to consider: When it happened and how long did it continue.
Time may be considered in risk evaluations. Ask the question, “Is the risk time
sensitive”. The answer will help make a determination of whether time should be
included in specific risk formulas and evaluations.
Of the two elements of a risk assessment the process, the formula approach, and
the subjective approach the subjectivity approach is probably the most important.
• Total Risk = IR x CR x AR
• IR = inherent risk
• CR = control risk
• AR = audit risk
• ALE = P x T x I
• P = probability
• T = time
• I = impact
Modified ALE
• ALE = P x P x Q
• P = probability of threat
Absolute Ranking
• identified / measured
Relative Ranking
• identified / measured
TRAP: words like the following can mean different things to different
people
• high
• Medium
• Low
Matrix Ranking
The matrices are used to measure risks and consequences of the business unit.
• high
• medium
• low
Once the quantification has been established then each risk can be prioritized in
order of importance. Again this should be done by interpreting the quantifications
and again applying objective subjective input.
Traps
The evidence developed in the risk and control assessment process can be an
effective guide for the appropriate application of risk identification, risk
management, risk prioritization, and the application of appropriate controls.
The word evidence is often mistakenly associated only with fraudulent activity.
This is not true.
The objective of evidence is to give proof of the truth or belief in an issue. In
terms of risk assessment, (identification, measurement, and prioritization)
evidence supports the belief of the significance (probability and impact)
consequences of risk.
Evidence is appropriate in a risk assessment process to help encourage those
involved to believe in the risk issues. Hence, it is more likely that the appropriate
corrective action (applications of controls) will be employed. Evidence also
facilitates a formal documentation of the risk and / or the controls to manage the
risk event.
Types of evidence
Best evidence: Primary evidence is generally original documents. This is the
strongest form of evidence. It is also the most difficult to dispute. However, be
careful of what is considered primary evidence. What may appear to be primary
on the surface may not be. It is important to validate the source if there are any
questions of authenticity.
Secondary evidence is not as solid as primary evidence. These are often
copies of original documents. Copies can be altered which diminish their
strength as evidence.
Direct evidence proves a fact without the necessity to use presumptions or
inferences. An example is direct testimony from a witness who has observed an
event.
Circumstantial evidence does not directly prove the existence of a fact. It does
give an inference that a fact exists. Circumstantial evidence by itself should not
be used to establish a fact.
Conclusive evidence is very strong evidence. By itself, it establishes a
condition or fact. Conclusive evidence is stronger than all other types of
evidence. Only one reasonable conclusion can be drawn from conclusive
evidence.
Corroborative evidence is evidence of a different character that when combined
with other evidence will establish the fact.
Opinion evidence is often used by expert witnesses. Evidence should establish
a fact. Opinion evidence is, as it says, the opinion of the person providing the
information. Even though experts often provide opinion evidence, the opinion of
every human being will differ. Opinion evidence is often used to clarify a point for
individuals less familiar with the topic.
Hearsay evidence is second-hand evidence. Hearsay evidence is made by
someone other than the person who directly witnessed the event. This should
not be taken by itself as the sole evidence to support a fact. However, hearsay
can be used as an indicator to prompt further investigation.
Physical evidence is obtained through observation, photographs, charts,
graphs, or other physical representations. A witness in the observation process
can further substantiate the physical evidence. This can help eliminate
controversy about the representation of the physical evidence.
Testimonial evidence is in the form of letters, statements, or notes in response
to inquiries or interviews.
Documentary evidence is documentation received by request. They are
documents related to the process being examined. Some examples include logs,
absence records, error reports, and packing lists.
Analytical evidence is evidence which results from such events as analysis,
recalculation, and verification.
The COSO independent commission summoned input from various business and
government professionals. Their purpose was to develop a standardized risk
and control framework which could be applied to any business or process.
In addition to providing a standard for risk and control management, which had
been inconsistent to this point among businesses and government entities, this
framework would introduce a new concept in risk and control management.
Incorporated in the framework was integration. This meant that risk and
controls would now be evaluated across and vertically in multiple entities of an
organization.
With COSO risks and controls would now be evaluated in a holistic view of
an entire organization including how various entities synergized or did not
synergize for a common objective.
It was realized that the root cause for inadequacies in the hard controls actually
resided in the adequacy or inadequacy of the soft controls. A new component of
risk and control management was also introduced with the advent of COSO.
COSO encourages a sincere evaluation of the soft controls and issues.
Traditionally risk and control professionals evaluated the more tangible controls
(the hard controls). The evaluation of these soft controls generally was a new
concept to traditional risk and control and business professionals. Assessment
of these soft controls now would require professionals to evaluate such things as
morale, ethical values, attitude, management philosophy, and employee
competency.
With the advent of this first integrated control model other organizations began to
develop subsequent and more specific control models focused on individual
process needs. Also as with most new developments, these subsequent models
incorporated enhancements to COSO.
The next model introduced was Criteria of Control Committee (risk management
and corporate governance) (CoCo) developed by The Canadian Institute of
Charted Accountants. This model incorporated a feedback loop that was a major
improvement over the original COSO model.
The ERM model, again, developed as a reaction to risk and control issues in
business and government, incorporated enhancements above all existing
models. One of the major enhancements of ERM is the specific requirement to
analyze strategy. As such, an analysis of strategic planning is required to
complete an ERM analysis.
Just a note: Strategic planning not only facilitates a view of the future by asking
what if this situation would happen what would we do, but also helps evaluate
external risk. External risk and strategic planning are synonymous.
Parallel to the implementation for these control models were a number of other
tools to help better manage risk and controls. These included the Public
Company Accounting Oversight Board (PCOAB), Sarbanes Oxley (SOX), a
number of quality analysis models such as Malcolm Baldridge, the International
Standards Organization ISO series and Basel III (the most recent model in this
category) which focuses on and strengthens prior versions of Basel financial and
banking regulations and applications.
A legal perspective, with the exception of the United States Foreign Corrupt
Practice Act (FCPA), Sarbanes Oxley (SOX), and the various international
bribery acts, the integrated control frameworks including ISO 31000 and
Basel III are only recommendations not legal requirements.
• objective
• risk
• controls
The Risk is The Barrier that Will Stop the Accomplishment of the Objective.
The Controls Are What Will Remove Or Diminish The Risk Barriers.
• objective
• monitoring
• adjustment (verb)
The noun and the verb elements are both required in an effective control system.
A noun is a more tangible control like a report, a policy and procedure, or job aid.
The verb is the softer issue. For example, how well the noun works. Does the
report work? Do the workers understand the importance of the report?
The verb is the action part of controls which facilitates the noun
functioning as it is intended.
When The Controls Are Not Helping to Achieve the Objective, Eliminate or
Change Them.
Controls are a way to manage risk. However, the word “controls” has a number
connotations and applications. The word control comes from the Latin word
contra. Contra means against. By more contemporary definitions, the word
control means to hold back, constrain, or tie down. In terms of accounting or
auditing the word control means something that will fix or manage risk, (in simple
terms).
Just like the varied definitions of controls, in the context of audit and accounting,
the word controls has varied applications. A primary application consideration is
where in a process controls should be applied. Consider the three applications
of controls: preventive, detective, and corrective. The application of controls is
best served in a preventive application. However, it is important to remember
that even though preventive controls are put into place detective and corrective
controls are still very much needed. Detective and corrective controls should be
used to monitor and adjust for inadequacies in the effectiveness and efficiency of
preventive controls.
Preventing problems has greater benefits both in the long-term and short-
term.
The next question is who is responsible for the application of the preventive,
detective, and corrective controls? To answer this question, consider who owns
objectives, who owns risk, and who should own the controls to manage
objectives and risk.
The Cost of Controls Should Approximate The Cost of The Risk They Are
Controlling!
No process owner would say that the audit department should set their
objectives. Therefore, if objectives, risks, and controls work together, why
would a process owner say that someone else should develop and manage
their controls?
COSO
COSO like many other risk and control models was developed in a reactionary
mode. It was engineered and developed to address weaknesses in business
and government.
COSO has three control objectives and five components. The five components
are applied to each of the three control objectives for a total of 15 dimensions.
For COSO to succeed, it needs to be addressed as a way of doing business not
just more work. It should not be built onto the process; it should be built
into the process.
As an integrated control framework, COSO will help process owners and auditors
evaluate the adequacy of controls in multiple dimensions (integrated model) of a
process. COSO will help give a picture of how well all of the controls in all of
the dimensions are working together.
It is Better to Anticipate and Prevent Issues than to Manage them After the
Fact.
Note: Of special concern are various international laws addressing fraud and
bribery not only within their geographic boundaries but companies or individuals
doing business within their boundaries from outside their boundaries. An
example is the U.K. Bribery Act which has a near-universal jurisdiction, allowing
for the prosecution of an individual or company with links to the United Kingdom,
regardless of where the crime occurred. This Act is described as "the toughest
anti-corruption legislation in the world". These types of laws impose severe
penalties for those violating the law and as well in various ways look to inhibit
such violations by strengthening controls.
COSO:
• can help educate management and employees about risk and control
techniques
Getting to the root cause of a risk or problem requires some additional comment.
A major benefit can be realized whenever it is possible to get to the root cause of
a risk or exposure and fix it.
One simple method of getting to the root cause is simply asking a series of
“whys”. For example, when a risk is identified ask why is that, then ask why
again, then ask why again until asking “why” reveals the same answer
repeatedly. Most likely when the why question reveals the same answer over
and over the root cause has been uncovered. Now this technique is not foolproof
but generally will give a good indication of the root cause based on the opinions
of those being asked why.
There is no magic number in the number of whys that should be asked. Some
say five whys others say seven whys. Probably the best answer is not some
specific number but the appropriate number of whys that is necessary to get to
the root cause.
Most often, the root cause of process problems reside in the attitudes, morale,
ethical values, and competency and understanding of policies of people. In the
COSO model, these soft elements reside in the Control Environment component.
COSO encourages addressing the adequacy of the control system within the
Control Environment (the softer issues).
• can be most effective when it is used in concert with other and existing
tools.
• operations
32. The COSO integrated control model incorporates five components and three
control objectives. These 15 dimensions of a process allow for developing an
analysis of the process. Which of the following dimensions describes an
understanding of a Code of Ethics or Code of Conduct document?
The core of any business is its people with their individual attributes including
integrity, ethical values, competence, and the environment in which they operate.
These are the key components of a business and the foundation on which
everything rests.
The tone at the top of an organization defines the cultural and ethical values of
an organization. If top level professionals do not support the new techniques
professionals at the lower levels of an organization will not either. Higher levels
of support for COSO increase the probability that it will be used successfully.
The objective is to get everyone involved. This may take both some bottom-up
and top-down involvement.
A business must be aware of and deal with the risks it faces. It must set
objectives integrated with sales, production, marketing, financial, and other
activities to ensure the organization is operating in concert. A business must
also establish mechanisms to identify, analyze, and manage the related risks.
Risk assessment should encompass the entire business. It should be an on-
going process and not become unchangeable.
As the business changes, risk assessment must change and be modified to meet
the new exposures of the business and processes.
Risk assessment can also be used as a tool to help improve a process from
clients’ perspective. Our clients may not be able to understand how to recognize,
evaluate, and protect against business risk.
Using anything different from the traditional methods of risk and control
management may require some planning and convincing. Using COSO
may be a change from the traditional approach. Therefore, some planning
and convincing may be necessary to convince process owners that COSO
and other integrated control models may be good process management
tools.
Component 4 – Monitoring
The entire process must be monitored and modified as necessary. In this way,
the system can react dynamically, changing as conditions warrant. This is critical
to the success of the operation. No matter how well the control structure is
established if not monitored and addressed it will not be effective.
Process owners need to know if they are staying on the course and are meeting
their objectives. They need to know when the course has changed and need to
be able to change directions to meet the new objectives.
Surrounding these control activities and the entire business process are
information and communication systems. Information and communications
enable the process to capture and exchange the information needed to conduct,
manage, and control the operations. Communications should be in all directions.
Communications should be sufficient to provide adequate and appropriate
information to those who need to be informed.
There were five control objectives identified in an early version of the IIA
Standards. They were and still are a good foundation for sound business
practices. In COSO, the five IIA control objectives were combined into three
control objectives.
When utilizing an integrated control framework like COSO to address risk and
control issues mix, match, and combine the COSO elements to fit specific needs.
However COSO does recommend reviewing all 15 dimensions. The fifteen
dimensions are the five components applied to each of the COSO three control
objectives. The ultimate objective is not to miss any dimension of a process in
the evaluation of that process.
Control 4
Environment
Risk Assessment 1
Control Activities 2
Monitoring 5
Communications 3
As can be seen from the matrix there are 15 dimensions in the COSO model.
Using the code 1- 5 as an example, the first step would be to determine what the
risk of not complying is. From this step 2 would be to prepare adequate
documentation outlining the compliance procedures (control activities and
physical documentations controls). Next step 3 would be to communicate (via
training, memos, meetings, etc.) the requirements for the written procedures.
Step 4 would be to determine if those involved understand, believe in, and can
work with the written procedures (control environment).
Using the COSO integrated control matrix is like weaving a piece of fabric
together. It is an examination of how all of the elements that would make
effective control of a process are working together. Weaknesses in this weave
among or between these dimensions represent a control weakness which is risk.
Keeping the end objective in mind is important when using COSO. Using COSO
the end objective should not just be to do a checklist risk and control
assessment. It should encompass an analysis of multiple dimensions of the
process and an analysis of the soft issues as well as the more tangible issues.
Trying to gain an understanding of the soft issues risks and the adequacy of
controls can be a challenge. In general, the best way to determine soft issues
that may need to be addressed is to interview and talk (conversational) with the
individuals involved in the process being reviewed. Understanding how they feel
about the process they are involved in is a major step to understanding if there
are soft issues to be concerned with.
Control Activities on the other hand require more physical testing than interviews
and communications to determine the adequacy of the harder issues and risks
and controls. So develop compliance samples for testing, develop tests, testing
the sample, then integrating the results of these tests with the control
environment efforts will provide a good picture of the adequacy of controls that
are managing risks (combining an analysis of the hard and soft issues).
• corporate culture
• audit culture
• what else
• auditor education
• client education
• build trust
• be innovative
Summary of COSO
COSO clearly identifies the point that to become better a business should have
internal controls inherent within its business practices. Internal controls should
be throughout the business process and should be connected among all parts of
the business process. Each part of a business process may look fine in isolation.
However, problems can arise when the parts are interconnected. COSO and
other integrated control frameworks can help identify weakness among these
interconnections.
The COSO philosophy emphasizes more coverage of efficient and effective use
of resources. It spotlights the fact that soft controls are the foundation upon
which good business is built. COSO takes this one step further to determine if
the employees understand the procedures and that the procedures work.
Control Models
Combinations of These Models May Be The Best Tools.
Every entity large or small faces uncertainty, which presents both opportunity and
risk events that may inhibit the achievement of defined objectives. Value is
optimized when the entity management balances the cost of controls with the
identified risk. Some of the ERM dimensions help to achieve this balance.
Align the risk appetite and strategy of the organization with the management of
the risk:
• seize opportunities
While the ERM model can be a very effective risk and control management tool,
it has some limitations. ERM is managed and implemented by people. People
can make faulty decisions and judgments related to risk and control
management. Therefore, ERM is not a TOTAL solution. ERM is a tool
implemented and managed by people. ERM involves various human factors.
• internal environment
• objective setting
• event identification
• risk assessment
• risk response
• control activities
• monitoring
The internal environment is the tone at the top including the risk management
philosophy, the risk appetite and integrity; and the ethical values. In addition, the
internal environment is how this tone is viewed and addressed by the total
organization. These philosophies are considered soft issues.
Event identification involves the internal and external forces / risks, which can
impact the achievement of the defined objectives. Event identification not only
includes the negative risk events, those which can impede the achievement of
objectives, but also includes the impact of lost opportunities. Not taking
advantage of an opportunity which could have a positive impact on the
organization because the opportunity was not identified can have a negative
impact on the achievement of an entity’s objectives.
Risk assessment looks at or should look at all levels of internal and external risk
including the overlapping relationship which should be addressed in terms of
likelihood and impact. The actual risk assessment should result in a
determination of the consequences. The consequences are outcomes of the risk
event happening.
Risk response addresses the identified risk. This is completed by the adequate
and appropriate application of controls. The dimensions of risk control
applications are avoiding, accepting, reducing, or sharing. Addressing the risks
can include any one or a combination of these dimensions.
Control activities are the tangible things within a business process. These can
include policies, procedures, job aids, budget reports, process error reports, and
others. Even though these tangible controls are only part of the control by
themselves, they have to be completed.
• strategic, relating to high-level goals and aligned with and supporting the
entity’s mission (this can also be directly related to external positive or
negative impacts, external risk)
ERM addresses risks from two main dimensions. One dimension is the risk
appetite. As defined in ERM, this is the amount of risk, on the broad level, that
an entity is willing to accept in pursuit of value. It reflects the entity’s risk
management philosophy and therefore influences the entity’s culture and
operating style. Risk appetite is directly related to an entity’s strategy.
Although ERM, COSO, and other risk and control models help business
professionals consciously address risk with the appropriate application of
controls they are only tools administrated by people. Therefore, a reasonable
assurance factor is part of the application of risk and control management. There
is the likelihood that, even with the use of the available tools, some risk may not
be addressed appropriately.
Communications to all that need to know and who will take action is a specific
part of the ERM. Communications Protocols should be established to identify the
appropriate information that is needed for effective decision making. Senior
managers should be apprised of risk management and control deficiencies
affecting their units. Supervisors should have concerns communicated to them
and should establish protocols for subordinates to openly communicate.
Internal
Environment
Objective
Setting
Event
Identification
Risk
Assessment
Risk response
Control Activities
Information &
Communications
Monitoring
As can be seen from a comparison between the COSO model and the ERM
model, strategy or strategic planning is specifically noted in the ERM model. In
addition, risk is more specifically defined and addressed in the ERM model.
Further not noted on these matrixes, the ERM model encourages the use of
analytic tools for risk assessment as well as risk and control management.
35. The ERM integrated control model specifies more detail in risk assessment
than does previous integrated control models. In the ERM model which of the
following most closely represents the appropriate amount of controls that should
be applied to risk?
a. risk tolerance
b. risk response
c. risk appetite
d. event identification
Quantitative methods and tools can be used by the business professional; auditors;
control and risk assessment specialists; quality professionals; fraud examiners; and
others. These methods are mathematical tools that will help represent past, current, and
future trends as well as relationships.
Linear programming is an analytical tool that is used to identify the best use of
scarce resources. Therefore, the optimal mix of these resources is created to
reach the objective. Linear programming can be employed to determine such
things as the best way to locate facilities, achieve optimum production, select
equipment, determine worker optimization, the best mix of advertising, and the
scheduling of events.
Gantt charts are commonly used. They are bar charts in which the bars
represent activities in a project. For example, they can depict start and
completion times. The bars may also depict the objective and the status of
achievement toward the objective.
The sensitivity analysis tool can help test the behavior to changing conditions.
It will demonstrate how a model solution changes as a result of changes in the
problem or changing the situation.
Decision trees are useful to depict related events in the decision process. They
allow the users to see the relationship among options. Hence, facilitating the
optimization of the decision in comparison to alternatives
The gaming theory tool, as it is called, is different from other decision tools
because it is applied under conditions of conflict. This is a comprehensive
mathematical model. It compares the consequences of the actions of one entity
with the actions of the opponent who is choosing from alternatives. It can be
used in marketing strategies, recruiting of personnel, bidding for contracts, and
other events that may require the identification and impacts of one entity
compared to another.
The Critical Path Method (CPM) and PERT are two similar network analysis
tools. These tools assist in the optimization of project management. They depict
the most critical path in the project. This path if not completed as scheduled
could compromise the achievement of the overall project. CPM and PERT both
employ graphical representations.
Sampling and the use on computer-based tools provide excellent tools in the
area of risk management. Appendix 3 discusses “Some Comments about
Sampling Useful in Risk Management” in more depth.
CoCo builds on the COSO foundations by identifying the same control components,
but CoCo takes COSO a step further by looking at the appropriateness of the
objectives and the control activities. Also, CoCo stresses capability and
commitment as important parts of the control environment component. CoCo
stretches the monitoring component to include elements of the learning
organization, thus allowing for a control environment that supports continuous
improvement as well as protection from the negative consequences of risk. Like
COSO, the CoCo model can be applied anywhere in the organization, at any level.
This makes it possible to aggregate the responses into an entity-wide assessment
of internal control.
Components of CoCo
• purpose
• commitment
• capability
• action
Both COSO and CoCo address the soft issues. CoCo is not intended to compete
with COSO. Both the CoCo philosophy and the COSO philosophy encourage
combining these models. The philosophies encourage using a combination of
both to make the best possible tools to help a process succeed.
CoCo indicates that the use of all of their criteria is necessary, as does the
COSO model with its 15 points.
CoCo
• is very dynamic
CoCo uses a complete loop bringing everything to closure with action and
constant improvement. This concept of taking action and making constant
improvement is often missed in other management philosophies and models.
COBIT
COBIT has some great questions that can be used to populate the COSO and
CoCo models. It may be necessary to change some of the questions from
computer terms into business terms. Change them and use them. Always
remember controls are “controls” no matter what the adjective.
The best tool is, most often, a combination of these tools. However, it is
first, necessary to identify what to try to accomplish. Then, combine the
tools to reach the outlined objective. But remember to be flexible in this
process. Remember that these are only some of the available control
models. Some other useful tools are Cadbury, the ISO 9000 series, and
other quality models.
Learning Curve
• auditor
• audit manager
• customer
COSO is a good, but not the only, business tool that can be
employed to help businesses succeed.
Handle as follows…
• you may need to step back to evaluate – and then try again
51. There are a number of risk assessment tools available which can help process
owners manage their risks. Some of the more contemporary tools are integrated
control frameworks. Which of the following integrated control frameworks
facilitates the most detail of risk?
a. COSO
b. ERM
c. CoCo
d. COBIT
See Application Questions, Answers & Explanations module for the answer.
ISO 31000:2009
The global financial crisis in 2008 demonstrated the importance of adequate and
standardized risk management philosophy. As a result, new risk management
standards have been published, including the international standard, ISO 31000
“Risk Management – Principles and Guidelines’.
• executive-level stakeholders
• appointment holders in the enterprise risk management group
• risk analysts and management officers
• line managers and project managers
• compliance and internal auditors
• independent practitioners
In terms of managing risk, ISO 31000:2009 more or less follows traditional risk
management guide lines and philosophies.
• avoiding the risk by deciding not to start or continue with the activity that
contains the risk
• accepting or increasing the risk in order to pursue an opportunity
• removing the risk source
• changing the likelihood
• changing the consequences
• sharing the risk with another party or parties (for example insurance)
• retaining the risk because of an informed decision
Retaining the risk by informed decision, can be a trap. The trap is that the
words informed decision may mean different things to different people.
Further the word informed (the amount of information) to make the decision may
have different degrees acceptance to different people.
Hence the trap that individuals who accept risk may not have an adequate
amount of information to accept the risk in simple terms, they may not
understand what they are accepting.
• prioritize the risk (categorize the measured risk into categories or just
prioritize the identified risk into order of importance)
• act (take action on the identified measured and prioritized risk to minimize
or eliminate the risk). Action or the controls put in place to minimize or
eliminate the risk can accomplished in by taking one or a combination of,
avoid, transfer, mitigate, accept.
Whichever approach is taken it is important that some action be taken to address
the risk that has been identified, measured, prioritized. Without an appropriate
action any effort to identify, measure, prioritize risk is just a waste of time.
In addition, keep in mind that controls have a life cycle. That is controls can
outlive their usefulness and even become counterproductive. It is vitally
important that an on-going monitoring mechanism be established and
implemented. This on-going monitoring (the verb part of the control) should be
designed and implemented to allow for prompt adjustments of any controls as the
environment in which the process changes, the objectives change, and the risk
changes.
This implies that not only should there be a monitoring mechanism in place to
monitor the controls but also there should be a monitoring mechanism in place to
monitor environment in which the process changes, the objectives change, and
the risk changes.
Risk management
Risk management is not complete when a basic risk management plan has been
implemented. An effective risk management plan requires monitoring the risk
with a means to review it and update it continuously.
Some thoughts:
The risk monitoring and updating process occurs after the risk mitigation,
planning, and controlling processes. It must be on-going because the
environment and relative risks are dynamic.
Risk monitoring and updating tasks can vary depending on the organization, the
process, the objectives, and goals of the process. Nevertheless there are three
tasks should be integrated into design and construction of any risk management
plan:
Reporting:
Risk reporting involves recording; maintaining; and reporting risk assessments
and status. Monitoring risk assessment results and assessing the adequacy of
existing plans to manage these identified risks are critical for the successful
management of a process. Formally documenting an on-going risk management
process is important for the following reasons:
One way to think about these emerging risks and even to begin a plan to manage
them is with strategic thinking. Remember (earlier discussed the scenario
approach) “what if this happened what would we do”. Here the thought is to
some unknown event possibly a risk that may or may not happen at some time in
the future. Going back to basics the basic control concepts of, preventive,
detective, and corrective controls it is much better to anticipate what adverse
event or prepare for even a positive event before it happens or is a major issue
than to deal with it as a major event after the fact.
See Application Questions, Answers & Explanations module for the answer.
Emerging risks are large-scale events or circumstances that arise from situations
beyond an organization’s capacity to control. This does not mean that they are
beyond the capacity of the organization to manage (control) it means that the
organization generally had no control over the event occurring (external risks).
These types of risk, if not managed, may have impacts not only on the
organization but on multiple entities and organizations across geographic
borders, and industries (ripple down effect). For example drastic changes in oil
prices may impact multiple organizations, industries, and customers worldwide.
Another example is drastic changes in interest rates. This could also impact
multiple entities. So the importance of managing emerging risks becomes clear.
• increasing natural resource constraints, this risk could be the result of the
lack of such resources and changes in laws and regulations limiting
access to such resources
• risk that changes in domestic or international laws and regulations are not
understood (remember that a number of countries now have anti-bribery
laws which can be imposed on any country or company doing business in
that country)
Managing the impacts, positive and negative, of emerging risks requires the
evaluation of past and future trends. This means the use of relevant leading
indicators to alert management to changes in the environment in which a
company or organization operates and the potential risk or opportunity exposures
in that environment. This will help management better understand its
environment so that they can identify potential exposures make more informed
risk management decisions.
Just as with the snapshot in time risk assessments, these emerging risk
assessments, and management efforts can be quantitative and qualitative.
Remember that the more subjective and objective input from as many sources as
possible will result in a more accurate risk assessment. A more accurate risk
assessment will result in a more efficient and effective risk management effort
(the application of controls).
COSO has been a familiar term and corporate governance guideline for both
process managers as well as risk and control specialists for over 20 years.
However, the world in which business and these professionals operate has
changed drastically over the past 20 years. Such things as the internet, cell
phones, immediate communications, computerization, and a working
interrelationship among cultures and global partners, unheard of and possibly
unimaginable 20 years ago, are now common place.
These changes have vastly increased the productivity and efficiency of the
common workplace. However with these advancements come new risks.
Because of these new and ever-increasing emerging risks came a need to revisit
the existing COSO integrated model.
The COSO 2013 framework has been modified to maintain relevance with
current emerging risks and future (preventive control) business environments.
Further COSO 2013 is expanded to apply to public companies, privately held
companies, not for profit (NFP) agencies, and governmental entities. This is a
significant expansion from the original COSO framework.
Comment:
The COSO 2013 integrated control model is designed with a more preventative
approach. Although there were general economic concerns while the COSO
2013 was being developed there was no specific definitive economic crisis as
was with the initiative for the original COSO model.
The original COSO model has three control objectives and five components. The
five components are applied to each of the three control objectives for a total of
15 dimensions. These 15 multiple dimensions have remained in place for
the 2013 COSO model but have been substantially expanded to become more
specific and definitive to meet contemporary business needs including new
guidance for not for profit organizations.
COSO 2013 expands the scope of the original framework and increases the level
of detail, specifically and more formally, expanding its use beyond external
financial reporting.
Although the fundamental principles of the old framework have not changed, a
clearer and more specific focus on such things as outsourcing, more complex
business structures, increased expectations around governance standards, and
technological change is evident in the COSO 2013 framework. For example, the
update has more specific perspective of the Audit Committee roles and
responsibilities. It introduces new discussion of the compensation committee,
which was not treated at all in the old framework.
Often the root cause of process problems resides in the attitudes, morale, ethical
values, and competency of people. These elements reside in the Control
Environment of the COSO models.
The most significant new development, which expands the scope of the COSO
2013 framework, is the inclusion of 17 specific principles spread across the five
main components (enhancing the specificity of the original COSO five
components). As in the original COSO framework, the five components need to
be functioning and functioning together for an adequate and appropriate internal
control scheme to be present.
Some points of focus in the new integrated control framework may not apply to
all users in all situations all of the time. COSO 2013 like the original framework is
just that a framework. The essence of this model requires the user to think about
how to apply, with the objective of enhancing corporate governance, the
frameworks in each specific situation.
The 17 specific principles contained in COSO 2013 are applied to each of the
control components:
Control environment
Risk assessment
8. the organization considers the potential for fraud in assessing risks to the
achievement of objectives
Control activities
10. the organization selects and develops control activities that contribute to
the mitigation of risks to the achievement of objectives to acceptable
levels
11. the organization selects and develops general control activities over
technology to support the achievement of objectives
Monitoring activities
• to the extent possible, all funds received by the organization should flow
through the normal cash receipts process
• the bank deposit should be prepared by the finance office and should
include all funds received by the organization
• the development office should use the check copy for its recordkeeping
purposes
• the finance office should post cash receipts to the general ledger to serve
as the primary record of all funds received
Ideally, the development or operations office should not receive funds directly.
When this cannot be avoided, the received funds should be delivered directly to
the finance office for receipting and deposit (separation of duties).
Just as with the original COSO framework, the COSO 2013 framework will help
process owners and auditors evaluate the adequacy of controls in multiple
dimensions of the process. COSO will help give a picture of how well all of the
controls in all of the dimensions are working together. COSO 2013 will by
specifying focus points and principles further help process owners and auditors
to determine how well all of the controls in all of the dimensions are working
together.
The COSO board said it believes that continued use of the original framework
during the transition period from May 14, 2013 to Dec. 15, 2014 is appropriate.
However, organizations reporting externally should clearly disclose whether the
original framework or the 2013 framework was used.
SUMMARY
It Is Important to Monitor the Environment in Which a
Process, Organization, or Company Operates;
Recognize Apparent Existing and Potential Risks; and
Adjust The Controls Accordingly
2-1 Loss of a customer base can be due to Answer 3 is the correct answer. Answers
an increase in reputational risk. As 1 & 2 address supplier management so
negative reputational risk increases they are not relevant to this question.
customer base can decrease. Which of the Answer 4 sounds nice but would need a
following would be the primary action to next step of what would be done with this
decrease negative reputational risk? information. Answer 3 indicates a
measurement to evaluate customer
1. increased communication with satisfaction. More importantly, answer 3
suppliers indicates action. Reputational risk can be
one of the most severe types of risk a
process can encounter. If allowed to
2. a feedback process to suppliers develop reputational risk can take a
indicating their performance tremendous amount of effort to reverse.
2.2 Risk is best defined as: Answer 4 is the correct answer. This
refers to the basic concepts of how often
1. inherent risk times control risk something can happen and what happens
when it occurs. Answers 1, 2 & 3 are
incomplete answers.
2. the possibility of danger, injury, or loss
2.3 The elements to manage risk in order Answer 4 is the correct answer. Answers
are: 2 & 3 are just random combinations.
Answer 1 is only partially correct;
1. measure the appropriate risk, prioritize identifying the risk is missing from the
the risk, and act on the risk statement.
2.4 Which of the following best describes Answer 4 is the correct answer. Answers
the three basic parts of a business 1 & 3 could be considered correct but
process? using the words “appropriately” and
“timely,” cause answer 4 to be broader in
1. in order to achieve anticipated scope. The right amount of controls and
objectives, controls must be managed when they are applied is important in an
appropriately adequate control process. Answer 2 is not
correct because controls should not be
considered independently - they are part of
2. objectives must always be considered a process.
independently
2.5 The best combination of ways to Answer 2 is the correct answer. Answer 1
identify risk is to: could be a good tool. However, it is not
the complete picture. Answer 3 only
1. refer to history and review the changes includes one part of the control and risk
that have taken place model - safeguarding of assets. Answer 4
could be considered correct. Developing a
flowchart and addressing risks are good
2. refer to history and use the CARES approaches in addressing risk. Analyzing
model to determine what controls are the effects of change is also a good
in place approach in addressing risk. Risk often
develops as a result of change. However,
3. use the CARES model and determine answer 4 does not address all of the
the adequacy of the safeguarding of components of risk and controls. The
assets and the accomplishment of CARES model in answer 2 addresses all of
objectives the components of risk and controls,
making it the best answer.
4. analyze the effects of any change on
the process, develop a flowchart to
identify the points of risk in the
process, and address those risks
2.6 Which of the following would Answer 1 is the correct answer. The first
strengthen the supplier-customer clue that this is the correct answer is the
relationship? word communication. Remember that
communication is a two way channel.
1. communication of the process owner With this answer, the communication
requirements to the supplier implies that the communication is
conveying requirements. Answer 2 may a
good approach but answer 1 is much
2. explain how the process owner better. Answers 3 & 4 are acceptable but
requirements are determined in no way approach the benefits of
communications.
3. determine the inputs from the supplier
2.7 Some of the classifications of your Answer 4 is correct answer. All of the
outsourced business partners could be: answer choices, if not managed and
consultants, distributors, brokers, freight controlled adequately, could cause
forwarders, and joint venture partners. reputational risk to the host process
Which of the following could not cause owners. This also includes distributors
reputational risk to the process they are and freight forwarders along with many
serving? other categories of outsourced providers.
It is important to evaluate each situation
1. brokers and establish adequate controls based on
the outsourced provider and the details of
the individual project.
2. consultants
2.8 Pervasive inherent risk is best Answer 2 is the correct answer. There is
described as: always risk of putting assets to work. This
is apparent in our personal life as well as
1. any internal risk apparent in the in business. The concept of investing,
business that can impact the hiring staff, buying plant, and buying
achievement of objectives equipment all have risk associated with
them. Will the anticipated rate of return be
realized? Answer 1 only addresses the
2. the risk of putting assets to work in internal risk and does not address external
order to achieve objectives risk. Answer 3 is too specific. Answer 4 is
not correct because it states “all” risk,
3. the risk that the security of assets and while the question asks about pervasive
compliance with laws and regulations risk. There are other types of risk in
will not be achieved business besides pervasive risk.
2.9 The best description of risk analysis Answer 1 is the correct answer. Answer 2
is: is not correct because it only includes one
of the component measurements.
1. a method of anticipating expected loss Answers 3 & 4 are not correct because risk
from the occurrence of some adverse analysis is more than just using the
event mathematical models. The most important
part of risk analysis is the subjectivity and
the thinking that is incorporated into the
2. a method of measuring the impact of model.
risk on the achievement of objectives
2.10 There are a number of risk Answer 2 is the correct answer. The
assessment formulas. Most consider the remaining answers are just random
probability of a risk occurrence and the modifications to other risk assessment
impact of that occurrence. Which of the models. The modified annual loss
following also considers the probability of expectancy considers the probability of a
a control failure? risk event occurring, the probably of a
control failure, and the impact of the risk
1. direct and total probability estimate event occurring.
2.11 Which one of the following is the Answer 3 is the correct answer.
equation for direct probability estimate?
2.12 Annualized loss expectancy can best Answer 3 is the correct answer. Answer 3
be described as: is the best answer because it describes
annualized loss expectancy in words and
1. ALE = P + I adds other components as may be needed.
These could include difficulty of the job,
competency of the staff, time of
2. ALE = P x I x T occurrence, and others. Answers 1 & 4 are
just random formulas. Answer 2 does not
3. ALE = P x T x I (other appropriate include additional options.
factors)
4. ALE = P + I x T
2.13 The modified annualized loss Answer 2 is the correct answer. Answers
expectancy can best be described as 1, 3 & 4 are just random formulas.
follows:
1. ALE = P x Q x Q
2. ALE = P x P x Q
3. ALE = P x I x P x Q
4. ALE = P x P + Q
2.14 Emerging risks can be identified Answer 3 is the correct answer. Strategic
similarly to external risks. How should planning is an appropriate tool when
emerging risks be managed based on this managing emerging risk. Strategic
assumption? planning helps to look into the probability
of events occurring in the future. As well,
1. evaluate the existence of existing risks strategic planning is a good tool to help
evaluate and manage external risks.
External risks are often associated with
2. identify, measure, prioritize the emerging risks. Answer 1 Is very vague as
probability of pending risks is answer 4. Hence, these answers could
probably be eliminated quickly. Answer 2
3. implement strategic planning in the risk could be a trap. This answer uses words
management process traditional and frequently used in risk
assessment. However, it is an incomplete
answer. The question asks about
4. identify, measure, prioritize, act managing risk, which includes “ACT”. This
answer does not include the word “ACT”.
2.15 Which of the following are not Answer 4 is the correct answer. It lists the
examples of effective monitoring? least effective monitoring control listed in
the answers. It is too broad to be effective
1. budgets and related operational reports and useful. Answers 1, 2 & 3 list effective
are compared monitoring tools and controls.
2.16 Which of the following are apparent Answer 4 is the correct answer. All of
risks in a microcomputer environment? these risks can exist in a microcomputer
environment. However, many times, their
1. storing proprietary information on consequences are not considered. A Risk
diskette and not handling it Management Professional can help bring
appropriately these risks into focus for the process
owners.
2.17 Typically risk within a process Answer 2 Is the correct answer. First
increases as complexity and volatility of a
answer 4 can be eliminated. Answer 4
process increases. However, this may be implies all external entities will be
different with emerging risks. What are the
impacted. This may or may not be true.
impacts of emerging risks? The word “all” is a caution word that
requires thinking about the answer and not
1. emerging unmanaged risks will have an answering immediately. Typically
impact on the process emerging risks will have an impact on the
involved process; interrelated and related
external entities; and internal entities.
2. emerging unmanaged risks will have an Answers 1 & 3 each list one half of the
impact on the process and external equation - the process or the external
entities entities. Both could be impacted by
emerging risks.
3. emerging unmanaged risks will have an
impact on external entities
2.19 The simplest way to describe risk Answer 3 is the correct answer. Answer 1
assessment is: is correct but it is not the simplest way.
Answers 1 & 3 are virtually the same thing,
1. frequency and impact but 3 is a simpler way of stating risk
assessment. Answer 2 could be a useful
ratio in business but it is not a risk
2. dollars lost versus employees assessment model. Answer 4 just lists
random words.
3. how often can something happen and
what happens when it occurs
2.20 Preventive controls help best with Answer 1 is the correct answer. Although
both the: preventive controls could help as listed in
answers 2, 3 & 4, the best answer is 1.
1. long-term and short-term issues Adequate preventive controls diminish the
implications of both short-term and long-
term problems. Often, the ramifications of
2. scheduling and expenses long-term problems are much more
difficult to correct than short-term
3. savings and checking problems. Therefore, it is better to prevent
them whenever possible
4. expenses and taxes
2.21 Which of the following emphasizes Answer 2 is the correct answer. Of all of
the use of analytical models? these models ERM contains the most
emphasis on the use of analytical models.
1. the new ISO 31000:2009
2. ERM
3. COSO
4. CoCo
2.22 ISO 31000:2009 is a relatively new Answer 4 is the correct answer. ISO
risk modeling tool incorporates risk 31000:2009 is a risk management tool and
management techniques that: model whose intent is to provide a uniform
and consistent risk management
1. are a completely new approach to risk approach. Hence answer 1 is not correct.
management Although some of the approaches of ISO,
31000:2009 change the likelihood and
facilitate the acceptance of risk as listed in
2. identify and change the likelihood of answers 2 & 3 respectively these are only
apparent risk two of the many approaches of the ISO
31000:2009 risk management model.
3. facilitate the ability to accept the risk
2.23 COSO is a good tool for business Answer 1 is the correct answer. Answer 2
because: is not correct because this list only one of
the things that COSO can evaluate.
1. all dimensions of a business can be Answer 3 is not correct because it only
reviewed lists three dimensions. Although COSO
looks at these dimensions, it looks at
many other dimensions as well. Answer 4
2. it looks at risk as part of controls is not correct because COSO can help
evaluate the adequacy of controls in both
3. it looks at all parts of a process: the long-term and short-term.
objective, risk, and controls
2.24 COSO can be a useful tool for looking Answer 4 is the correct answer. Answers
at the relationships of a process in: 1, 2 & 3 all lists relationships of a process
where COSO can be a useful tool.
1. the entity and activity
2.25 The most important aspect of CoCo Answer 1 is the correct answer.
is: Consequently, answer 4 is not correct.
Answers 2 & 3 are not related to the
1. it is a continuous loop of improvement question.
2.26 The Criteria on Control Committee Answer 2 is the correct answer. Answer 1
(CoCo) of the Canadian Institute of is not correct because CoCo is an
Chartered Accountants: improvement on the COSO model. Answer
3 is not correct because CoCo and other
1. is a control model that is like COSO models work well together. Answer 4 is
not correct because, although it was
developed in Canada, it has business
2. is a control model developed by a applications in general no matter where
professional organization that expands the process is located or conducted.
on previous control models
2.27 The CoCo framework has: Answer 2 is the correct answer. CoCo has
its own criteria of controls. Answer 1, 3 &
1. 15 criteria of controls 4 are not correct since answer 2 is correct.
4. 25 criteria of controls
2.28 The components of CoCo are: Answer 2 is the correct answer. Answer 1
lists the recommended five parts of a
1. condition, criteria, cause, effect, and finding. Answer 3 lists The IIA control
recommendation objectives model. Answer 4 is a selection
of random words.
2.29 Which of the following is the best Answer 3 is the correct answer. SWOT is
example of a strategic planning tool? the acronym for Strengths, Weaknesses,
Opportunities, and Threats. It is a
1. COSO strategic planning model. It is very useful
in determining long-term implications of
buying, selling, merging, and other
2. COBIT business applications. Answers 1, 2 & 4
list integrated control models.
3. SWOT
4. CoCo
2.31 COSO helps business leaders assess Answer 4 is the correct answer. Answers
and address the soft issues. Which of the 1, 2, & 3 all list correct statements.
following is the most correct statement?
2.33 Controls designed to better manage Answer 1 is the correct answer. Directive
profit margin objectives are: controls are designed to cause achieving
anticipated objectives.
1. directive controls
2. compensating controls
3. preventive controls
2.34 Which of the following would or Answer 3 is the correct answer. The audit
could be considered a control weakness? committee should consist of independent
members. The Audit Committee needs to
1. the director of reservations reports to maintain an independent oversight of
the president auditing and the internal control function.
Answers 1, 2 & 4 describe reasonable
reporting relationships that would not be
2. the CFO reports to the CEO considered a control weakness.
2.35 A feedback control system can best Answer 4 is the correct answer. This
be described as: answer best describes a feedback control
system that will ensure that the desired
1. planning, organizing, staffing, state is achieved and maintained. The
directing, and controlling detectors identify the condition. The
comparators allow a comparison of a
reference point to determine if adjustment
2. the achievement of objectives, awards, is needed. The activators are the activities
and ability interviews to make the appropriate adjustment.
Answer 1 describes the functions of
3. the monitoring component of a management and does relate to the
communication system question. Answer 2 is just a random
listing of words. Answer 3 only describes
one element of a feedback control system.
4. detectors, comparators, and activators
2.36 To minimize the risk of personal gain Answer 3 is the correct answer.
from employees taking advantage of Minimizing the opportunity for long-term
transactions that they maintain relationships can be an effective control in
management should: this case. This will also facilitate the
opportunity for review by other employees
1. have an internal auditor assigned to the of each employee’s work. Answer 1 is not
organization correct as an internal auditor should not
become the internal control for an
operation. Answers 2 & 4 list actions that
2. maintain a systematic and periodic are probably not practical in a large
review of all purchased items organization.
2.37 In terms of communications within Answer 2 is the best answer. It is from the
the COSO and ERM models which of the definitions of communications both in the
following best describes a complete and COSO and ERM models. Situations are
effective communications element? different addressing relevant, adequate,
and appropriate covers different
1. trust and communications situations. The key words are “to enable
those who need to know to best carry out
their tasks”. Answer 1 & 3 list key
2. communications should be relevant, elements in any communications. Trust
adequate, and appropriate to enable and communication go together. However
those who need to know to carry out the question asks for communications as
their tasks it related to COSO and ERM models.
Answer 4 is not correct because it implies
3. communications is the responsibility of that communications must be from the top
both the sender and receiver down only.
DOMAIN III:
ASSURANCE ROLE OF
THE INTERNAL
AUDITOR (IA)
The objective of this module is to better prepare the participant to pass the
Certification in Risk Management Assurance Exam by discussing and
analyzing the technical dimensions of this domain while discussing
techniques to best manage multiple-choice questions.
The IIA Standards clearly identify the opportunity for internal audit to
increase its contribution to the success of an organization by using
assurance to add value and improve an organization’s operation in a
consulting role.
Assurance:
Assurance:
The review, evaluation, and management effort of key risks in a process is easier
said than done. To be effective this effort requires collaboration between and
among process owners and risk and control specialist (internal auditors) at all
levels. This means that there must be an understanding and acceptance by
process owners of how to identify, measure, prioritize key risks, and then act on
them accordingly. In addition, this effort requires an empathetic approach by the
risk and control specialist to help the process owners gain an understanding of
risk and control management. It is not only the risk and control specialist that are
or should be identifying, measuring, and prioritizing key risks.
In order to facilitate this effort (corporate governance) the process owners must
have an understanding of how to identify, measure, prioritize, and then act (the
risk management) upon key risks. In addition, the process owners must be
willing to accept responsibility to administer this corporate governance.
But, credit must be given where credit is due. Process owners, in current
business situations are being asked to be more and more responsible for
corporate governance. However, these process owners, in many cases, are
being asked to be responsible for something that they do not adequately
understand (corporate governance). So it is not the process owner’s fault that
they are reluctant to accept these new and expanding responsibilities. No one
has really explained to the process owners how to employ a sufficient corporate
governance strategy.
In reality these services are not easily separated from the role of consulting.
RISK MANAGEMENT
Corporate Governance Must Be Incorporated Into
The Overall Process Belief and Direction of the Process.
It is important that this key risk or most significant risk has some nomenclature to
distinguish it from the other lower prioritized risks. This could be an
alphanumeric notation or more formally a Key Risk Indicator (KRI). In simple
terms a KRI is a measure used to indicate the significance of a risk.
KRI which can indicate to a process owner what or where there is a high
probability of a risk or risks that may exceed the defined risk appetite for
that process.
Processes are all different. Therefore, each process can and should develop
its own KRI, taking into account the following steps:
Remember that risk assessment is not a science. It is not just the completion of
some arithmetic formula. Risk assessment requires thinking by the process
owners or auditors.
Even though one risk has been identified as a high priority or key risk does not
mean that other risks should be disregarded.
So where does this start? It starts with those who are risk and control experts
passing the risk knowledge, control management philosophy, and tools onto
those who have a lesser understanding or risk and control management.
With all this being said, internal auditors provide some assurance (the key word
is “some”) that risk management is adequate and appropriate within the process
where they are providing their service.
If the process owners are to be held responsible to manage their own risks
and controls they must be educated in those concepts. The process
owners must be coached, mentored, guided, and educated in the
application of risk and control management. Only then can they be held
responsible legitimately.
The above graph shows the benefit of collaboration between internal audit and
clients.
The role of internal auditors in the assurance that risk and control management is
adequate in the business processes of their oversight falls in the tradition of the
internal audit profession and the evolution of the profession itself. That word
“assurance” is a key word in this responsibility.
Just as with any other application of controls to apparent risk there is a chance
that some risk will not be addressed adequately. A term specific to internal
audit is audit risk. This means that the audit, for whatever reason, did not
address some risk adequately. So it becomes apparent that the word
“assurance” is somewhat misleading. As no control, including internal audit, can
assure that all risk will be addressed adequately all of the time in every situation.
Therefore the importance of having not only internal audit but all process owners
adequately managing corporate governance becomes clear. The more people
understanding and addressing risk the better the results.
See Application Questions, Answers & Explanations module for the answer.
The internal audit responsibility has evolved over the years from its inception in
the mid-1940s from a quantitative focus, to a qualitative focus, and then to a
qualitative and to a combination of both.
Internal audit today is required to apply internal control knowledge to help identify
risks that might create future problems as well as risk that have created past
problems.
The following graph outlines the need for internal audit to identify risk of future
problems.
Internal auditors must make a conscious effort to assess the risks that could
jeopardize the achievement of process objectives.
Assessment of risk is usually completed using past audits; interviews with the
senior-level management and other staff members; and the auditor’s judgment of
the current situation of the process.
Internal auditors should put the following questions to themselves: what could go
wrong? What is the (probability) that it would go wrong? What if it goes wrong
(impact)?
a. first understand the process owners knowledge base and then develop
appropriate risk and control training for the process owners
b. develop a restructure of the process organization considering
specifically at efficiency and effectiveness
c. develop policies and procedures the first time for the process owners
d. conduct an audit to determine the weak areas to address first
See Application Questions, Answers & Explanations module for the answer.
To put this in some context, training could be considered a preventive tool while
the various types of audits and the self-assessment could be considered a
monitoring or detective tool. But these descriptions are not always exactly
definitive. For example what may be a preventative control in one situation may
be considered a detective control in another situation.
These tools will help ensure that key risks in a process are being addressed
adequately and appropriately.
The self-assessment process is probably the most effective tool to help address
key risks, monitor the corporate governance, and manage those key risks. In
addition the self-assessment process expands the risk and control knowledge
base of process owners’ participants. So self-assessment can be considered
two tools in one.
Continuous Monitoring
One of the roles that the internal auditor plays in the area of risk management is
to help process owners continually improve their processes. Internal audit can
meet process owners’ expectations by expanding the use of operational auditing
and traditional auditing skills to further apply internal audit knowledge about
controls.
Process owners with an ever-increasing list of required tasks will welcome helpful
suggestions of how to improve their processes.
Operational Auditing
• operational auditing
• comprehensive auditing
• value-for-money auditing
• management auditing
• operations auditing
• efficiency auditing
• effectiveness auditing
• preventive auditing
• system-oriented effectiveness auditing
• operational evaluation
• project auditing
• program auditing
• program evaluation
In operational auditing the internal auditor is the prime reviewer and reporter to
the process owners about the adequacy of the process owners’ corporate
governance. In a self-assessment process the process owners, often with the
assistance of internal audit, are the prime reviewers and reporters of the
adequacy of the process corporate governance.
70. One of the tools that can be used to provide an evaluation that key risks are
adequately evaluated is operational auditing. Which of the following would not be
a result of an operational audit?
See Application Questions, Answers & Explanations module for the answer.
• track transactions
Traditional Auditing
Traditional Auditing is considered more compliance auditing and is generally
focused on specific elements of an overall process. Typically this type of auditing
requires less time than operational auditing or self-assessment. The process
involves obtaining a document that requires compliance and compares this
document to what is actually being performed. This could be a company policy,
procedure, law, or regulation. Using observation, analysis, reconciliation, or
comparison a determination is made to identify variations from the written
guideline to what is actually being performed or transacted.
Many times, not always, these quantifiable amounts become the focus of the
report. What is missed is the weakness in the controls that allowed these
quantifiable concerns to materialize.
Summary:
So here are four approaches of corporate governance analysis with various
involvements from internal auditors. These approaches are: 1) risk and control
training to gain involvement by everyone, including process owners, 2) the self-
assessment process that may involve internal auditors in various capacities, 3)
operational auditing which helps evaluate how an entire process or corporate
governance is functioning, and 4) traditional auditing which focuses more on
specific elements of a process.
This effort is half complete with the self-assessment process because the
process owners are part of the identification and management of risk. Although
this is the case with self-assessment, some convincing may still be necessary.
With operational auditing and traditional auditing the convincing of the process
owners of what are or are not key risks and any appropriate management of
those key risks may be a challenge.
BENEFITS REALIZATION
No matter what they are buying humans like the features and they like the
advantages but they buy the benefits. Therefore, it is incumbent upon the risk
and control professional to understand the benefits for the process owner and
report the risk issues focused toward those benefits.
It is also important that the risk and control professional understand the
perspective of the process owner when reporting the risk concerns.
WIIFM:
Review of Reporting:
The basic elements of risk assessment and management are: planning the
assessment, engaging in the assessment activity (self-assessment, operational
audit, traditional audit), and reporting. An outstanding effort in the assessment
activity can lose momentum in the reporting stage if the results of the
assessment are not reported with the process owner (action person) in mind. If
the reporting is not adequate the key risk issues will not be addressed
appropriately.
Assessment:
The number and complexity of closing meetings in any audit can vary. Some
considerations include: planning considering the complexity of the topic; the
experience of the process owners and the review staff; any politics within the
process owner’s organizations; and the management style of the process
owner’s staff must be considered and addressed.
Written Reports:
The variations in these elements are in the tone of the wording. The tone can
either be strong or softer and should be adjusted for the reader. Remember the
purpose of the report is to motivate the reader to take action on the risk concerns
identified.
The basic physical element of these types of reports are the purpose, (the
purpose is why the audit was conducted). The purpose should include some
reference to an evaluation of controls. For example, “the purpose of this audit
was to evaluate the adequacy of controls related to……”). The purpose
statement should be relatively short (a few sentences will generally suffice).
The next required or strongly recommended element is the scope. The scope
should contain more detail than the purpose statement. For example: “a review
of compliance with the company travel policy was conducted during June. A
sample of travel expense statements was developed and analyzed for receipt
compliance to determine if the controls related to travel statements were working
as intended”.
The next report element and an optional element is the background. The
purpose of the background statement is to provide a reader some basic
information about the function of the process. Caution: When writing a
background statement be careful not to be condescending to the reader.
Remember the risk and control professional spent a short time in the process.
Most of the readers work in that process every day. However, the background
statement should provide some basic process information to a reader not familiar
with the process.
One way to minimize any risk of being condescending to the process owner is to
ask them for help when writing the background statement. Explain to the
process owner that a background statement is necessary because other readers,
not familiar, with the process will need a perspective. By partnering with the
process owner the condescending risk from the primary process owner
decreases while a partnership increases. This may actually help with the trust
and acceptance of issues later discussed in the report.
There is some flexibility with these parts. For example, some companies reverse
the criteria and condition statement. Also, the wording in the condition and effect
statement can be interchanged. NOTE: Readers, especially higher-level
readers, respond to numbers. So develop quantifications during the engagement
work. These numbers “quantifications” will be used in the report.
To adjust the tone, move the quantification numbers closer to the top of the
finding statement. More wording before the actual quantification creates a softer
tone.
The cause statement states the root cause of why the controls, that are intended
to manage risk, are not functioning as intended.
Reaching the root cause of a problem can be easier stated than completed. This
may be because many professionals are not familiar with reaching the root
cause. Unfortunately, in many case professionals tend to fix the immediate
problem rather than trying to address what caused the problem.
Trying to force this approach may not work. Humans do not like change.
So it becomes incumbent upon risk and control professionals, who may have a
better understanding of this concept, to approach those with a lesser
understanding in such a way as to overcome the barriers of change.
Here is how it works. First identify the problem, then ask why the client thinks
this is happening. After some additional conversation and the answer to this why
then ask why again. Using the same techniques with additional casual
conversation then ask why again. Why did the answer to the second why
question happen. Repeat this technique until no additional answers can be
provided.
It is recommended that in every case try to establish the root cause. However,
this may not be possible for a number of reasons including budget, other risk
issues, schedules, and other reasons.
Note: A general rule is to open the audit from the top down (highest level
appropriate) and close from the bottom up (the working levels).
This helps build trust and facilitates the selling of the issues at higher levels
which are now partly sold by the lower levels to the upper levels in their own
organization.
The final closing meeting is most often an overview for high-level management. If
all of the closing meetings from the bottom up to these higher levels has been
initiated this final meeting should be a formality. The more preparatory work and
communication during the audit engagement will help make this final meeting a
final closing of the sale and commitment.
CAUTION: Although all of the preparatory work may have been completed to
prepare for the final closing meeting something, for some reasons, may go
wrong. So always anticipate what could go wrong and prepare for the
unknown.
a. scope
b. background
c. purpose
d. findings
See Application Questions, Answers & Explanations module for the answer.
One problem occurs because internal audit has traditionally used a historical
focus. Internal audit often felt that they could not focus on the future because
there was no data available. Hence internal audit could not audit what might
happen because there was no data to audit.
The result in many cases is that the IT audit function does what it does best.
However this may not always be the best way to use assets to address the area
of assurance. In order to maximize the return on the IT audit investment it will be
necessary to leverage the IT audit investment, capitalize on the scarce skills, and
apply these skills most effectively.
Every organization has both IT technical risks and business risks that must be
addressed by internal audit. Internal audit should make certain that all technical
audits have a process improvement focus with the end goal to improve the
overall process not just to find problems at the detailed or “bits and bytes” level.
Internal audit must identify IT risks as business problems not just surface IT
problems.
For years internal audit departments have struggled with the increasing
knowledge gap between IT auditors and traditional internal auditors. As IT
auditors became more technical the gap between IT auditors and traditional
internal auditors widened. The problem becomes critical when IT auditors
perform audits of business systems without knowledge of the basic business
process and internal auditors performed audits of IT business systems without
detailed knowledge of the IT processes. The obvious solution is to develop a
team auditing approach where the different skills are combined in a
complementary way rather than a competing way. Team auditing can prove
effective in technical audits, to ensure that the necessary skills are present in the
team and to achieve the proper combination of skills for successful auditing
The second major area to consider is Audit Support where technical specialists
provide support for individual auditors and audits. Computer-assisted audit
support has been a major enhancement of many internal audit
departments. This support has also included training of internal auditors in
possible ways that computer-assisted auditing may help their audits.
There are four major benefits that can be achieved by moving from
computer-assisted to computer-based auditing (CBA). The first is a change
in focus from looking at data after the fact to having the capability to look at data
at any time and in many ways. If internal audit embeds IT audit techniques in
every critical system then internal audit can drastically enhance audit
productivity. The second is the ability to move from internal audit to using
“outside experts” to perform self-monitor or self-audit. Internal audit can
become much more effective in helping their clients succeed by routinely
detecting both existing and potential problem in process.
With the use of available computer-based data internal audit can progress from
the traditional problem of differences of opinion on what is important, which
control technique is best, or whether something is really a problem to correct
issues. Internal audit can then collaborate with process owners to reach
consensus so that embedded systems truly become intelligent. Computer-
based tools can be implemented so they can be updated as required.
There is a need for internal audit to monitor both business risks and IT risk. This
eliminates the audit risk of “over auditing” or “under auditing” the same
business process, redundant recommended control techniques, and unreported
risks resulting in a significant waste of resources. The goal of Integrated Audit
has been around since the 1970s.
The risk monitoring and updating process occurs after the risks have been
identified (in an audit or self-assessment). Monitoring must continue for the life
of the risk management strategy. The list of risks and associated risk
management strategies will likely change as the process matures and new risks
develop or anticipated risks disappear. Action or adjustments to any changes,
(what has changed) beyond accepted limits must be enacted. Monitoring
without actions is a waste of time.
3. prioritization
4. risk strategy
3.2 Key risk indicators can help Answer 1 is the correct answer.
identify the status of: Answer 2, 3, & 4 just list random
terms. Key risk indicators can
1. risk appetite indicate, for a process, what or where
there is a high probability of risk that
may exceed the risk appetite defined
2. control implementation needs for that process.
3. risk priority
3.3 CSA is a process that will ensure: Answer 4 is the correct answer. The
word “ensure” is the giveaway in this
1. that business objectives are met question. CSA is a control tool that
addresses risks and the achievement
of objectives. However, it is virtually
2. that risk is addressed impossible to protect against all risks
all of the time. Answers 1, 2 & 3 list
3. that appropriate controls will be objectives that no tool can “ensure”.
put in place Therefore, answer 4 is the best
answer.
4. none of the above
3.4 Key risk indicator (KRI) has Answer 5 is the correct answer.
become more or less a standard with Answers 1, 2, 3 & 4 all list
risk assessment modeling. Which of considerations that should be
the following should be considered considered when developing a KRI
when developing a KRI model? model. Each process is different.
Therefore, even though KRI tools have
1. consider the different stakeholder become more or less standard they
that risk is addressed need to be adapted to each individual
process. Take special note of answer
2 that lists “COMMON SENSE”.
2. make a balanced selection of risk Models are nice in risk assessment
indicators including common but without common sense applied
sense none of the above they can be more of a trap than an aid.
4. traditional audit
4. provides recommendations to
process owners if process owner
decisions were not optimized
3-14 The role of internal audit in a Answer 3 is the correct and the best
self-assessment process is best answer because management can
described as: conduct a self-assessment process
without internal audit’s help. The key
1. necessary for the process to work is that the business clients understand
because auditors have experience the concepts and the tools needed to
in reporting make a self-assessment process work.
Answers 1, 2 & 4 are not correct
because, although the statements may
2. necessary because auditors have be true in some cases, they are not
the most knowledge about always true. In addition, the
objectives, risks, and controls responsibility for a self-assessment
process, if initiated by internal audit,
3. optional because management can should be eventually migrated to the
conduct a self-assessment process owners.
process without internal audit help
3.17 The monitoring of key risks is the Answer 3 is the correct answer.
prime responsibility of: Answers 1 & 2 can be eliminated as
auditors in any capacity would assist
1. internal auditors the process owners in the monitoring
of key risks. It is the process owners’
responsibility to monitor any risks.
2. external auditors This means that the process owners
must know how to identify the risks
3. process owners and how to monitor them. Individual
process owners are the closest to
individual process components.
4. Board of Directors Answer 4 can be eliminated. Probably
it would be correct to say that the
Board of Directors may be responsible
for the adequate management of key
risks as they have the ultimate
responsibility. But it would be the
process owners, maybe with the help
of auditors, who would report to the
Board of Directors the status of any
key risks.
DOMAIN IV:
CONSULTING ROLE OF
THE INTERNAL
AUDITOR (IA)
The objective of this module is to better prepare the participant to pass the
Certification in Risk Management Assurance Exam by discussing and
analyzing the technical dimensions of this domain while discussing
techniques to best manage multiple-choice questions.
The 1999 IIA Standards states that each internal audit organization should define
both assurance and consulting services in terms of what is appropriate for their
own organization, and those definitions should be formal and published in the
internal audit charter.
The IIA Standards clearly identify the opportunity for internal audit to increase its
contribution to the success of an organization by using consulting to add value
and improve an organization’s operation in a consulting role.
Well actually, the internal auditor cannot perform two functions at the same time.
The internal auditor either functions as an internal auditor or as a consultant.
When functioning as an internal auditor the internal auditor must function within
the specific guidelines of their professional practices. When functioning as a
consultant (risk and control expert consultant) it should be known to all involved
that the internal auditor is acting as a consultant and not an internal auditor.
Further, any internal auditor acting as a consultant on a specific project should
not perform any follow-up internal audit relative to the topics on that specific
project. This is professionalism and will help maintain internal audit
independence and objectivity.
Consultant:
The auditor as a consultant has long been debated. The question is: “should
internal auditors act as consultants or not”. In practice, some audit departments
say “no” and some say “yes”. In addition to further complicate this debate the
need or opportunity for internal auditors to act as consultants changes with the
needs of the business. Therefore, at any one point in time, an audit department
that says “yes” may at another time say “no”. An audit department that at one
point in time that says “no” may at another time say “yes”. This change in
opinion is most often a result of business needs and leadership.
Therefore, with all this confusion, it is probably best to understand what internal
auditors actually do, what consultants do, and how the professional practices
from the Institute of Internal Auditors provide guidance.
To discuss the consulting role of the internal auditor related to risk management
it is important to define what a consultant is and what a consultant does. Then a
comparison can be made between an auditor and a consultant. Taking an
increased involvement in risk management does not imply that the internal
auditor abandons auditing but that they increase their opportunities and the
benefits to the clients by increasing their use of consulting skills. One approach
to define a consultant is to use a dictionary that contains the following definition.
Using this definition it is clear that internal auditors are already acting as
consultants since the only purpose of internal audit is to provide professional
advice and products (audits reports and other services) to the organization.
Providing advice related to risk management is continuing to provide that advice
and those services or to expand the internal audit role further.
In 1999 The IIA revised its standards to reflect significant changes to what
internal auditing has become. An extract of those Standards follows. See
domain 1 for more details.
However the roles of full-time consultants and internal auditors have a number of
differences. Consultants report to whomever requests their services; auditors
report to the CAE who reports to the audit committee, the Board of Directors, and
top-level management. Consultants frequently have clients from various
organizations; an internal auditor may have many “individual clients” but all are
from the same organization. Consultants realize that payment ends when a
project ends; internal auditor projects end after each audit ends then they are
assigned a new audit (projects).
Consultants use the skills that make their employment preferred “their edge” and
continually market for additional assignments; auditors should make certain to
understand their “edge” and encourage requests for their services including risk
management.
199. Internal auditors acting as consultants would provide the most benefit to a
process owner if they explained:
CONSULTING SERVICES:
Consulting services are advisory in nature, and are generally performed at the
specific request of an engagement client. The nature and scope of the
consulting engagement are subject to agreements between or among
engagement client(s) and the consultant. As such consulting services generally
involve two parties: the person or group offering the advice (the internal auditor-
consultant) and the person or group seeking and receiving the advice (the
engagement client).
The IIA Standards apply to individual internal auditors and internal audit
activities. All internal auditors are accountable for conforming to the Standards
related to individual objectivity, proficiency, and due professional care. In
addition, internal auditors are accountable for conforming with the Standards,
which are relevant to the performance of their job responsibilities. Chief Audit
Executives are accountable for overall conformance with the Standards.
In order to provide this service most effectively and efficiently internal audit
should maintain communications with the process owners, upper-level
management, and the audit committee. The frequency and depth of this
communication should be determined by the eminent risk within the organization.
A consultant must develop the skills and abilities that are necessary to function
as a consultant. These skills and abilities include listening, (listening means
hearing what the other person is saying and concentrating on their meaning),
analyzing, synthesizing symptoms, identify the problem, and compiling a solution
or recommended solution.
Finally, it is necessary for the consultants to convince the client to believe what
they, the consultant, are saying.
Summary: Consulting:
163. A senior manager responsible for all warehouse operations has asked the
internal auditor, (a one auditor organization) to consult with that department to
develop new inventory control policies. As part of regulatory requirements, this
auditor must conduct an inventory audit within this warehouse department twice a
year. The auditor’s response to the manager should be:
See Application Questions, Answers & Explanations module for the answer.
SELF-ASSESSMENT
Self-Assessment - What is it?
In the simplest terms, this could be called a blood pressure self-assessment. But
there are lessons to be learned. The first lesson is that you have performed a
physical task of self-assessment by measuring your blood pressure. The next
issue is determining what the results means. What does 280 / 250 mean?
Considering this, there are three things that need to be included in a self-
assessment process. The first is the physical task of the self-assessment, the
second understanding the results, and the third controlling the results with action.
In this example, we may call our self-assessment process a blood pressure self-
assessment. Self-assessment is, therefore, measuring the adequacy of risk and
control management in one's own process and taking appropriate corrective
action.
Just as in our blood pressure example, the physical task is necessary when
performing a self-assessment process. In a Self-assessment process the
physical tasks are often in the form of questionnaires / surveys or workshops.
However, it is not only important to perform the physical task of the self-
assessment process but, as in the blood pressure example, it is necessary to
understand the results and act on them appropriately.
As we can be seen from the first example, the process can be applied in testing
your own blood pressure. In business, it can be applied to test the blood
pressure of the business process.
NOTE:
Although internal auditors are often called upon to perform the role of facilitator in
the self-assessment process, it is not necessary that internal audit be part of
the process or that they even participate in a self-assessment process. In
fact, as time passes, the ultimate goal is that the business professionals conduct
their own self-assessment workshops and projects. Depending upon the current
levels of experience, this transition may occur over varying lengths of time.
This opportunity for internal audit brings both opportunity and caution. The
opportunity is to assist the business process owners with their risk and control
management. The caution is that the internal audit professional must be careful
not to cross the line of objectivity and independence. The current Professional
Practices Framework published by The Institute of Internal Auditors will help
define the line of objectivity and independence required by the internal audit
professional.
The consulting section of this framework indicates that the internal audit
professional can come closer to the line of independence and objectivity than in
years past. However, internal auditors can still not cross the line of
independence and objectivity.
It should also be known by everyone involved that the internal auditor (voting
member), in order to maintain independence and objectivity, will not perform any
future audits of the area being discussed in the Self-assessment process. An
auditor not involved in the Self-assessment process should perform any future
audits of the area being discussed in the workshop.
From here, we can see a fine line even when internal auditors are voting
members of a self-assessment committee. As voting members internal auditors
may provide a more detail opinion of risk and control management than if they
were functioning as internal auditors. However, it is still important that
professionalism and perception of the internal auditor and the internal audit
profession be maintained.
A SELF-ASSESSMENT Overview:
• employees performing the work evaluate their own risks and controls
These training sessions may include the topics of risk and control management
or the CSA process in general. Additionally, they may include interviews with
potential participants to gain an understanding of their issues and concerns. It is
incumbent upon the facilitator (possibly an internal auditor) to identify the extent
and the need for these pre-CSA efforts.
The extent and need for these pre-CSA exercises should be driven by the
experience, exposure, concerns, politics, culture, and variations in
communications of the potential participants. The facilitator will need to identify
the components and design to address the pre-CSA engagements appropriately
for each case.
In some CSA workshops, discussions are not candid enough to get to the root
cause. The more at ease the participants are during the CSA exercise, the more
candid they will be. It is the responsibility of the facilitator to put the potential
participants at ease.
The more candid the participants are about their processes, identifying
both positives and negatives, the more likely weaknesses will be
addressed.
Candidness
The facilitator should discuss the potential of security and / or legal issues as a
topic of conversation in the pre-meeting rule setting stage. All participants should
be made aware that if such topics come into the conversation the facilitator will
end the conversation.
Note: the amount of effort and the amount of complexity of tools used to
determine the status of risks and controls in a process are controls by
themselves. Therefore, the amount of effort and the amount of complexity of
tools used should be driven by the perceived risks in the process.
Generally, the use of questionnaires is most appropriate for large audiences. For
example, where the risk and control specialists needs to obtain a general feeling
of the status of risks and controls from a large process and where it may be
impractical to have face-to-face meetings for economic, political, physical, or
timing reasons.
Avoid words that are emotionally charged. Emotions may cloud a question’s
intent and not clearly address the issue. Keep in mind, what is emotional to one
person may not be emotional to another.
Use a level of detail appropriate for the respondent. There are two objectives of a
questionnaire. The first objective is to maximize the number of responses. The
second objective is to maximize the accuracy of each response. Using a level of
detail that is appropriate for the respondent will help achieve these objectives.
Questionnaires: Summary
o organize by subject
o about, all, always, bad, could, ensure, few, less, more, never,
possible, several, sure
o these words can mean different things to different people and could
call for judgment
Self-Assessment Overview
Self-Assessment Benefits
• improves communications.
66. The self-assessment process can be a useful tool from two perspectives.
First self-assessment can help enhance a corporate governance knowledge base
with process owner participants. Second self-assessment develops an ownership
of apparent risks and the necessary corrective actions to mitigate those risks.
Which of the following is generally not a result of a self-assessment effort?
See Application Questions, Answers & Explanations module for the answer.
Simple terms
What is change?
• to do something different
• to continue on a journey
• to improve something
• to improve someone
Change
• develop specific methods, unique to each case, that will address the
barriers and remove them
One of the responsibilities of the change agent is to identify and understand the
business environment in which they are facilitating change.
A Trap: Many change agents try to force change processes outside of the
natural cycle. This is not to say that improvements may not be warranted in
these conditions. For example, it will be more difficult to change the mindset of
the current business culture when high growth or reward is apparent.
Consider that in times of high growth, significant profits, and high activity, risk will
increase. This is the vertical position on the growth curve. Conversely, controls
during this same period are low. By definition, the word controls means hold
back, tie down, constrain. Hence, the mention of controls, during the growth
period is perceived as something that will slow down the process and / or growth.
With this in mind, trying to convince a process owner to improve or implement
controls during the high growth period may be difficult.
On the other hand, when times are bad, on the downside of the growth curve,
profits and activities are low. Because process owners see this period as a
decrease in profits and possible trouble ahead they welcome internal controls,
asking change agents for help.
Gradual Change
One of the major reasons why change fails can be attributed to attempting to
change everything at once. Consider taking smaller steps and gradually
implementing the new approach. This more gradual process of introducing
smaller change events will help build confidence and collaboration among the
participants in the change effort. People like to be an active part of success, not
risk. Less fear of the unknown will help facilitate change.
Change Requires
• employee participation
• education
• participation
• support
• negotiation
• manipulation…. careful
• coercion…. careful
Self-Assessment Summary
In order to actively participate in a self-assessment process it is necessary
that the participants be familiar with risk and control management
(corporate governance). Hence their training, coaching, guiding, and
mentoring are actually a part of the self-assessment process. Because
these process owners now have a better understanding of risk and control
management they are better equipped to incorporate these concepts into
their daily activities as routine. When participating in the self-assessment
process the participant process owners actually help identify apparent key
risks and the appropriate controls to manage those key risks.
PROCESS IMPROVEMENT
Process improvement is a natural consequence of self-assessment. Whether it
is continuous improvement or business process reengineering - the focus is on
constantly and continually changing processes.
EDUCATION
A growing need for internal audit in-depth knowledge of internal controls has
created excellent opportunities for internal audit to provide education or training
to all levels of an organization from the Board of Director to direct supervisors.
The opportunities for these services are available because internal audits that
are performed throughout an organization provide unique views of risk in all of
the many areas of an organization.
The auditor-consultant can use a wide variety of tools and techniques both
those audit-related discussed in domain 2 and those used by consultants.
An example:
Internal audit can use the “train the trainer” concept to assist the general
population of the process owners so that they would better understand and
manage their own risks and controls.
The trainers would be from a risk management group (not internal audit). A
significant number of these professionals would be trained on an overview of risk
and control concepts and integrated control models. This would be a high-level
overview of risk and control concepts since these professional were already very
well acquainted with risk and control management. The purpose of this part of
the training is to bring the terminology of integrated control frameworks and risk
and control concepts to basic everyday language and away from the risk and
control professional jargon.
The objective of this risk and control group would be to spread the belief in risk
and control management in such a way that the process owners would embrace
the concepts and institute a risk and control management philosophy appropriate
for each individual process and begin so the process owners could manage their
own risks and controls.
The following graph describes some of the concerns that internal audit must
overcome to successfully become involved as consultants.
With the significant changes in the current business environment internal audit
can help process owners address both current and emerging risks from
circumstances that arise from situations beyond an organization’s capacity to
control. These emerging risks do not mean that they are beyond the capacity of
the organization to manage (control) it means that the organization generally has
no control over the events occurring (external risks). These types of risks, from
such integrated organizations, if not managed may have impacts not only on the
organization but on multiple entities and organizations across geographic
borders, and industries (ripple down effect).
For example drastic changes in oil prices may impact multiple organizations,
industries, and customers worldwide. Another example is drastic changes in
interest rates. This could also impact multiple entities. So the importance of
managing emerging risks is an extremely important part of overall risk
management. See Domain 2 for a partial list of emerging risks.
Internal audit can education process owners and top-level managers to help
them better understand these complex environments and the complex processes
that exist.
Summary:
Internal audit’s in-depth knowledge of internal controls has created
excellent opportunities for internal audit to provide education or training to
all levels of an organization from Board of Directors to direct supervisors
about many of the features of risk management including services that
internal audit can provide. These services are available because of the fact
that internal audits are performed throughout an organization providing
unique views of risks gained from a history of audits in all of the many
areas of an organization.
4.1 The question of independence and Answer 4 is the correct answer. Answer
objectivity has been a cornerstone of 1 can be eliminated because of the word
internal audit since its inception. “never”. Answer 2 could be correct
Therefore: because there are some circumstances
where internal auditors may provide
1. internal auditors can never provide control guidance. For example, when
specific control direction an internal auditor is acting as a
consultant providing more specific
control guidance. However, an
2. internal auditors may provide awareness and management of the
control guidance under some independence and objectivity is still
circumstances necessary. Also, answer 2 is not very
specific as it implies may provide
3. because of some flexibility, internal control guidance. Internal auditors
auditors when conducting an must always, whether acting as a
internal audit may provide specific consultant or an internal auditor, be
control direction aware of the required independence and
objectivity boundaries and manage
them appropriately. Answer 3 can be
4. internal auditors must, always, be eliminated because it is not appropriate
conscious of the independence and to provide specific control guidance
objective requirement of their when conducting an internal audit.
professional practices
4.2 The risk formula to determine the Answer 1 is the correct answer. The
probability of a control failure is: modified annual loss expectancy is the
correct answer and the formula that will
1. the modified annual loss expectancy help determine the probability of a
control failure. Answer 2 is included in
answer 1 that is a broader answer.
2. the annual loss expectancy Answer 3 is not correct as answer 1 is
correct. Answer 4 can be eliminated.
3. the none of these answer Although it may sound relative to risk
assessment this question answer just
lists a set of random words.
4. modified risk versus control failure
probability
4.3 The Internal Audit Profession has Answer 2. is the correct answer.
expanded its scope from many years Considering the technical capabilities
past when compliance audit was the only may not be the best choice for a
norm to today when internal auditors consulting engagement. As well, does
now serve a consultative role. What technical expertise imply technical
should be considered when selecting expertise in internal auditing or in some
internal auditors to function as subject or both? Consulting is not like
consultants: traditional auditing. Answer 3 is a very
general statement not appropriate for
1. focus on internal audit staff he this question. This is also true for
technical expertise from the answer 4.
3. an operational auditor
4. a consultant
4.6 Which type of risk would require the Answer 3 is the correct answer. The
most coaching, mentoring and type of risk which is most often not
convincing to process owners by an understood and hence is not addressed
internal auditor-consultant? adequately by process owners is
external risk. Hence, the auditor-
1. internal risk consultant would have to spend more
time educating and convincing process
owners about the importance of
2. incorporated risk addressing external risk. Answers 1 & 4
are not correct as process owners are
3. external risk usually familiar with these types of
risks. Answer 2 just list an arbitrary
term so can be eliminated.
4. financial risk
4.7 One good objective that will help Answer 4 is the correct answer. Also it
enhance corporate governance is to is probably the most important answer.
spread risk and control concepts and However, answer 3 should be a first
philosophy among as many process consideration. If the individuals
owners as possible. One way to do this delivering the message are not
would be to train trainers. That is to passionate about delivering the
train a few in risk and control concepts message it will not work no matter how
and presentation techniques so they much training they receive. Next
can train other general process owners. considerations are answers 1 & 2.
A method of selecting these trainers There could be someone passionate
would be: about the message however they may
be weak in the topic or presentation
1. determine presentation and public skills. However, once recognized these
speaking abilities two issues could be addressed with
appropriate coaching and training.
Once these have been addressed
2. ensure they have a technical answer 3 becomes the driving force for
competence in the topic to be success.
delivered
3. assurance auditing
4. consulting
4.9 What would be a viable approach to Answer 4 is the correct answer. The
convince upper-level management that consulting role of internal audit is often
consulting for internal audit to further new to audit management and to upper-
benefit an organization? level organizational management.
These management groups are more
1. ensure that internal audit will not familiar with traditional audit services.
abandon traditional audit work for For years this was the role that internal
consulting activities audit performed. Hence this was the
role that audit management and
organizational management perceived
2. convince that internal audit / about internal audit. So to move
consulting is an expansion and management from a traditional comfort
extension of traditional audit and with internal audit services to a new
can provide additional benefits to area of benefit introducing consulting
the organization may take some convincing, education,
mentoring, and demonstrations.
3. demonstrate by specific examples Answers 1, 2 & 3 list viable approaches
the benefits of consulting to do that.
1. consulting
2. assurance
3. traditional audit
4. continuous monitoring
4.13 A caution, that must be realized by Answer 4 is the correct answer. One of
the internal auditor-consultant, when the problems with doing a job well is
increasing the perception and benefit to that this generates more requests for
the process owner client is: work. In this case consulting. In
answer 1 substantial requests for
1. requests for consulting may consulting can divert resources from
encroach into needed traditional traditional needed audit work. There are
audit work time only two ways to manage this. The first
is to deny requests. This however will
discourage future requests, needs, and
2. funding for the internal audit / benefits. The second is to hire
consultant additional auditor-consultants. Denying
requests will deteriorate the consulting
3. resource allocations effort. Hiring additional staff will
increase the budget. Answer 2 & 3 list
the concerns of funding and resource
4. all of the above allocation – always concerns. Should
the internal audit department incur the
funding for consulting engagements,
should they charge the client by the
hour, or day, or appropriately allocate to
the various process units. The funding
issue and administration is one that
many internal audit departments
struggle with. How funding is managed
should be up to the organization. One
recommendation is to keep is simple.
Suggested
Additional References
Appendices
Note:
1) Sarbanes-Oxley (SOX)
2) Financial Ratios Useful in Risk Management
3) Some Comments about Sampling Useful in Risk Management
4) Financial Institution Regulations Related to Risk Management
5) Some Probing Questions to Help Understand Client’s Problems
6) Diagnostic Questions to Help Understand Client’s Problem
Sarbanes-Oxley (SOX)
a Process-Based Approach that can Help Mitigate Risk
The role of corporate governance and the role of those who manage corporate
governance have changed substantially over recent years.
Title 2
Auditor Independence
Title 3
Corporate Responsibility
Title 4
Enhanced Financial Disclosures
Title 5
Analyst Conflicts of Interests
Title 6
Commission Resources and Authority
Title 7
Studies and Reports
Section 701 GAO Study and report regarding consolidation of public accounting
firms
Section 702 Commission
Study and Report regarding credit rating agencies
Section 703 Study and report on violators and violations
Section 704 Study of enforcement actions
Section 705 Study of investment banks
Title 8
Corporate and Criminal Fraud Accountability
Title 9
White Collar Crime Penalty Enhancements
Title 10
Corporate Tax Returns
Section 1001 Sends of Senate regarding the signing of corporate tax Returns by
Chief Executive Officers
Title 11
Corporate Fraud and Accountability
Two separate certification sections under SOX specify civil and criminal
consequences (Section 302) (civil provision (Section 906) (criminal provision).
The most contentious aspect of SOX is Section 404, which requires management
and the external auditor to report on the adequacy of the company's Internal
Control over Financial Reporting (ICFR).
Section 906 mandates severe penalties for corporate officers who certify the
required statements in violation of the section. For those CEOs and CFOs who
certify the statement knowing that the report accompanying the statement does
not comport with all the requirements of the section, the maximum penalties are
a $1 million fine, and/or 10 years in prison. The maximum penalties increase to a
$5 million fine, and/or 20 years in prison for corporate officers who willfully certify
the statements.
The Mail Fraud Section 903 of the Act increases the maximum imprisonment
time for mail fraud and wire fraud from 5 years to 20 years.
The Mail Fraud provisions of the Act amend the existing federal mail fraud statute
by adding new offenses.
SOX section 807 adds a section relating to securities fraud. This allows for the
imposition of fines and/or a 25 year maximum term of imprisonment on anyone
who "knowingly executes, or attempts to execute, a scheme or artifice to defraud
any person in connection with any security of an issuer or to obtain, by means of
false or fraudulent pretenses, representations, or premises, any money or
property in connection with the purchase or sale of any security of an issuer.
SOX section 902 adds a section clarifying the attempt or conspiracy to commit an
offense under the federal mail fraud statute.
The Employee Retirement Income Security Act (ERISA) of 1974 Section 904
increases the maximum penalties for violation of the reporting and disclosure
provisions of from a $5,000 fine or 1 year in prison, or both, to a $100,000 fine
and/or 10 years in prison. The maximum fine for entities is increased from
$100,000 to $500,000.
SOX section 1102 amends the existing criminal obstruction of justice statute,
making it a crime to corruptly alter, destroy, or conceal a document with the intent
to impair the object's integrity or availability for use in an official proceeding or
otherwise obstruct any official proceeding. An attempt to do any of these acts is
accorded the same treatment as the act itself, meaning imposition of fines
and/or up to 20 years imprisonment.
SOX section 1106 increases the maximum penalties for violation of the 1934
Act from $1 million or 10 years imprisonment, or both, to $5 million or 20 years
imprisonment, or both. In addition, the maximum fine for an entity's violation of
the 1934 Act is increased from $2.5 million to $25 million. This enhances the
Federal Sentencing Guidelines in Sections 805, 905, and 1104. The Act
mandates the U.S. Sentencing Commission to review and amend, as appropriate,
the Federal Sentencing Guidelines and related policy statements concerning
certain offenses by January 26, 2003 to ensure that the penalties and
enhancements are adequate to deter and punish the conduct addressed by the
Act.
SOX section 1107 expands the portions of the obstruction of justice statute
dealing with retaliating against a witness, victim, or an informant. The new
offense makes it unlawful to "knowingly, with the intent to retaliate, take any
action harmful to any person, including interference with lawful employment or
livelihood of any person". Further, for providing to law enforcement truthful
information relating to the commission or attempted commission of any federal
offense. Such a crime is punishable by a fine and/or imprisonment for a
maximum of 10 years.
Both management and the external auditor are responsible for performing their
risk assessment, which requires management to establish the scope of its
assessment on evidence gathered on risk. There are mmandated severe
penalties for corporate officers who certify the required statements, which are in
violation of the section. For those officers who certify statements knowing that
the report does not comply with all the requirements of the section, the maximum
penalties are a $1 million fine, 10 years in prison, or both. The maximum
penalties increase to $5 million and 20 years in prison, or both, for corporate
officers who willfully certify the statement knowing that the periodic report
accompanying the statement fails to comply with all of the requirements of the
section.
Income
Profitability
Liquidity
Working Capital
Bankruptcy
Long-Term Analysis
Coverage
Leverage
Income Ratios
An increase in sales will necessitate more operating assets at some point (sales
may rise without additional investment within a given range); conversely, an
inadequate sales volume may call for reduced investment. Total operating
assets = total assets - (long-term investments + intangible assets)
Note: This ratio does not measure profitability. Remember, over-investment may
result in a lack of adequate profits.
Analyzing changes in this figure over several years can identify whether it is
necessary to examine company policies relating to credit extension, markups (or
markdowns), purchasing, or general merchandising (where applicable).
Note:
An increase in gross margin may result from higher sales, lower cost of goods
sold, an increase in the proportionate volume of higher margin products, or any
combination of these variables.
This ratio reveals the profitability of sales resulting from regular business as well
as buying, selling, and manufacturing operations.
Note:
Operating income derives from ordinary business operations and excludes other
revenue (losses), extraordinary items, interest on long-term obligations, and
income taxes.
Acceptance Index
Applications Accepted
= Acceptance Index
Applications Submitted
Obviously, a high sales volume that comes from just two or three major accounts
is much riskier than the same volume coming from a large number of accounts.
Losing one out of three major accounts is disastrous, while losing one out of 150
is routine. A growing firm should try to spread this risk of dependency through
active sales, promotion, and credit policies. Although the quality of customers
stems from your general management policy, the quantity of newly opened
accounts is a direct reflection on sales and credit efforts.
Note:
Profitability Ratios
Closely linked with income ratios are profitability ratios, which shed light upon the
overall effectiveness of management regarding the returns generated on sales
and investment.
Will average markup on goods normally cover expenses and, therefore, result in
a profit? If gross profit rate is continually lower than your average margin,
something is wrong! Look for downward trends in your gross profit rate. This is
a sign of future problems for your bottom line.
Note:
This percentage rate can — and will — vary greatly from business to business,
even those within the same industry. Sales, location, size of operations, and
intensity of competition are all factors that can affect the gross profit rate.
This ratio provides a primary appraisal of net profits related to investment. Once
basic expenses are covered, profits will rise disproportionately greater than sales
above the break-even point of operations.
Note:
Sales expenses may be substituted out of profits for other costs to generate even
more sales and profits.
Note:
If financial charges are great, compute a net operating profit rate of return instead
of return on assets ratio. This can provide an important means of comparison.
This profitability ratio compares operating income to operating assets, which are
defined as the sum of tangible fixed assets and net working capital.
This rate, which may be calculated for the entire company or for each of its
divisions or operations, determines whether there is efficient use of your assets.
The percentage should be compared with a target rate of return that you have set
for the business.
Earning Power
Net Sales EAT
X = Earning Power Ratio
Tangible Net Worth Net Sales
The Earning Power Ratio combines asset turnover with the net profit rate. That
is, Net Sales to Tangible Net Worth (see "Income Ratios") multiplied by Net Profit
on Net Sales (see ratio above). Earning power can be increased by heavier
trading on assets, by decreasing costs, by lowering the break-even point, or by
increasing sales faster than the accompanying rise in costs.
Liquidity Ratios
While liquidity ratios are most helpful for short-term creditors / suppliers and
bankers, they are also important to financial managers who must meet
obligations to suppliers of credit and various government agencies. A complete
liquidity ratio analysis can help uncover weaknesses in the financial position of
your business.
Current Ratio
Current Assets*
= Current Ratio
Current Liabilities*
Popular since the turn of the century, this test of solvency balances your current
assets against your current liabilities. The current ratio will disclose balance
sheet changes that net working capital will not disclose.
* Current Liabilities = all debt due within one year of statement data
Note:
The current ratio reveals your business's ability to meet its current obligations. It
should be supplemented with the other ratios listed below.
Quick Ratio
Cash + Marketable Securities + Accounts Receivable (net)
= Quick Ratio
Current Liabilities
Also known as the "acid test," this ratio specifies whether your current assets that
could be quickly converted into cash are sufficient to cover current liabilities.
Until recently, a Current Ratio of 2:1 was considered standard. A firm that had
additional sufficient quick assets available to creditors was considered in sound
financial condition.
Note:
The Quick Ratio assumes that all assets are of equal liquidity. Receivables are
one step closer to liquidity than inventory. However, sales are not complete until
the money is in hand.
Note: The Absolute Liquidity Ratio only tests short-term liquidity in terms of cash
and marketable securities.
If for some reason all revenues were to suddenly cease, the Basic Defense
Interval would help determine the number of days your company can cover its
cash expenses without the aid of additional financing.
Receivables Turnover
Total Credit Sales
= Receivables Turnover Ratio
Average Receivables Owing
Note:
The Average Collection Period (ACP) is another litmus test for the quality of
receivables business, giving the average length of the collection period. As a
rule, outstanding receivables should not exceed credit terms by 10-15 days. If
you allow various types of credit transactions, such as a retail outlet selling both
on open credit and installment, then the ACP must be calculated separately for
each category.
Note:
Discounted notes which create contingent liabilities must be added back into
receivables.
Inventory Turnover
Cost of Goods Sold
= Inventory Turnover Ratio
Average Inventory
It is often believed that increased sales can solve any business problem. This
may be true to some degree. However, sales must be built upon sound policies
concerning other current assets and should be supported by sufficient working
capital.
There are two types of working capital: gross working capital, which is all current
assets, and net working capital, which is current assets less current liabilities.
This ratio helps ascertain whether the business is top-heavy in fixed or slow
assets. This ratio complements Net Sales to Tangible Net Worth (see "Income
Ratios"). A high ratio could signal overtrading.
Note:
A high ratio may also indicate that the business requires additional funds to
support its financial structure, top-heavy with fixed investments.
Business should not have debt that exceeds invested capital. This ratio
measures the proportion of funds that current creditors contribute to operations.
Note:
Funded debt (long-term liabilities) = all obligations due more than one year from
the balance sheet date
Note:
Bankruptcy Ratios
Ratios can help predict bankruptcy before it's too late for a business to take
corrective action and for creditors to reduce potential losses. With careful
planning, predicted futures can be avoided before they become reality. The first
five bankruptcy ratios in this Module can detect potential financial problems up to
three years prior to bankruptcy. The sixth ratio, Cash Flow to Debt, is known as
the best single predictor of failure.
This liquidity ratio, which records net liquid assets relative to total capitalization,
is the most valuable indicator of a looming business disaster. Consistent
operating losses will cause current assets to shrink relative to total assets.
Note:
A negative ratio, resulting from negative net working capital, warns of potential
serious future problems.
New firms will likely have low figures for this ratio, which designates cumulative
profitability. Indeed, businesses less than three years old fail most frequently.
How productive are your business' assets? Asset values come from earning
power. Therefore, whether or not liabilities exceed the true value of assets
(insolvency) depends upon earnings generated.
Note:
Maximizing rate of return on assets does not mean the same as maximizing
return on equity. Different degrees of leverage affect these separate
conclusions.
Note:
Equity to Debt
Market Value of Common + Preferred Stock
= Equity to Debt Ratio
Total Current + Long-Term Debt
This ratio shows how much a business' assets can decline in value before it
becomes insolvent.
Note:
Also, refer to "Debt Cash Flow Coverage Ratio" in the section on "Coverage
Ratios."
© 2013 Contemporary Business Concepts, LLC, Danbury, Connecticut USA 263
McKeever CRMA Study System Appendix 2 Types of Ratios Important in Risk Management
Since debt does not materialize as a liquidity problem until its due date, the
closer to maturity, the greater liquidity should be. Other ratios useful in predicting
insolvency include Total Debt to Total Assets (see "Leverage Ratios" below) and
Current Ratio (see "Liquidity Ratios").
Note:
Long-Term Analysis
This ratio determines the degree of protection linked to short-term and long-term
debt. More net working capital protects short-term creditors.
Note:
A high ratio (significantly above 100 percent) shows that if liquidation losses on
current assets are not excessive, long-range debtors can be paid in full from
working capital.
Relative financial strength and long-term liquidity are approximated with this
calculation. A low ratio points to trouble, while a high ratio suggests that there
will be less difficulty meeting fixed interest charges and maturing debt
obligations.
Rarely should a business' total liabilities exceed its tangible net worth. If it does,
creditors assume more risk than stockholders. A business handicapped with
heavy interest charges will likely lose out to its better financed competitors.
Coverage Ratios
The Times Interest Earned Ratio shows how many times earnings will cover
fixed-interest payments on long-term debt.
I = interest payments
s = payment on principal figured on income after taxes (1 - h)
This ratio goes one step further than Times Interest Earned, because debt
obliges the borrower to not only pay interest but to make payments on the
principal as well.
Leverage Ratios
Note:
Equity Ratio
Common Shareholders' Equity
= Equity Ratio
Total Capital Employed
Note: Residual owners of the business supply slightly more than one half of the
total capitalization.
A high ratio here means less protection for creditors. A low ratio, on the other
hand, indicates a wider safety cushion (i.e. creditors feel the owners’ funds can
help absorb possible losses of income and capital).
If business is growing, track this ratio for insight into the distributive source of
funds used to finance expansion.
Debt Ratio
Current + Long-Term Debt
= Debt Ratio
Total Assets
Common-Size Statement
This technique is quite useful when you are comparing one business to another
business or to averages from an entire industry, because differences in size are
neutralized by reducing all figures to common-size ratios. Industry statistics are
frequently published in common-size form.
When comparing your company with industry figures, make sure that the
financial data for each company reflect comparable price levels and that it was
developed using comparable accounting methods, classification procedures, and
valuation bases.
For example, when doctors take a sample of blood, doctors are able
to make determinations about the health of their patient from the
sampled blood taken. The doctors do not have to draw all of the
blood from the patient to make determinations about the patient’s
health. When people sample food they may take a taste of the meal
to determine if it meets their taste specifications. Generally, people
do not have to eat the entire meal to determine if they liked it or not.
The question is how can the sample be designed so that the sampler
can be comfortable that the sample represents the population or
universe?
Note:
The purpose of this job aid is to provide the auditor with sampling tool
options for the most common internal audit sampling technique,
attribute sampling.
The intent of this job aid is not to transform internal auditors into
statisticians.
Note:
There are two steps necessary when developing a sample. The first
step is to develop the sample size. This can be done statistically or
judgmentally. The second step is to select the chosen sample items
from the population or universe.
Rule:
Statistical Sampling:
For the purposes of this job aid attribute sampling statistical model
will be discussed. Attribute sampling is the most common statistical
sampling tool used by internal auditors.
There are other statistical models that can be used when testing for
other than yes or no characteristics.
The universe size from which the sample is to be drawn has little, but
some, impact on the sample size. So do not be afraid of developing
a statistical sample from a large population or universe. It is the three
components that will impact the sample size.
Rule of Thumb:
The more confident, the more precise, and the higher the error rate
the higher the sample size. The impact on the sample size is driven
by these components in their respective order.
Consider this; the more confident and precise the opinion, the larger
the sample size. Basically, if 100% confidence is required 100% of
the universe would have to be tested. So anything less than 100% of
the population or universe being tested will have some amount of
inherent error in the opinion. That means there is a chance that the
opinion about the universe, derived from the characteristics of the
sample, is not true.
Rule of Thumb:
The amount of audit work, hence the larger the sample size should
be driven by the identified risk.
To determine the error rate for the statistical sample formula take a
judgmental sample, perform the required tests on the judgmental
sample, and determine the error rate. Apply this error rate to the
statistical formula. If the error rate can not be determined by the
judgmental method use a 50% default as an error rate (maximum).
More errors in the population require a larger sample size. Document
the methodology in the work papers.
Math Stuff:
The purpose of this job aid is to take some of the fear out of statistical
sampling and to outline some of the basic rules of sampling as an
available tool in the internal audit profession. Again Larry Sawyer’s
book is a good reference.
ne = Z2p(q)
e2
ne = sample size
z = confidence level
p = anticipated error rate
q = 1- p
e = precision
Note:
How confident and how precise do the auditors want their opinion?
In addition, what will be the anticipated estimated error rate? Simply
stated the error rate can be related to the difficulty of the task being
sampled. For example, what is the likelihood that the persons
performing the task will make an error while performing the task?
Next what is the likelihood that the auditor testing the sample will
make an error when testing the sample? This concern can also be
related to the difficulty of the task. When the auditor is performing a
simple test on the sample it is less likely that the auditor will make an
error in the test. The error risk will increase with the complexity of the
test being conducted.
After the sample size has been determined the selection of the
sample from the universe has to be completed. Remember one of
the rules of statistical sampling and of being able to project the tested
opinion to the universe is that everything in the universe has an equal
and unbiased chance of being selected.
There are two basic methods for satisfying this rule. The first is to
select the sample randomly, preferably from a random table
generator. The second method is by interval selection. Although not
as independent as random table selection, the interval selection, if
done correctly, can provide adequate independence of the sample
selection. Interval selection is a good tool if a random table generator
or table is not available.
The first step in interval selection is to divide the sample size into the
universe the result is the interval. Next pick a random UN-biased
starting point this can be accomplished by using a serial number
character from a dollar bill, a random selection of a phone number in
a phone book, etc. Start with the number identified from this method
and pick every item on the interval. Starting with the number one is
fine. However using a random UN-biased starting point starting
point will add an extra level of independence to the selection process.
Point To Remember:
Before any sampling tools are applied, determine the objective of the
sample and the characteristics of the universe from which the sample
is to be drawn.
The Consideration
Important Note:
These regulations are so cumbersome that their necessity is debated. Some say
yes some say no. Either way they are the regulations required in the banking
industry in the United States.
Part 208 (Regulation H) Membership of State Banking Institutions in the Federal Reserve System
Part 209 (Regulation I) Issue and Cancellation of Federal Reserve Bank Capital Stock
Credit by Bankers and Persons other than Broker Dealers for the
Part 221 (Regulation U)
Purpose of Purchasing or Carrying Margin Stock
Part 223 (Regulation W) Transactions Between Member Banks and Their Affiliates
Part 225 (Regulation Y) Bank Holding Companies and Change in Bank Control
Part 232 (Regulation FF) Obtaining and Using Medical Information in Connection with Credit
Part 235 (Regulation II) Debit Card Interchange Fees and Routing
Diagnostic Questions
• What caused the problem? Find root causes, do not just look
at the surface
• What do others think the problems are? Find out from the
others?
Application
Questions
Notes:
Then check your answer and read the explanation for that question in the
Application Questions, Answers & Explanations module.
2. Which, in the correct sequence, are the four necessary steps in risk
management?
3. The We Make It For You Company provides custom-made products and parts
on demand for a number of domestic and international companies. In general, the
parts are made to specification and then shipped to the ordering company for
inclusion in their final products. In terms of risk which of the following categories
of risk would or should most, concern the We Make It for You Company?
a. country risk
b. transaction risk
c. credit risk
d. reputation risk
Which of the following are not excerpts from the professional practice guidelines
for internal auditors?
a. shall not accept anything that may impair or be presumed to impair their
professional judgment.
b. internal auditors make a balanced assessment of all the relevant
circumstances and are not unduly influenced by their own interests or
by others in forming judgments.
c. this participation includes those activities or relationships that may be
in conflict with the interests of the organization.
d. none of the above
7. One of the most significant differences between the control objectives of the
COSO model and the ERM model is:
8. The Senior Vice President of Operations reports directly to the Chairman and
President of Products Inc. This is a family-owned company which has grown
substantially over the past few years. Now named Products International its
growth can be attributed mostly to the purchase of three international companies.
These newly-purchased companies provide similar products as the parent
company and were also looking to expand to international markets. As all of
these companies provide generally the same products which type of operating
system is Products International?
a. sharing
b. avoiding
c. prioritizing
d. accepting
10. There are four basic tasks necessary when conducting a risk management
exercise. These tasks are: identify the risk, measure the risk, prioritize the risk,
and act on the risk. Which of the following would not be considered part of the
act task?
a. share
b. avoid
c. prioritize
d. accept
a. customer expectations
b. reputation
c. information integrity
d. all of the above
13. At a recent conference a panel of Audit Committee members was asked if that
conference was addressing the areas that concern Audit Committees.
One member reviewed a copy of the program and stated the program was generally
addressing those issues. That member stated a concern about a session called
“Internal Auditors as Consultants”. He stated, “I am not certain that I want my
internal auditors to become consultants “.
14. A customer is very upset with a person who treated him very rudely. The
customer stated that they would never shop at that store or any other store in that
chain in the future. What type of risk is this?
a. information integrity
b. reputation
c. customer expectations
d. all of the above
15. Objectives are a very important element for the success of any process. Which
of the following would most likely be the root cause of risk among and within
various processes when consequences are not adequately considered?
17. Stakeholders in a company can take many forms. They can range from the
Board of Directors to every employee at any level within the company. External
stakeholders can be stockholders or other investors, customers, suppliers,
contractors, and others. Internal stakeholders consist of executives; upper-level,
middle-level, and lower-level management; and non-management employees. In
terms of ethics and the ethical tone, who should establish and monitor the ethical
tone for the external stakeholders and their relationship with the company?
What risk was addressed by having this current and functioning business
continuity and contingency plan?
a. information integrity
b. reputation
c. customer expectations
d. all of the above
22. Which of the following would be the best organizational culture to implement
organizational objectives when there were concerns with wrongdoing activities?
a. role
b. power
c. achievement
d. person / support
25. There are a number of risk mitigation scenarios. In simple terms some of
these scenarios generally are: risk acceptance (the process owner accepts the
risks and the consequences of the risk), risk transfer (means that some of the risk
is transferred to another entity or process (an example is insurance), and risk
reduction (decreasing the impacts of risk by applying controls at the right time in
the right amount). What is a description of risk contingency?
28. The Rules of Conduct of The IIA Code of Ethics covers which of the following:
a. competency
b. confidentiality
c. integrity
d. objectivity
e. all of the above
29. Product and service quality risk can best be defined as:
31. The newest software that you sold in 30 countries has a serious flaw that
miscalculates sales. Consequently the software sometimes ships duplicate
orders without charging the customer. This risk is an example of:
a. country risk
b. transaction risk
c. credit risk
d. reputation risk
32. The COSO integrated control model incorporates five components and three
control objectives. These 15 dimensions of a process allow for developing an
analysis of the process. Which of the following dimensions describes an
understanding of a Code of Ethics or Code of Conduct document?
34. Which of the following risk categories would have the most impact and the
longest impact if the risk occurred?
35. The ERM integrated control model specifies more detail in risk assessment
than does previous integrated control models. In the ERM model which of the
following most closely represents the appropriate amount of controls that should
be applied to risk?
a. risk tolerance
b. risk response
c. risk appetite
d. event identification
a. impact
b. exposure
c. threat
d. probability
40. The IIA control objectives do not include which of the following control
objectives?
a. capital requirements
b. differentiation of product
c. switching costs
d. cost disadvantage
a. competency
b. reasonably prudent
c. infallibility
d. due diligence
44. As the CAE you met with the Audit Committee recently. One of the Audit
Committee members described an article they read recently about the
“assurance” function of internal auditors and asked the question whether or not
all the SOX efforts performed in the last few years was the same as the
“assurance” function. You answered that:
45. The Rental For You And Save Company, providing day-to-day items for short-
term use, has been in business for 22 years. This company provides products for
short-term use such as lawn furniture, household furniture, electronics, and even
tools. The company’s objective is to help customers who may need such items
for short-term use and who realize that it is not worthwhile to purchase such
items. The average rental time is one month. Contracts are signed with the
renters to return the items in the same condition as they were rented.
Although the number of times an item can be rented can vary depending on the
product, the average number of rental times for all items is currently 14.4 times.
Prior to five years ago, the average number of times for the rental of all items was
19.8 times. In general, the more wear and tear on rented items the fewer times
they can be rented. In order to maintain company success the average time
objective for all items rented is 13.6 times. There has been a steady decrease
from 19.8 to 14.4 over the past five years. Management began to become very
concerned with this trend particularly when the number reached 14.4 times. This
difference between the 13.8 objective and the old number of 19.8 compared to the
13.8 objective versus the new number of 14.4 times can best be described as:
a. risk development
b. risk assessment
c. a statistical process SPC risk variation range
d. risk tolerance
48. A balanced score card is a tool familiar to quality professionals and process
owners alike. What are two characteristics of a balanced score card?
a. is the current risk assessment significantly different than the prior one
b. is the plan aligned with risk concerns of the Board of Directors and top
management
c. is the audit staff challenged and able to address new technologies,
business strategies, and products and services
d. all of the above
50. Outsourcing, staffing projects with outside consultants, has become common
practice in recent years. There can be substantial cost savings as well as a
decrease in administrative activities when hiring staff members who will only be
need for specific short-term projects. Therefore, there can be benefits to
outsource when used correctly. Many times these types of outsourced projects
require an exchange of information technology between and among the host
company and the consultant and from the consultant and the host company.
Which of the following controls would not be a consideration when outsourcing?
51. There are a number of risk assessment tools available which can help process
owners manage their risks. Some of the more contemporary tools are integrated
control frameworks. Which of the following integrated control frameworks
facilitates the most detail of risk?
a. COSO
b. ERM
c. CoCo
d. COBIT
52. Focusing on Key Processes, Activities, and Controls rather than doing
generalized audits of functions can drastically increase the effectiveness of the
internal assurance function of internal audit. Building continuous monitoring into
every system and process provides both the process owner and the auditor with
greatly enhanced ability to maintain quality systems on a concurrent basis. One
important key to success is to consistently leverage IT resources. Continuous
audit utilizing IT techniques would facilitate:
54. A significant shift to a new vision of compliance and ethics has emerged over
the past few years. This shift has enhanced greater efficiency in processing and
management of information, effectiveness in ensuring corporate governance and
the agility to address rapidly changing business environments. This new vision of
ethics and compliance includes; an enhanced alignment with stakeholder
demands for transparency and accountability; an increased opportunity to take
advantage of emerging technologies; and:
57. Supervisory internal controls should be integrated into the normal operations
of processes. These should include management and supervisory activities such
as:
58. Identifying threats that could harm or adversely impact a process would be:
a. scope
b. background
c. purpose
d. findings
62. The CFO of a medium-size company has just been told by the Board of
Directors that the company has to decrease operating budgets by 10% across the
board. The company’s operating budget is currently $124,000,000. There are 5
departments within the company that will be impacted by the decrease.
Departments 1 and 3 receive 25% of the budget cut each. One department
receives 20% of the budget cut. Two departments receive 15% of the budget cut
each. The CFO immediately initiates two budget-cutting policies. The first is to
eliminate all food for staff meetings. The next is to cut all training effective at the
end of the month. It is estimated that cutting these two items immediately will
achieve 6% of the necessary budget cuts. So a further cut of 4% is required. The
actions that this CFO has implemented are:
a. corrective
b. reactive
c. directive
d. preventive
a. an indication that the risk appetite and risk tolerance are achieved
b. a backward looking view on risk events, so lessons can be learned from
past events
c. an early warning: a proactive action can take place
d. all of the above
64. Which section of SOX requires the auditor to document and test the
effectiveness of internal controls of IT systems?
a. 301
b. 302
c. 906
d. 404
a. industry surveys
b. professional associations
c. history
d. other professionals
e. all of the above
66. The self-assessment process can be a useful tool from two perspectives.
First self-assessment can help enhance a corporate governance knowledge base
with process owner participants. Second self-assessment develops an ownership
of apparent risks and the necessary corrective actions to mitigate those risks.
Which of the following is generally not a result of a self-assessment effort?
69. During an audit it is observed that a number of expense vouchers have been
pre-signed by an approving level authority and are stored in an unsecured desk
drawer. The auditor challenged the supervisor of the department who indicated
that the approving individual traveled often so they had these vouchers pre-
approved for efficiency reasons. That way there would not be a delay in securing
payment because the approving person was on the road. Convincing and explain
to the supervisor that because of audit, good management, and security reasons
this was not a good policy and must be corrected. Correcting this issue in the
future on these documents is what type of a control?
a. detective control
b. preventive control
c. corrective control
d. administrative control
70. One of the tools that can be used to provide an evaluation that key risks are
adequately evaluated is operational auditing. Which of the following would not be
a result of an operational audit?
72. When an internal control in the Accounts Payable Department failed that
would be best categorized as what type of risk?
a. risk management
b. prioritize
c. measure
d. identification
74. One local organization owns 15 fast food breakfast and lunch mini
restaurants. These restaurants have been strategically located in high-density
geographic locations.
They cater to many of the employees of the various businesses in the area. This
operation has grown from two such restaurants two generations ago to its current
status. The CEO of the company has an MBA. The CEO has become concerned
with the physical location of three of the restaurants. It seems that there are
vacant building lots within walking distant of these three restaurants. The specific
concern of the CEO, who does not own these empty, building lots, is what if a
competitor built a similar restaurant on the lots in these high-traffic areas.
The CEO has asked internal audit for advice. After some discussion the CEO and
internal audit agreed that the strategy of the company should be:
a. first understand the process owner’s knowledge base and then develop
appropriate risk and control training for the process owners
b. develop a restructure of the process organization considering
specifically efficiency and effectiveness
c. develop policies and procedures the first time for the process owners
d. conduct an audit to determine the weak areas to address first
a. communications
b. control environment
c. risk tolerance
d. control activities
77. Identifying risk can be a complex and often debatable task. The most
important question to ask when prioritizing risk would not be:
78. The Code of Conduct in a large company had been historically written by the
corporate security department. As time passed it was decided that the legal
department would be the developer and authors of the new Code of Conduct. As
part of the internal control process of this company it was traditional that internal
audit would audit the effectiveness of any major design or changes in the Code of
Conduct. Hence was the case here after the legal department published the code
of conduct, and some time had passed. The internal audit department should
have included in the scope of the audit of the Code of Conduct:
a. obtain a list of all employees who had a review of the Code of Conduct
b. compare the list of all employees who had a review of the code of
conduct to those who should have had the review
c. interview a sampling at various levels and departments to determine if
they understand the new code of conduct and how they feel about it
d. all of the above
The company went to great efforts to advertise the new hotline showing support
from higher-level management in the advertising. The telephone number for the
hotline is toll free no charge for calling and has been proclaimed to not be able to
identify any caller. The company felt that if the hotline was going to work
anonymity is vitally important. Employees must feel no threat if they feel the need
to call the hotline with information of ethical concern.
A record of inbound calls was retrieved (only the total numbers of calls not a
record of actual originating calling numbers). It was determined that only three
calls were received in 12 months. Further because there was no originating
number record it was assumed that at least one maybe two of these calls were
test calls from security.
It was determined that the fraud or ethics hotline was not being utilized as
intended.
a. control activities
b. internal environment
c. information and communications
d. monitoring
a. COSO
b. a risk model that will completely address the probability and the impact
of the risk upon the vision and objectives
c. an expanded control model that will help address the entire organization
including all of the internal and external risk, and the strategic plan
d. control models that will ensure that preventive and corrective controls
are adequately in place to address the vision
© 2013 Contemporary Business Concepts, LLC, Danbury, Connecticut USA 303
McKeever CRMA Study System Application Questions
81. As part of SOX compliance, a business unit within a large organization has
gathered staff to develop risk models. This organization used benchmarking
results from another organization to develop their model. Because of the nature
of the business, it is planned that one specific business unit within the
organization will be addressed. This business unit is relatively small but serves
as an important function within the organization. This all-encompassing
documentation is representative of:
a. ERM
b. COSO
c. the good risk model
d. none of the above
82. Data mining is much more effective than sampling. In sampling, generally,
not all of the data is available for review. Simply stated there is not time to review
all of the data so a sample is developed to extract a portion of the overall data.
With data mining all of the data, for a specific period, can be reviewed. The
computer will do this very accurately and effectively.
Data mining means downloading the data to be reviewed into a software package
that will manipulate the data as required. The prime consideration with data
mining should be:
a. perform a reasonable test to make sure all of the data required was
downloaded
b. sort the data by key interests for example date, name, address, payroll
code
c. download as much data as possible
d. none of the above because data mining should consider all of these
concerns in the software
Which of the following controls would be the best inhibitor to minimize the
possibility of duplicate payments before they happen?
a. CoCo
b. ERM
c. COSO
d. combination of above
a. risk measurement
b. risk prioritization
c. risk shifting
d. risk Identification
89. A television editorial said that your non-profit organization spends 80% of
contributions for telemarketing. What type of risk is this?
a. information integrity
b. reputation
c. customer expectations
d. all of the above
a. subjectivity
b. multiple inputs from stakeholders
c. formulas
d. all of the above
91. Which of the following are objectives of risk monitoring and updating?
a. identify any new risks and systematically track them to best understand
the impact of the consequences
b. effectively manage these risks and the contingency plan
c. decide how to manage any new risks
d. all of the above
92. What risk assessment term best describes the tangible outcomes of risk on
the decisions, events, or processes?
a. risk
b. consequences
c. exposure
d. threat
94. The applicability and enforcement of The IIA Code of Ethics includes:
95. Your Store sold an item on its ecommerce site accepting a stolen credit card
issued by a bank in another country. This risk is an example of:
a. country risk
b. transaction risk
c. credit risk
d. reputation risk
96. The risk management term for the likelihood of risk is.
a. impact
b. exposure
c. threat
d. probability
a. sharing
b. avoiding
c. prioritizing
d. accepting
a. risk assessment
b. information and communication
c. control environment
d. control activities
100. Companies or processes that do not find a position in the industry where
they can best defend itself against competitive forces or can influence an
alignment with the competitive forces is an example of:
a. legal risk
b. regulatory risk
c. ethical risk
d. reputational risk
102. When auditing the adequacy of policies and procedures the most important
factor about policies and procedures is that they are:
103. As a risk and control specialist in a multinational corporation named Serve All
Communications Inc. the executive committee has asked for your input on a major
acquisition. This acquisition will mean that the company will be acquiring a current
competitive telecommunications company that in addition to being a direct
competitor also provides products and services which could complement Serve All
Communications Inc’s product and service base.
From the executive point of view, this would address two issues. The first is that the
merger would eliminate a competitive element. The second is that it would allow
Serve All Communications Inc. to expand its product and service base. The merger
would cost Serve All Communications Inc. $12,600,000 and involve the possible
relocation of facilities costing an additional $5,000,000. In addition because of
duplication of work between the two company’s decisions of layoffs and relocations
of staff is a concern. This could cause social, geographic, and other labor issues.
Financing for this project will be 35% from internal funds and 65% from new equities
including both common and preferred stock which will become available to
shareholders.
This is a major project. As the risk and control specialists you should recommend
to the executive committee that they consider:
Which of the following would be considered the most important product or service
differentiation effort?
a. pricing
b. availability of product or service
c. product design
d. customer service
e. all of the above
105. Three new members of a Board of Directors have recently been elected. At one
of the first meetings to discuss a methodology to enhance an internal control
philosophy, which has become somewhat weakened over recent years, the
conversation focused on the design of posters which would emulate an enhanced
control philosophy. Some of the Board of Directors members suggested a local
graphic designer to design the posters. Another member suggested that the posters
be supplemented by pamphlets, which could also be designed by the same local
graphic designer. One of the new Board members is also a member of the audit
committee and has substantial experience on Board Audit Committees as well as
being a CAE for a number of companies. In addressing this new control philosophy
effort this new member should indicate:
a. that to maintain objectivity the graphic work should be put out to bid
b. the graphics work is not the only thing that should be considered
c. the cost of the graphics could be expensive so considerations should be
given to in-house designs
d. the graphics should be designed with a company-focus not generic
e. all of the above
106. The Accounts Payable (AP) Manager asked you as an audit manager to
conduct a meeting to discuss how to more efficiently process payables. The AP
Manager indicated that no audit report would be required only a verbal report that
would be distributed only to attendees at the meeting.
107. Which of the following techniques will most likely provide continuous
monitoring?
a. computer-assisted auditing
b. operational auditing
c. embedded audit applications
d. all of the above
108. Section 302 of Sarbanes-Oxley requires that external auditors issue a financial
opinion regarding the accuracy of financial statements. Which section of Sarbanes-
Oxley requires that external auditors issue an opinion on whether effective internal
control over financial reporting was maintained in all material respects by
management?
a. section 806
b. section 802
c. section 404
d. none of the above
109. The Federal Sentencing Guideline, The Foreign Corrupt Practice Act, and
Sarbanes-Oxley are designed to provide regulatory guidance to companies. This
means that companies should comply with internal control and risk management
processes, making and keeping accounting records that accurately and fairly reflect
the transactions of the company. With the addition of the anti-bribery provisions of
these regulations a number of countries have also enacted anti-bribery provisions.
Which one of these regulatory initiatives states that audit committees are
responsible for the hiring, compensation, and overseeing of public auditors?
a. Sarbanes-Oxley
b. Foreign Corrupt Practice Act
c. Federal Sentencing Guideline
d. the anti-bribery provision enacted in 1977 as part of the foreign corrupt
practice act
110. The Board of Directors and other top-level management must design,
communicate, and emulate the corporate governance and ethical tone throughout
the organization. It is also their responsibility to:
a. efficiency
b. effectiveness
c. economy
d. all of the above
113. Although the Board of Directors members often are members of Boards of
Directors of a number of different companies their main focus should be:
a. the internal controls of the company that they are addressing at any point
in time
b. to identify the internal risks and the external risks pertinent to the
company that they are addressing at any point in time
c. to develop and communicate the policies and procedures relative to the
internal and external controls of the company they are addressing at any
point in time
d. to develop a communication channel for the communication of corporate
governance for the company that they are addressing at any point in time
a. an objective
b. a goal
c. a mission statement
d. a combined mission and vision statement
115. Although a goal statement is somewhat specific which statement is even more
specific for an issue requiring an immediate correction?
a. strategic planning
b. corporate memo
c. tactical planning
d. all of the above
a. operational controls
b. preventive controls
c. corrective controls
d. sales and marketing controls
118. As a risk and control expert you have been asked to attend a meeting to
address major issues in the company. The attendees, with the help of the
moderator, are listing pages and pages of recommendations with proposed fixes for
the issues. This is the first meeting of the team and no prior discussion has taken
place to address these issues. As the risk and control expert your comment to the
attendees should be:
a. once a month
b. it depends on the risk appetite and the actuality of frequency and impact
of influencing volatile activities
c. once a quarter is sufficient. risk assessment is a control it is important not
to over control
d. it depends on the management philosophy regarding risk appetite and
risk tolerance
120. It is sometimes said that the shortest distance between two points is a straight
line. One of the consequences of not moving along a straight line between two
points is inefficient use of resources. For example, measuring the distance along a
straight line between two points would reveal one distance. If the distance was
measured drifting on and off the line in either direction (detective control) and then
correcting (corrective control) to get back on the straight line to reach the final point
the distance traveled on the adjusted line would be longer than the straight line
(inefficient use of resources). The more predominate the drift from the straight line
the more inefficient reaction would be required. Further, there may a risk of not
reaching the final point within a specified time or even running out of fuel before
reaching the final point. Drifting on and off the straight line is an example of:
a. autocratic
b. supportive
c. collegial
d. custodial
122. Sarbanes-Oxley (SOX) has 11 major titles each with a number of subsections.
Two of the most important subsections are 302 and 404. Which subsections are
most related to the protection of informants and the protection for employees of
publicly traded companies who provide evidence of fraud?
124. What are the elements that often drive fraudulent acts?
a. need or want
b. opportunity
c. rationalization
d. all of the above
a. definitive
b. not definitive
c. definitive by most cultures
d. all of the above
126. It was recently discovered that a well-respected employee had stolen some
cash from the cash draw in a department. There has never been a history of this
employee doing any such act in the 20 years employment with the company. This
employee has been considered ethical and had been trusted with many company
valuable materials. The root cause of this event was most likely:
a. an opportunity
b. a life environmental change in the employee’s life situation
c. a need
d. all of the above
127. Conducting an adequate risk assessment can be a complex process. There are
a number of mathematical models tools that can help in conducting a risk
assessment. These include the annual loss expectancy, which is the product of the
probability and the impact of the potential risk. The result of multiplying these two
elements is the annual loss expectancy. Another mathematical model is the
absolute risk model. This considers the probability, the impact, and adds the time
into the equation. Therefore, the product of multiplying all three of these elements
will result in the absolute risk assessment. Which of the following would be
considered the most important tool when developing an appropriate and adequate
risk assessment?
129. The term empowerment is commonly used in business. This simply means
that a person with some power is willing to delegate some of that power to a
subordinate. An example of this is allowing the subordinate to make some routine
decisions normally made by the person with the power. However, a consideration
often not considered with empowerment is that not everyone may want to give up
some power and not everyone may want to receive some power. The
recommended stage(s) of instituting empowerment in an organization are:
130. Motivation of employees has been a continual effort of managers for years.
The risk of not motivating employees adequately, appropriately, and timely can
result in a decrease in productivity because of attitude, morale, and just human
psychological issues. To manage employees’ efforts effective managers need to
adjust to changes while constantly monitor the morale and attitude of their
employees. There are a number of managerial tools that have been implemented
by managers over the years. Increasing responsibility, recognition, and
opportunities for growth and achievement is best defined as:
132. External suppliers can cause substantial risk to the success of companies in
a number of ways. The most predominant root cause issue of external suppliers
delaying shipments or providing poor quality of required component parts could
be:
133. When working with external vendors which of the following would be the
least likely to discuss with the external vendors?
a. title
b. pay grade indicator
c. organization
d. responsibility
136. One of the most important key considerations for the administration of third-
party relationships is:
a. entity integration
b. establishing goals and objectives
c. process measurements
d. benchmarking
a. control risk
b. audit risk
c. competitive risk
d. managerial risk
146. One of the ways to manage risk after it has been identified, measured, and
prioritized is to control the risk. What is another way to manage risk?
147. When an organization is identifying what they do, who their clients are, and
how they intend to succeed they are:
a. establishing a mission
b. establishing objectives
c. establishing the ground work to establish business objectives
d. establishing a focus to develop a mission
148. Frequent and highly volatile changes in the business environment should
require:
a. the organization
b. internal auditors when planning an engagement of that organization or
activity
c. the external auditors when planning a financial based audit of the
organization or activity
d. the controllers
a. internal auditors
b. management
c. external auditors
d. Audit Committee
151. External vendors can receive or supply various services, various products,
subcomponents, advice, and training. Because of the increasing potential risk
when employing external vendors, it is wise to have legal advice when designing a
contract with an external vendor. These contracts should:
152. The lack of quality and collaboration among departments can cause
inefficient use of resources, a risk that can be costly. What is a term used for
managing this risk?
a. differentiation
b. communication
c. integration
d. tone at the top
153. Providing education about why a change is necessary, involving those who
will be affected by the change in the change process itself, and supporting the
change effort can all help facilitate change. What are two approaches for change
that should be implemented with caution?
154. There are a number of advantages in the monitoring of Key Risk Indicators.
One of these advantages is that Key Risk Indicators can provide an indication of
the achievement of the risk appetite and tolerance. Another advantage of
constant monitoring of Key Risk Indicators is:
155. How long after a self-assessment workshop should an internal auditor who
participated in a self-assessment workshop conduct a follow-up audit?
a. never
b. when requested and agreed upon between the CAE and the process
owner senior management
c. generally between 6 and 12 months
d. it depends on the severity of the issues identified and discussed in the
workshop
156. The facilitator of a self-assessment project must outline the rules of the
workshop before the workshop actually begins. What are two of the most
important rules to be communicated by the facilitator, in a general business
workshop, before the actual workshop begins?
a. when the workshop will begin and end as well as how agreement will be
reached
b. who will be expected to attend each workshop meeting as well as how
the report will be drafted and distributed
c. how the report will be distributed and how fraud, security, or propriety
issues will be discussed
d. how agreement will be reached and that fraud, security, or propriety
issues will not be discussed
157. The word evidence is often mistakenly only associated with fraudulent or
wrongdoing activities. This is not always the case. Evidence developed in the
risk and control assessment process can be an effective guide for the appropriate
application of risk identification, risk management, risk prioritization, and the
application of appropriate controls. Which type of evidence would most likely be
associated with a Delphi Technique risk assessment?
a. sufficient evidence
b. opinion evidence
c. relevant evidence
d. circumstantial evidence
158. How many questions should be included in a typical risk and control
questionnaire or survey?
a. communications risk
b. strategic risk
c. environmental risk
d. information & technology risk
a. probabilistic risk
b. environmental risk
c. external risk, the impact from external uncontrollable sources
d. inherent risk
a. place a guard at the access door with a log book to record the time and
date of who entered and exited
b. obtain a key access pass thru lock in the door hardware section at the
hardware store across the street and install it on the access door
c. install video cameras so as to monitor who enters and exits and the
time and date of access and exit
d. provide a mechanism that will physically secure the access door with
monitoring and recording the date, time, and name of who entered and
exited
163. A senior manager responsible for all warehouse operations has asked the
internal auditor, (a one auditor organization) to consult with that department to
develop new inventory control policies. As part of regulatory requirements, this
auditor must conduct an inventory audit within this warehouse department twice a
year. The auditor’s response to the manager should be:
164. Why would it be necessary for an internal auditor or risk and control
specialist to be a team participant on a self-assessment project?
a. because, of all the participants, they would have the only understanding
of risk and control management
b. because they would be the facilitator of the workshop
c. it is not necessary
d. it is important that they are always in attendance to make sure controls
are addressed adequately
166. Self-assessment projects typically utilize two main tools. They are the
facilitated workshop and questionnaires. When should questionnaires, in a self-
assessment project, be used as a primary tool?
168. Developing collaboration and sharing of ideas among risk and control
specialists and process owners can have a tremendous benefit to a process. The
adequate management of internal and emerging risks can contribute greatly to the
necessary compliance and success of a process. The amount of time for the
benefits to be realized may vary depending on each specific situation. However,
over time a collaborative risk and control scheme may help reduce actual risks by
less intrusive methods such as directed internal and external audits. These can
be of particular importance in highly-integrated, interrelated, and diverse
organizations. Organizations that are ultra-flexible in order to rapidly change
products and services is a definition of:
169. Providing consulting and self-assessment can be a new approach to risk and
control management for both the client and the risk and control specialists.
These new approaches may require a change in thinking for all involved. What is
the most significant reason why humans do not like to change?
173. Process owners attending a self-assessment workshop for the first time may
require some pre-workshop training that should include:
174. Which of the following is the best example of risks that business process
owners must manage but have little control of when the risk will occur or the
impact of the risk?
a. new employees
b. changes in socially accepted norms
c. changes in process IT systems
d. an increase in required security
175. The generally accepted elements of reporting finding are the condition, the
criteria, the cause, the effect, and the recommendation. It is important with the
contemporary reporting approach that internal auditors or reviewers try to identify
and recommend corrective action for the actual root cause of the issues they have
identified. Therefore, in reference to the root cause the review / audit should:
a. the workshop
b. the internal auditor who wrote the report because it is not a formal audit
report
c. the self-assessment team leader
d. the internal audit department
179. Generally there are three considerations when identifying risk. They are
exposure analysis, environmental analysis, and threat scenarios. Which one of
these three considerations would not be appropriate when conducting a risk
identification process?
a. exposure analysis
b. environmental analysis
c. threat scenario
d. none of these
a. physical security
b. attitude and morale
c. the development of policies and procedures
d. the correction of fraud or inappropriate acts
a. human risk
b. communications risk
c. inherent risk
d. union risk
a. in such a way that the process owners will embrace the concepts
b. conduct corporate governance presentations at the higher levels and
then work down to the lower levels as appropriate
c. dictate the consequences of not implementing an adequate corporate
governance scheme
d. develop a risk and control training program appropriate for each
specific audience
183. The Enterprise Risk Management (ERM) model is an expanded and enhanced
model of COSO and other previously developed integrated control models. Like
the previously developed models, ERM was developed and implemented as a
reactionary control tool. ERM includes a larger number and many more detailed
components and control objectives than COSO and previous models. As a result
ERM:
187. The Delphi Technique, in risk evaluation, is a tool that is most similar to:
188. The manager of the risk and control review team requested to team members
that the concerns or findings in their reports be quantified in monetary value,
numbers, or percentages. What are the most primary advantages and
disadvantages of these types of quantifications?
a. multiplying the probability times the impact times the time to determine
the annual loss expectancy
b. conducting a risk self-assessment to discuss a subjective and objective
view of the potential risk
c. reviewing industry historical risk events
d. none of the above
© 2013 Contemporary Business Concepts, LLC, Danbury, Connecticut USA 331
McKeever CRMA Study System Application Questions
191. What type of risk best describes a risk that will require additional control
considerations?
a. service
b. reputation
c. outsourcing
d. residual
192. A SWOT analysis is a tool that would have a most applicable use:
a. in a risk assessment
b. in a feasibility assessment
c. in a control adequacy assessment
d. in a financial compliance assessment
a. autocratic
b. custodial
c. management by objectives
d. collegial
195. The Public Company Accounting Oversight Board was initiated after
Sarbanes-Oxley. As with anything, the laws and regulations for business are
improved with new laws and regulations. ISO 31000 is one of the most recent
documentations. The purpose of ISO 31000 is to:
196. Written reporting of risk and control concerns will help ensure more
comprehensive risk assessments than undocumented reports. In addition, written
reporting can become a management tool facilitating management decisions.
How many written reports should be presented in a typical internal audit?
a. one final report with distribution as required in the internal audit charter
b. two reports consisting of one with an executive summary for high-level
management and one more detailed for the individual process owners
c. two reports consisting of one with an executive summary and one
interim detailed report for line management
d. as many informal and formal reports as is necessary to motivate
management to address the issues
197. COSO, ERM, CoCo, and other control models have one main common
element. What is the main common element integrated within all of these models?
a. strategic planning
b. action
c. integration
d. a feedback mechanism
198. It is most important when internal auditors, a control by their existence, are
performing a risk assessment include some subjectivity, some objectivity, and
human thought intervention. It is still important to utilize and understand the
available risk assessment mathematical formulas. What mathematical risk
assessment formula would most represent the situation when internal audit did
not provide an adequate or complete appraisal or report to management?
199. Internal auditors acting as consultants would provide the most benefit to a
process owner if they explained:
200. Generally speaking where could an internal auditor provide the most
understanding of risk for process owners?
201. Some ways to manage risk are to control the risk, share the risk, or avoid the
risk. The best example of controlling a risk is:
202. COSO is an integrated control model. COSO has become not only a useful
tool in the management of risks and controls but is recommended for use by
some contemporary risk and control laws and guidelines. There are five
components in the COSO model and three control objectives. Combined these
can help evaluate 15 process dimensions. In addition, there are a number of
subcomponents within these components and control objectives. Tone at the
Top, a crucially important subcomponent, is one of these subcomponents. Tone
at the Top is a subcomponent of which of the COSO control objectives?
a. operations
b. compliance
c. financial
d. none of the above
a. process owners
b. management
c. external auditors
d. perception
a. compliance testing
b. traditional auditing
c. assurance
d. self-assessment
205. Human risk (people risk) includes fatigue, memory lapses, inattention,
collusion, unacceptable behavior, sabotage, and negative morale. Which of the
following categories of risk is also most closely related to the human factor?
a. service risk
b. environmental risk
c. contract risk
d. communications risk
206. A senior Vice President has heard that the internal audit department of the
company can provide consulting services, which would replace actual internal
audits. This Vice President asked the CAE how internal audits could be replaced
with an internal audit consulting project. A most appropriate response from the
CAE would most likely be:
a. answers c. & d.
b. internal audit cannot provide consulting services but they could
recommend a group that does
c. first the consulting activity would not necessarily replace the need for
actual internal audits
d. an internal auditor would work with the vice presidents department
providing guidance and direction
207. Service risk and quality of product are very much related to each other. They
are both focused upon providing the best quality product or service to the
customer or client. Which of the following categories of risk would not be an
ingredient of providing quality product or service perceived by a customer?
a. contract risk
b. outsourced risk
c. marketing or sales risk
d. none of the above
212. Audit reports, as well as and risk and control specialists reports, are
typically edited multiple times by multiple levels of management before
publication. This can significantly delay the time from completion of the
assessment field work to the publication of the report. What would significantly
help to decrease this editing time?
213. A complete COSO review requires extensive resource including time, effort
to complete, and analysis. Fraud investigations most often require swift and
decisive actions. These two statements are opposite of each other.
Consequently:
216. The prime commonality of Basel lll, COSO, CoCo, COBIT, ISO 31000, and
ERM is:
218. The main purpose of ISO 31000: 2009 is to provide a standard for the
implementation of risk management principles and a generic guideline for risk
management. As such, ISO 31000: 2009 is intended to be a:
219. In order to have an effective risk and control philosophy the tone for
corporate governance must have a foundation at the highest levels in an
organization. However, a concern of risk and control specialists including internal
auditors attempting to assist in solidifying this corporate governance philosophy
is that these higher levels of management may not fully understand all of the
elements of a corporate governance strategy. Therefore, it becomes important
that these risk and control specialists educate these higher levels of management
in the details of corporate governance and the implications of effective and
ineffective corporate governance. Appropriate risk and control education may be
necessary. With this in mind, the best approach for the risk and control specialist
should be to:
221. The ERM model expanded previous integrated control models into more
definitive areas of analysis. In addition, ERM included two perspectives that had
not been mentioned in much detail in previous models. These are strategic
management and the use of analytical models. Both of these perspectives can
help address the changing environment in which a process operates. Which
analytical model is most associated with the changing environment?
a. preventive auditing
b. program auditing
c. program evaluation
d. all of these answers
a. excessive paperwork
b. rebuttal by employees
c. communications budget issues
d. not understanding the data provided
a. schedule audits based how long it has been since the last audit of a
specific process
b. perform an appropriate risk assessment to determine what areas and to
what extent to audit or review
c. assign the number and the expertise of the auditors based on the
location of the audit to be conducted
d. determine when the audit will be conducted based on the availability of
the client
230. The reporting dimension of any operational audit should include face-to-face
closing meetings as well as a written report. An operational audit should include
how many closing meetings?
231. Internal audit has evolved over the years. Consequently the main
contemporary responsibility of internal audit is to:
233. One of the purposes of the written audit or review report is to motivate the
reader (process owners) into action to correct issues identified during the audit or
review. Which of the following would be the best standard approach to motivate a
reader of such a report?
234. What would be the most effective and efficient second layer of controls when
process owners have implemented their own continuous monitoring information
technology system?
235. The manager of a department was concerned with the stationary budget. The
amount spent on copy paper seemed too excessive and was growing. Comparing
the amount of copy paper usage to other similar departments this department’s
amount was 157% higher than similar departments. How could the manager
incorporate a continuous monitoring information technology scheme for the use
of the copy paper?
a. hold all the copy paper in the office and have employees ask for it as
they needed it
b. allocate a reasonable amount of copy paper to each employee when
they exceeded that they would have to sign for additional paper
c. tell all the employees of the problem and limit the ordering of copy
paper
d. incorporate an employee code identifier into the copy machine
238. The contemporary professional internal auditor must be able to both look at
historical data and to provide insight into potential risks. Utilizing information
technology tools can assist in this effort. What would be a primary advantage of
utilizing information tools when analyzing data in real time (current)?
Application
Questions,
Answers
&
Explanations
Note:
Then check your answer and read the explanation for that question in this
module.
1. Today’s business environment is very fluid. As a result, the objectives, risks, and
controls are constantly changing. Therefore, it is important that when establishing
controls to:
2. Which, in the correct sequence, are the four necessary steps in risk management?
Answer d. is the correct answer. Risk management requires identifying risk before
taking action. Risk management requires measuring and prioritizing risk so that
correct action can be taken.
3. The We Make It For You Company provides custom-made products and parts on
demand for a number of domestic and international companies. In general, the parts are
made to specification and then shipped to the ordering company for inclusion in their
final products. In terms of risk which of the following categories of risk would or should
most, concern the We Make It for You Company?
a. country risk
b. transaction risk
c. credit risk
d. reputation risk
Answer b. is the correct answer. Although all of the answers would be good
methods to communicate the company’s risk management philosophy the best
answer is answer b. Actions speak louder than words. All of the tangible
communications media as suggested in the answers will mean nothing if the
lower-level employees do not believe that the upper-level management really and
sincerely believe in what they are communicating.
Which of the following are not excerpts from the professional practice guidelines for
internal auditors?
a. shall not accept anything that may impair or be presumed to impair their
professional judgment.
b. internal auditors make a balanced assessment of all the relevant
circumstances and are not unduly influenced by their own interests or by
others in forming judgments.
c. this participation includes those activities or relationships that may be in
conflict with the interests of the organization.
d. none of the above
Answer d. is the correct answer. Answer a., b. & c. are excerpts from The Institute
of Internal Auditors professional practices
Answer b. is the correct answer. Answers c. & d. are not relevant to this question.
Answer a. would seem like a reasonable choice especially since the word risk is
included in the answer statement. However, the question implies that an
interrelationship of risk among processes is being discussed and not agreed
upon. This would mean that there was a lack of understanding of the overall
objectives. Now answer a. is very specific. However, it only implies that the team
does not understand the consequences of risk. It does not indicate that this is the
risk relative to the interrelationship among processes. Watch the wording and
think about the answers before making a quick choice.
7. One of the most significant differences between the control objectives of the COSO
model and the ERM model is:
8. The Senior Vice President of Operations reports directly to the Chairman and
President of Products Inc. This is a family-owned company which has grown
substantially over the past few years. Now named Products International its growth can
be attributed mostly to the purchase of three international companies. These newly-
purchased companies provide similar products as the parent company and were also
looking to expand to international markets. As all of these companies provide generally
the same products which type of operating system is Products International?
Answer b. is the correct answer. An open system must interact with the
environment. This is a more likely situation in today’s environment. Open
systems can be very complex and require innovative and proactive management.
Open systems have to find and obtain needed resources, interpret and act on
environmental changes (external risks), dispose of outputs, control and
coordinate internal and external activities, and manage environmental changes.
Sometimes they work closely with competitors and international markets.
Answers a. & c. are not relevant to this question. Answer d. can be eliminated
because it is the exact opposite of an open system as it is described in the
question.
a. sharing
b. avoiding
c. prioritizing
d. accepting
Answer b. is the correct answer. There are some potential projects where this
might be the case. In this case the best approach would be to avoid that project
and invest resources into a project with less risk or greater potential benefits.
Answers a., c. & d. are other methods to address risk but not the best for this
situation.
10. There are four basic tasks necessary when conducting a risk management exercise.
These tasks are: identify the risk, measure the risk, prioritize the risk, and act on the risk.
Which of the following would not be considered part of the act task?
a. share
b. avoid
c. prioritize
d. accept
Answer c. is the correct answer. Prioritizing is not an act to address risk. It is one
of the acts to help determine risk. Answers a., b. & d. are all actions to deal with
risk.
11. When functioning in a consulting role as a risk and control specialist an internal
auditor is concerned with strengthening controls to manage risk. Therefore, when
functioning as a consultant it would not be appropriate for an internal auditor to:
a. customer expectations
b. reputation
c. information integrity
d. all of the above
Answer d. is the correct answer. Answers a., b. & c. are all risks related to
ecommerce.
13. At a recent conference a panel of Audit Committee members was asked if that
conference was addressing the areas that concern Audit Committees.
One member reviewed a copy of the program and stated the program was generally
addressing those issues. That member stated a concern about a session called “Internal
Auditors as Consultants”. He stated, “I am not certain that I want my internal auditors to
become consultants “.
Answer d. is the correct answer. The role of auditors in the ever-changing complex
business world requires the use of a wide variety of skills including those that
successful consultant use. Using the skills including education, self-assessment,
and process improvement will enable internal audit to contribute more value to the
organization while continuing its own unique contributions. Answers a., b. & c. are
not the best answers because they would ignore an opportunity to expand internal
audit’s influence.
14. A customer is very upset with a person who treated him very rudely. The customer
stated that they would never shop at that store or any other store in that chain in the future.
What type of risk is this?
a. information integrity
b. reputation
c. customer expectations
d. all of the above
Answer b. is the correct answer. This is an example of the negative risk of customer
expectations. Answers a., c. & d. are not examples.
15. Objectives are a very important element for the success of any process. Which of the
following would most likely be the root cause of risk among and within various processes
when consequences are not adequately considered?
Answer d. is the correct answer. Answers a., b. & c. are not relevant to this question.
Answer c. is the correct answer. This question can be somewhat misleading. The
first part of the question outlines MBO. However, the question is actually in the
last sentence. The question asks about organizational objectives not MBO. Be
careful of misleading information in the questions. Look for the question
statement and answer the question asks.
17. Stakeholders in a company can take many forms. They can range from the Board
of Directors to every employee at any level within the company. External stakeholders
can be stockholders or other investors, customers, suppliers, contractors, and others.
Internal stakeholders consist of executives; upper-level, middle-level, and lower-level
management; and non-management employees. In terms of ethics and the ethical tone,
who should establish and monitor the ethical tone for the external stakeholders and their
relationship with the company?
18. A private school recently experienced flooding. The administrator quickly emailed
the parents of all students to go to a different school location where the teachers would
meet the students.
What risk was addressed by having this current and functioning business continuity and
contingency plan?
a. information integrity
b. reputation
c. customer expectations
d. all of the above
Answer c. is the correct answer. If this private school failed to deliver a quality
education despite flooding the school would have failed to meet customer
expectations causing parents to consider other schools. Answer c. is broader in
scope than answer a. & b. Answer a. & b. are not correct therefore answer d. is
also not correct
19. Which of these risk factors should be considered in performing a risk assessment?
Answer d. is the correct answer. A risk assessment should consider all of these
factors. Answers a., b. & c. all list factors to consider.
Answer d. is the correct answer. Answers a., b. & c. all list some of the ways to
identify the effectiveness of soft controls. “Sincerely” is the key word in answer
b. Further, in order for answer b. to be effective answer c. would have to be
completed.
22. Which of the following would be the best organizational culture to implement
organizational objectives when there were concerns with wrongdoing activities?
a. role
b. power
c. achievement
d. person / support
Answer b. is the correct answer. Wrongdoing activities require swift and decisive
actions. Answer a., b. & c. do not provide swift and decisive actions.
23. The Board of Directors of a large international company has become concerned
about an increase in risk exposure. This concern has been amplified among the Board
members with the increases in domestic and international risk and control models
including ISO 31000. As such and realizing the need to maintain compliance with this
ever-increasing regulatory platform The Board of Directors has asked internal audit to
establish a program which will ensure company compliance. Which of the following
approaches should internal audit pursue?
Answer c. is the correct answer. This answer implies some risk identification,
prioritization, and then some action to address the concerns. Answer a. implies
education for everyone; this is a clue that this answer is not correct because of
the word “all”. Not everyone may need the training. Answer b. is not relevant to
this question. Answer d. is not correct because answer c. is correct.
Answer e. is the correct answer. Answers a., b., c. & d. are examples of
outsourcing risk.
25. There are a number of risk mitigation scenarios. In simple terms some of these
scenarios generally are: risk acceptance (the process owner accepts the risks and the
consequences of the risk), risk transfer (means that some of the risk is transferred to
another entity or process (an example is insurance), and risk reduction (decreasing the
impacts of risk by applying controls at the right time in the right amount). What is a
description of risk contingency?
a. taking the necessary steps to comply with required laws and regulations
b. implementing adequate planning to address risk should it occur
c. in terms of negative risk reducing the magnitude of an adverse impact
d. implementing specific controls to target specific financial risks
Answer b. is the correct answer. This is one of the basic risk philosophies (“what
if this happened and what would we do”). In this case thought is given to the
possibility of a risk event occurring and anticipating how to manage that risk
should it occur. This is very much like a preventive control. Waiting until a risk
event occurred and then managing it could mean crisis management, which often
times in not efficient and effective. Answers a. can be eliminated because it only
mentions laws and regulations. This can be eliminated because it only mentions
one type of risk issues. Generally, there are many other types of risks apparent in
a process. Answer c. are more like a corrective control. In addition, answer c.
only mentions negative risk. Considering what could happen can also apply to
positive risk. For example, a positive risk could be anticipating that some
investment would double or triple in value in some period of time. This could
have an impact on operations or other financial or legal obligations.
Answer d. is the most politically astute approach. Answers a., b. & c. will not
contribute to successful risk management.
Answer d. is the correct answer. The IIA Code of Ethics applies to both
individuals and entities that provide internal auditing service. Answers a., b. & c.
are only partially correct.
28. The Rules of Conduct of The IIA Code of Ethics covers which of the following:
a. competency
b. confidentiality
c. integrity
d. objectivity
e. all of the above
Answer e. is the correct answer. Answers a., b., c. & d. list items that are covered
in The Rules of Conduct of The IIA Code of Ethics.
29. Product and service quality risk can best be defined as:
a. resulting from not adhering to product design specifications and not following
manufacturing best practices
b. resulting from providing poor or delayed service to customers leading
dissatisfied customer perception
c. non-compliance with contractual agreements resulting in dissatisfied
customers
d. producing inferior products or services resulting in increased cost of
rework
30. While auditing development of your company’s new ecommerce system which of
the following would define potential risks?
Answer d. is the correct answer. In addition to technology risks, answers a., b. &
c. are some of the potential risks an internal auditor should review when auditing
an ecommerce system during development or during a major upgrade.
31. The newest software that you sold in 30 countries has a serious flaw that
miscalculates sales. Consequently the software sometimes ships duplicate orders
without charging the customer. This risk is an example of:
a. country risk
b. transaction risk
c. credit risk
d. reputation risk
Answer d. is the correct answer. When a company transacts business and has a
major problem with quality of product or service there is a risk that the company
will suffer bad publicity causing loss of sales and customers. Answers a., b. & c.
are not applicable.
32. The COSO integrated control model incorporates five components and three control
objectives. These 15 dimensions of a process allow for developing an analysis of the
process. Which of the following dimensions describes an understanding of a Code of
Ethics or Code of Conduct document?
Answer d. is the correct answer. Key words in the question are “describes and
understanding”. Right away this suggests the control environment of the COSO
model. Answers a., b. & c. are other dimensions of the COSO model.
Answer b. is the correct answer. Although this answer seems specific for
information technology in this case this is appropriate for this question. The
question asks “which is NOT a control risk”. Simply stated a control risk is a risk
because of controls not functioning as intended. Therefore, there are two ways to
reach the correct answer in this question. The first way is to recognize the correct
answer immediately. The second way is to determine the answers that would be a
control risk. In this case, answers a., c. & d. all are control risks. However, based
on the wording in the answer choice they imply that they are not working.
Remember if controls do not work risk increases.
34. Which of the following risk categories would have the most impact and the longest
impact if the risk occurred?
Answer c. is the correct answer although the remaining answers would have or
could have a significant impact on an organization should they occur. However,
reputational risk would have the longest and most impact. The remaining
answers could also cause reputational risk. However, the term “reputational risk”
in these answers is broader in scope than the other answers. In most cases in
these types of questions, the all encompassing answer is the best choice. In
other words, what type of risk would be or could be a result of the remaining
answers.
35. The ERM integrated control model specifies more detail in risk assessment than
does previous integrated control models. In the ERM model which of the following most
closely represents the appropriate amount of controls that should be applied to risk?
a. risk tolerance
b. risk response
c. risk appetite
d. event identification
Answer b. is the correct answer. This is really a definition question. However, the
word “risk” in the answer could be a point of confusion. Risk response in the
ERM model is simply responding to risk with controls.
a. impact
b. exposure
c. threat
d. probability
Answer b. is the correct answer and the definition of “probability” as used in risk
management. Answers a., c. & d. list 3 additional terms used in risk management.
Answer d. is the correct answer. The first sentence in the question is not true.
Ethics is not extremely definitive. It can have different interpretations for different
people in different situations and cultures. Therefore, it is important that whatever
ethical guidelines or interpretation is established that everyone involved have the
same understanding. Answers a., b. & c. can be eliminated quickly because of
some key words in the answer choices. The word “adequate” in answers a. & c. is
the eliminating factor in these answer choices. As was indicated in the
discussion ethics can mean different things to different people and different
cultures. Therefore, what is adequate in one situation may not be in another.
Further just establishing an ethics foundation may not and probably would not be
sufficient to inhibit fraudulent activity. Answer b. can be eliminated because of
the word “sufficient”. Inhibiting fraudulent activity is complex and requires
multiple efforts from different dimensions including constant monitoring and
adjusting.
Answer d. is the correct answer. All of these are ways to identify risks. Active
Internet users continue to post a great deal of information including the evaluation
of products / services and comparisons of companies. The Internet also offers
opportunities for companies to reply to problems which will help lessen a loss
caused by bad publicity or incorrect posting.
Answer c. is the correct answer. Answer a. is not correct because of the word
“all” as ISO 31000:2009 is not intended for all stakeholders. Stop to consider
carefully any time the question includes the word ”all”. Answer b. is not correct
because executive-level stakeholders are only one applicable group. Answer d. is
not correct because answer c. is correct.
40. The IIA control objectives do not include which of the following control objectives?
41. A strategy to cause new competitive entrants to spend heavily to overcome existing
customer loyalties is best described as:
a. capital requirements
b. differentiation of product
c. switching costs
d. cost disadvantage
Differentiation means that the existing business must distinguish itself with its
clients and customers in such a way that pending new competitive entrants would
have a substantial barrier to overcome and win potential customers. Such
differentiations can be based on name loyalty, cost of product or services, quality
of product or services, and customer care and service. The remaining answers
are all subcategories of differentiation of product.
42. Due professional care is a philosophy to which professionals should adhere. This
includes business managers, auditors, and other professionals. However, in order to
adhere to this philosophy these professionals should understand what due professional
care actually means. Which of the following does not represent the due professional
care philosophy?
a. competency
b. reasonably prudent
c. infallibility
d. due diligence
44. As the CAE you met with the Audit Committee recently. One of the Audit
Committee members described an article they read recently about the “assurance”
function of internal auditors and asked the question whether or not all the SOX efforts
performed in the last few years was the same as the “assurance” function. You
answered that:
Answer c. is the correct answer. The role of auditors in the assurance function is
a very broad coverage of management’s issues. Assurance typically covers the
functions of risk management, continuous monitoring, and benefits realization.
Answer a. is not correct because SOX efforts are clearly compliance efforts within
the traditional role of internal audits. Answer a. is not correct because SOX and
assurance are different tasks that internal audits perform. Answer b. is not
correct because answer a. is correct. Answer d. is not correct because assurance
is performed by a number of departments including internal audit.
45. The Rental For You And Save Company, providing day-to-day items for short-term
use, has been in business for 22 years. This company provides products for short-term
use such as lawn furniture, household furniture, electronics, and even tools. The
company’s objective is to help customers who may need such items for short-term use
and who realize that it is not worthwhile to purchase such items. The average rental
time is one month. Contracts are signed with the renters to return the items in the same
condition as they were rented.
Although the number of times an item can be rented can vary depending on the product,
the average number of rental times for all items is currently 14.4 times. Prior to five
years ago, the average number of times for the rental of all items was 19.8 times. In
general, the more wear and tear on rented items the fewer times they can be rented. In
order to maintain company success the average time objective for all items rented is
13.6 times. There has been a steady decrease from 19.8 to 14.4 over the past five
years. Management began to become very concerned with this trend particularly when
the number reached 14.4 times. This difference between the 13.8 objective and the old
number of 19.8 compared to the 13.8 objective versus the new number of 14.4 times can
best be described as:
a. risk development
b. risk assessment
c. a statistical process SPC risk variation range
d. risk tolerance
Answer d. is the correct answer. This is a definition question. Answers a., b. & c.
are not relevant to this question. Be careful of the substantial background
information and all the numbers. Consider the actual question which is in the last
sentence. Also eliminate the answers that are not relevant.
Answer d. is the correct answer. Answers a., b. & c. list 3 of the emerging risks
that should be addressed in any risk management effort.
48. A balanced score card is a tool familiar to quality professionals and process owners
alike. What are two characteristics of a balanced score card?
Answer b. is the correct answer. A balanced score card can help represent the
overall strategic plan. It also shows how that plan is interconnect and
communicated to departments and individuals within the process. Answers a., c.
& d. are random phrases.
a. is the current risk assessment significantly different than the prior one
b. is the plan aligned with risk concerns of the Board of Directors and top
management
c. is the audit staff challenged and able to address new technologies, business
strategies, and products and services
d. all of the above
Answer d. is the correct answer. All of the comments in answers a., b. & c. are
points of interest or should be points of interest for consideration when planning
an efficient and effective risk management assurance plan.
50. Outsourcing, staffing projects with outside consultants, has become common
practice in recent years. There can be substantial cost savings as well as a decrease in
administrative activities when hiring staff members who will only be need for specific
short-term projects. Therefore, there can be benefits to outsource when used correctly.
Many times these types of outsourced projects require an exchange of information
technology between and among the host company and the consultant and from the
consultant and the host company. Which of the following controls would not be a
consideration when outsourcing?
51. There are a number of risk assessment tools available which can help process
owners manage their risks. Some of the more contemporary tools are integrated control
frameworks. Which of the following integrated control frameworks facilitates the most
detail of risk?
a. COSO
b. ERM
c. CoCo
d. COBIT
Answer b. is the correct answer. ERM subcategorizes risk into risk appetite and
risk tolerance. The models in answers a., c. & d. only mention risk as a category.
52. Focusing on Key Processes, Activities, and Controls rather than doing generalized
audits of functions can drastically increase the effectiveness of the internal assurance
function of internal audit. Building continuous monitoring into every system and process
provides both the process owner and the auditor with greatly enhanced ability to
maintain quality systems on a concurrent basis. One important key to success is to
consistently leverage IT resources. Continuous audit utilizing IT techniques would
facilitate:
53. On occasion IT expertise may not be readily available within a particular process.
Therefore, it may be necessary to acquire external IT expertise. However, this approach
may yield additional risks because of the possible necessity of exchanging electronically
formatted information. Although there could be significant potential exposure risks they
could be addressed by a team including legal professionals, process owners, auditors,
and even other professionals including security professionals. As a control team to
manage this possible exposure risk who would be addressing the potential concerns a
discussion of least concern for this team would be:
54. A significant shift to a new vision of compliance and ethics has emerged over the
past few years. This shift has enhanced greater efficiency in processing and
management of information, effectiveness in ensuring corporate governance and the
agility to address rapidly changing business environments. This new vision of ethics and
compliance includes; an enhanced alignment with stakeholder demands for
transparency and accountability; an increased opportunity to take advantage of
emerging technologies; and:
55. Risk reporting involves recording, maintaining, and reporting risk assessments.
Which of the following is not a good reason to complete a risk reporting effort?
Answer b. is the correct answer. The key word to select this answer is the word
“ensure”. The question asks what is not a good reason. Risk reporting does not
ensure anything. Another way to select the best answer is to pick the answers
that are a good reason. It can be determined that answers a., c. & d. will be
benefits of risk reporting.
56. An organization must establish and implement controls to control, safeguard, and
secure physical assets and intellectual property. Which types of controls would be most
applicable to secure and control intellectual property?
Answer a. is the correct answer. Answers b., c. & d. would be more applicable to
controls over physical assets. Note that answer d. mentions files. It does not
mention digital files. These could be an inventory of paper files. So be careful of
assumptions in the wording.
57. Supervisory internal controls should be integrated into the normal operations of
processes. These should include management and supervisory activities such as:
Answer d. is the correct answer. These are all good supervisory controls. They
should be incorporated into the routine supervisory efforts. In addition they
should be visible to all process members as a routine supervisory responsibility.
Interestingly there may even be a side benefit to these types of controls. Process
members will in many cases feel more important and responsible when the
supervisor is taking interest in their work, hence increasing morale and process
member efforts.
58. Identifying threats that could harm or adversely impact a process would be:
59. Cost-effective preventive controls in IT systems can help deter or reduce outage
impacts in IT systems. Which of the following would not fall into this category?
a. scope
b. background
c. purpose
d. findings
Answer c. is the correct answer. The purpose is the objective of why the report is
being developed. The purpose statement should include some reference to
determine the adequacy of controls. Hence the findings and scope should refer
back to the purpose statement. For example, the purpose of this audit was to
determine the adequacy of controls related to some process. The scope and
findings in answers a. & d. should reference that purpose statement. There
should not be findings for one process and the purpose for another process. The
background in answer b. should be a brief outline of what the process is and what
function it serves.
Answer d. is the correct answer. Answers a., b. & c. all list purposes of using
benchmarking. The word “meaningful” should not confuse you.
62. The CFO of a medium-size company has just been told by the Board of Directors
that the company has to decrease operating budgets by 10% across the board. The
company’s operating budget is currently $124,000,000. There are 5 departments within
the company that will be impacted by the decrease. Departments 1 and 3 receive 25%
of the budget cut each. One department receives 20% of the budget cut. Two
departments receive 15% of the budget cut each. The CFO immediately initiates two
budget-cutting policies. The first is to eliminate all food for staff meetings. The next is to
cut all training effective at the end of the month. It is estimated that cutting these two
items immediately will achieve 6% of the necessary budget cuts. So a further cut of 4%
is required. The actions that this CFO has implemented are:
a. corrective
b. reactive
c. directive
d. preventive
Answer b. is the correct answer. First, there is substantial extra information in the
question. Some traps in the wording may sound like it was preventive answer d.
In addition, the CFO instituted a policy to cut 6% immediately so this could be
considered directive answer c. Finally, it is implied in the question that there
might be a substantial crisis in the company. Hence, answer a. corrective sounds
good. However, here is the issue. The CFO took immediate action as implied
without much analysis by just cutting training and food. It appears that the CFO
only thought about an immediate cut and did not think about the long-term
implications of these cuts. For example, it is very unusual that cutting food at staff
meetings would be a major saving for the company. If anything, it may cause a
morale problem. Therefore, the immediate cut may cause a greater future problem.
Also training cuts require more analysis. If the cuts were for superfluous training
nice to have but really not a core benefit for the company possibly cutting may be
worthwhile. If the training had a substantial benefit to the company then cutting it
arbitrarily is not wise. It appears that the CFO just cut arbitrarily without any
discussion or analysis just to get some numbers for the Board of Directors. In the
short term this may work. However, in the long term this may create greater
problems than the company is currently realizing. The issue here is to think about
major adjustments and not make them arbitrarily. In this case, this was reactive -
reactive to political pressures. Answer d. does apply as it appears the current
financial control have failed to prevent this problem.
a. an indication that the risk appetite and risk tolerance are achieved
b. a backward looking view on risk events, so lessons can be learned from past
events
c. an early warning: a proactive action can take place
d. all of the above
Answer d. is the correct answer. Answers a. b. & c. list some of the key benefits
of monitoring Key Risk Indicators.
64. Which section of SOX requires the auditor to document and test the effectiveness of
internal controls of IT systems?
a. 301
b. 302
c. 906
d. 404
Answer d. is the correct answer. Section 301 focuses on public company audit
committees. Section 302 focuses on the quarterly disclosure of financial
statements as certified by the CEOs and CFOs. Section 906 mandates severe
penalties for corporate officers who certify the required statements in violation of
the section who certify the statements knowing that the report accompanying the
statement does not comport with all the requirements of the section. Hence
section 404 is the correct answer.
65. Which of the following would be helpful to determine whether or not a company has
risk?
a. industry surveys
b. professional associations
c. history
d. other professionals
e. all of the above
66. The self-assessment process can be a useful tool from two perspectives. First self-
assessment can help enhance a corporate governance knowledge base with process
owner participants. Second self-assessment develops an ownership of apparent risks
and the necessary corrective actions to mitigate those risks. Which of the following is
generally not a result of a self-assessment effort?
a. a level of enthusiasm among process owners for the acceptance of key risk
management will increase
b. an enhanced belief in risk and control management by process owners may
be realized
c. process owners, as they become more knowledgeable, can eventually
assume responsibility for their own self-assessment efforts
d. because of the involvement of multiple process owners and
perspectives there will be assurance that key risks are adequately
addressed
Answer d. is the correct answer. The key word to answer the question of which
will not be a result of a self-assessment effort is “assurance”. There is little that
will assure the total mitigation of all risk all of the time in any process. Answers
a., b. & c. are generally results of a self-assessment effort.
67. During a risk-based workshop eight of the attendees classified a particular risk as
“HIGH” and six classified it as “LOW”. As the facilitator the best approach would be:
Answer c. is the correct answer. You should discuss further and address both the
use of these three terms and why the classifications vary. Answers a. & b. might
lessen the interest of some attendees. Answers d. will not solve the difficulty.
Sometimes it is appropriate to decide to address an issue later. However that
should be a decision of participants not the facilitator. Additional discussion in
such a wide opinion vote would probably be appropriate. In many cases,
additional discussion in such a situation may actually cause further thinking by
the attendees and may result in a more accurate final result and decision.
68. SOX was instituted as a reactionary control to address integrity issues in business.
This meant enhancing existing controls that were apparent in the FCPA. These
enhanced controls:
69. During an audit it is observed that a number of expense vouchers have been pre-
signed by an approving level authority and are stored in an unsecured desk drawer.
The auditor challenged the supervisor of the department who indicated that the
approving individual traveled often so they had these vouchers pre-approved for
efficiency reasons. That way there would not be a delay in securing payment because
the approving person was on the road. Convincing and explain to the supervisor that
because of audit, good management, and security reasons this was not a good policy
and must be corrected. Correcting this issue in the future on these documents is what
type of a control?
a. detective control
b. preventive control
c. corrective control
d. administrative control
Answer b. is the correct answer. The key words in the last sentence of the
question statement are “in the future”. Now there could be some consideration of
these answers. Answer a. can be eliminated because adequate detective controls
are not in place to detect problems. Some consideration could be that it is a
detective control because it was detected by the auditor. Answer c. can be
eliminated. It could be a corrective control because with the cooperation of the
supervisor the auditor was able to correct this risk. Answer d. can be eliminated.
Although there are things called administrative controls this answer is not
specific to this question. So it can be seen from this discussion that the
definitions of preventive, detective, and corrective controls sometimes overlap
depending on the perspective. In real business the specific definitions are
probably not as important as getting the issue corrected. Now for this question
the key words are “in the future”. This implies that this risk concern would be
eliminated in the future or would be prevented from reoccurring in the future.
Hence, answer b. is the best choice. Read the question.
70. One of the tools that can be used to provide an evaluation that key risks are
adequately evaluated is operational auditing. Which of the following would not be a
result of an operational audit?
Answer d. is the correct answer. Operational auditing although a good tool will
not provide assurance that key risk are adequately evaluated and addressed. The
key word here is “assurance”. Another way to select the correct answer is to
recognize the word “help” in the remaining answers. Comparing the word “help”
to “assurance” it can be seen that operational auditing will help address risk
issues as answers a., b. & c. list but not “assure” that they are fixed all of the time
in all cases.
Answer c. is the correct answer. This the exact opposite of what self-assessment
does. Self-assessment clarifies that process owners are responsible for internal
controls within their process - NOT internal audit. Be certain to read all answers
carefully before selecting one. Answers a. & b. are not correct because they list
items that are true about self-assessment. Answer d. is not correct because
answer c. is correct.
72. When an internal control in the Accounts Payable Department failed that would be
best categorized as what type of risk?
Answer c. is the correct answer. This is the definition of control risk. Answer a. is
not correct because an audit risk is that internal audit reached wrong conclusions
and someone relied on those conclusions. Answer b. is just a random set of
words. Answer d. is not correct because answer c. is correct.
a. risk management
b. prioritize
c. measure
d. identification
Answer d. is the correct answer. The first step in any successful risk assessment
must be to identify risks. This step is necessary before any prioritization or
measuring can occur. Answers a. is not correct because risk assessment is a part
of risk management. Answers b. & c. are not correct because of the same reason
that answer d. is correct.
74. One local organization owns 15 fast food breakfast and lunch mini restaurants.
These restaurants have been strategically located in high-density geographic locations.
They cater to many of the employees of the various businesses in the area. This
operation has grown from two such restaurants two generations ago to its current status.
The CEO of the company has an MBA. The CEO has become concerned with the
physical location of three of the restaurants. It seems that there are vacant building lots
within walking distant of these three restaurants. The specific concern of the CEO is
since the company does not own these empty, building lots what if a competitor built a
similar restaurant on the lots in these high-traffic areas.
The CEO has asked internal audit for advice. After some discussion the CEO and
internal audit agreed that the strategy of the company should be:
a. manage the bargaining power of suppliers minimizing the risk of sole source
suppliers
b. develop a differentiation of product
c. anticipate the threat of substitute products by competitors
d. all of the above
Answer d. is the correct answer. The issue is that there is a possibility that a
competitor could impact the profits of this restaurant. There is an unknown factor
of the vacant land where a competitor could develop a competitive restaurant.
The question implies that this company controls the sales in that area for their
product. If they do not control the land there is an unknown. So the CEO should
anticipate what could happen (if the competitors developed in the area) and what
would we do the CEO do. Answers a., b. & c. all list items that should be
considered including minimizing control by (sole source) suppliers, differentiation
of product by price or quality, all this by anticipating the competitors actions.
Managing this competitive risk should not be completed the day the competitor
appears with a grand opening (crisis management). Good strategic management
dictates anticipating what could happen and having a plan in place before the
crisis occurs.
a. first understand the process owner’s knowledge base and then develop
appropriate risk and control training for the process owners
b. develop a restructure of the process organization considering specifically
efficiency and effectiveness
c. develop policies and procedures the first time for the process owners
d. conduct an audit to determine the weak areas to address first
76. An atmosphere of mutual trust and open communications to discuss risk among
management and employees would be which component of COSO?
a. communications
b. control environment
c. risk tolerance
d. control activities
Answer b. is the correct answer. The key phrase in the question is “an
atmosphere of mutual trust”. However, the question can be somewhat misleading
in that it mentions communications and risk. Answer b. might appear the answer.
However, it is the control environment that includes the soft control elements
such as mutual trust. Answer c. list the term risk tolerance that is not included in
the COSO model but is included in the ERM model. Answer d. lists control
activities and is too general a statement.
77. Identifying risk can be a complex and often debatable task. The most important
question to ask when prioritizing risk would not be:
Answer a. is the correct answer. This answer implies that the only concern when
prioritizing risk is the cost if the risk occurred. This is a common mistake. The
concept is that there could be risk that if it occurs could cost a substantial amount
but might only occur very rarely. Alternatively, there could be risk that occurred
often and when it occurred only cost a small amount. In reality, the higher
occurrence and lower cost risk could actually have a greater impact as a risk. It is
wise to consider both the probability and cost of risk when prioritizing risk.
Answer b. is a good question to ask. Answers c. & d. also list questions to ask
before any prioritization can occur.
78. The Code of Conduct in a large company had been historically written by the
corporate security department. As time passed it was decided that the legal department
would be the developer and authors of the new Code of Conduct. As part of the internal
control process of this company it was traditional that internal audit would audit the
effectiveness of any major design or changes in the Code of Conduct. Hence was the
case here after the legal department published the code of conduct, and some time had
passed. The internal audit department should have included in the scope of the audit of
the Code of Conduct:
a. obtain a list of all employees who had a review of the Code of Conduct
b. compare the list of all employees who had a review of the Code of Conduct
to those who should have had the review
c. interview a sampling at various levels and departments to determine if they
understand the new Code of Conduct and how they feel about it
d. all of the above
Answer d. is the correct answer. Answers a., b. & c. list items that should be part
of the audit. However, answer c. lists one of the more important parts of the audit.
A written Code of Conduct is nice. However, answer c. describes an action that
will help to determine if the new document actually works. This could be a
considered a control environment element in the COSO model. Answers a. & b.
describe actions that could be considered control activities in the COSO model.
79. A medium-size company with multiple working locations and approximately 9,000
employees has recently instituted a fraud or ethics hotline. This company manufactures
complex components for private and governmental organizations.
The company went to great efforts to advertise the new hotline showing support from
higher-level management in the advertising. The telephone number for the hotline is toll
free no charge for calling and has been proclaimed to not be able to identify any caller.
The company felt that if the hotline was going to work anonymity is vitally important.
Employees must feel no threat if they feel the need to call the hotline with information of
ethical concern.
A record of inbound calls was retrieved (only the total numbers of calls not a record of
actual originating calling numbers). It was determined that only three calls were
received in 12 months. Further because there was no originating number record it was
assumed that at least one maybe two of these calls were test calls from security.
It was determined that the fraud or ethics hotline was not being utilized as intended.
a. control activities
b. internal environment
c. information and communications
d. monitoring
Answer b. is the correct answer. There are some substantial clues to the correct
answer in the extensive background information about the company. First, it
appears that this is a complex company, many employees, multiple locations, and
complex work. Generally the more complex an operation the higher is the
opportunity for risk. It is unlikely that there are no employee issues of concern.
Next, there was extensive advertising by senior management about the fraud or
ethics hotline. Further, the physical hotline seems to be working physically
because tests of the line indicated it was functioning. The core issue here seems
to be one of trust among the employees. It may be that they do not trust that the
hotline is not able to identify them or that they are afraid of repercussions no
matter what the higher level management says. Trust is in the internal
environment of ERM the softer issues. Answer a. lists control activities that
would be the harder issues like the physical phone itself. Answer c. lists
information and communications that could be categorized by the advertising
from management but does not seem to be the problem. Answer d. lists
monitoring that could be the information about the numbers of calls. However,
that would have little to do with why no one was calling with concerns. However,
the underlying reason why no one was calling the hotline is an issue of trust in the
internal environment.
80. The senior managers of a medium-size company have expressed concern about the
working relationships among various business units within the company. New senior
managers that entered the company six years ago recognized the opportunities for new
markets and aggressively went after those markets. As a result, the company has
grown from a $2 Million gross income to a $12 Million gross income in five years. The
organization’s overall philosophy has changed from one of complacence to an
aggressively competitive organization. This new excitement of success and business
outlook has enhanced the competitiveness among departments. Hence, this
competiveness has caused uncertainty about the continued future success of the
company. In the words of one Vice President, “It seems now that the numbers are what
is strived for not the vision”. Which of the following would be the best model to help re-
focus the company toward an overall picture and the portfolio of success inhibitors?
a. COSO
b. a risk model that will completely address the probability and the impact of the
risk upon the vision and objectives
c. an expanded control model that will help address the entire organization
including all of the internal and external risk, as well as the strategic
plan
d. control models that will ensure that preventive and corrective controls are
adequately in place to address the vision
Answer c. is the correct answer and the one that best matches this situation.
Risk increases proportionally with volatility and change. There are concerns of
increased competition and less teamwork among departments. This is systemic
of a substantial decrease in communications. Communication is a major
component in both the COSO and ERM models. Communication is an
interrelationship issue woven throughout the organization. COSO addresses this
interrelationship of communication. Answer a. is not correct as it lists COSO
However, COSO does not expand on the effective interrelationship requirement.
Finally, the question suggests a concern for vision and strategic management.
Strategic management is not specifically addressed in the COSO model. Strategic
management is specifically emphasized in the ERM model.
This answer is a definition of the expanded COSO model now named Enterprise
Risk Management (ERM). ERM addresses the portfolio of risk including the risks
among sub-functions of an organization, along with the internal and external
risks. It also includes the COSO philosophy and the basic risk model of
probability and impact. ERM adequately addresses controls in all dimensions,
hard and soft.
In essence ERM looks at all types of risk that can impact the achievement of
objectives. The term “portfolio of risk” is defined specifically in the ERM model
documentation. In addition, the ERM documentation addresses the strategic plan
of an organization. Strategic planning includes the impacts on success by
external forces, such as competition, technology changes, and rapid growth.
ERM does not replace nor is it intended to replace COSO or other existing risk and
control models. It is intended to enhance these other models and the perspective
of risk and control management.
81. As part of SOX compliance, a business unit within a large organization has gathered
staff to develop risk models. This organization used benchmarking results from another
organization to develop their model. Because of the nature of the business, it is planned
that one specific business unit within the organization will be addressed. This business
unit is relatively small but serves as an important function within the organization. This
all-encompassing documentation is representative of:
a. ERM
b. COSO
c. the good risk model
d. none of the above
Answer a. lists ERM. The ERM philosophy indicates that the corporate
governance documentation for an organization should vary depending upon its
size and complexity. The question indicates that the organization developed their
model from another organization’s model. Further, that it is very comprehensive
documentation. The ERM philosophy indicates that the corporate governance
documentation should be appropriate for the size and complexity of the
organization. In this case, it is a business unit within the entire organization. It is
not the ERM philosophy.
Answer c. is not correct as it is just lists a few risk words that are too general to
answer this question.
82. Data mining is much more effective than sampling. In sampling, generally, not all of
the data is available for review. Simply stated there is not time to review all of the data
so a sample is developed to extract a portion of the overall data. With data mining all of
the data, for a specific period, can be reviewed. The computer will do this very
accurately and effectively.
Data mining means downloading the data to be reviewed into a software package that
will manipulate the data as required. The prime consideration with data mining should
be:
a. perform a reasonable test to make sure all of the data required was
downloaded
b. sort the data by key interests for example date, name, address, payroll code
c. download as much data as possible
d. none of the above because data mining should consider all of these concerns
in the software
Data mining is a tremendous tool for analyzing data. Its power is in the
manipulating capability. A tremendous amount of data can be analyzed quickly
and accurately. In addition better than sampling, an entire universe may be
analyzed instead of a portion of the universe as would be in a sample.
This question asks for a prime consideration when data mining. The word
“prime” is the key in answering the question. This is another red flag (prime) word
like “best”. A word like this implies that there is could be more than one good
answer. In this particular question the odds of selecting the correct answer can
be increased by elimination. Answer c. indicated download as much data as
possible. It is best to decide what data is required, for example payroll data,
inventory data, or security data and select only the necessary and required fields
of information. So eliminate answer c. With that in mind answer d. can be
eliminated.
Answers, a. & b. are actually priorities of the tasks necessary in data mining.
Realizing that the data has to be acquired (answer a.) before it is manipulated
(answer b.), answer a. qualifies as the prime concern or the first concern.
Answer d. is the correct answer. Answers a., b. & c. are not correct because these
are only partial answers and from an internal audit perspective. The main reason
for including computer-based auditing in IT systems, as in all auditing effort, is to
provide better service to audit clients.
Remember that the word “best” means that there could be more than one good
answer. However, the question asks for the “best” of the possible good answers.
84. Duplicate payments within the accounts payable process is an on-going problem.
Duplicate payments to vendors can be accidental or intentional. Paying duplicate
payments by intent is fraud. One way to detect duplicate payments is acquiring
accounts payable data for a period into a database manager and sorting by common
fields like vendor name, invoice date, vendor address, and amount. When unusual
indications appear then further comparisons may be required such as determining the
department that authorized the payment and the accounts payable person that
processed the payment.
Which of the following controls would be the best inhibitor to minimize the possibility of
duplicate payments before they happen?
Answer f. is the correct answer. The word “best” means there might be more that
1 correct answer. Answer a. lists a good answer but just reviewing the Code of
Ethics with employees is not enough, as the Code of Ethics must work. Answer b.
lists a good answer as periodic reviews are probably appropriate. Answer c.
describes and excellent approach setting the example but really does not fix the
root cause of the problem. Answer c. describes good supplements to the review
itself of performing an independent review and communicating that the review is
in place. Since answer a. is not correct answer e. can be eliminated. Answers b.
& d. combined would be the “best” inhibitor (control) from the choices given.
85. Codes of Conduct or Codes of Ethics are internal organizational documents. They
act as guidance for the behavior of members of the organization. Many times these
documents contain ethical guidelines. These guidelines specify guidance in terms of the
personal and professional conduct of organizational members. These ethical guidelines
most often include:
Answer d. is the correct answer. Answers a., b. & c. list items that should be
included in an organization’s Code of Conduct or Code of Ethics.
86. Risk includes the possibility of something, either positive or negative, happening to
an organization. Risk management is an appropriate step to minimize the outcome of
negative risk. Which of the following describes risk management?
Answer d. is the correct answer. Answers a., b. & c. just list are random or partial
representations of the entire risk management process. Risk assessment
includes the identification and evaluation of risks and risk consequences and
recommendations to manage the risks (controls). Risk evaluation is the continual
process of a comprehensive and successful risk management process. Risk
mitigation is the process of implementing risk reducing measures that will
address and manage either positive or negative risk implications.
87. In performing a risk assessment at a major Canadian Bank which of the following
integrated control framework would probably work best?
a. CoCo
b. ERM
c. COSO
d. combination of above
Answer d. is the correct answer. Usually a combination of these tools will work
best. Do not pick an answer based on the country where the framework was
developed such as CoCo in Canada, COSO in the USA, or Cadbury in the UK.
a. risk measurement
b. risk prioritization
c. risk shifting
d. risk Identification
Answer c. is the correct answer. Answers a., b. & d. list elements of risk
assessment.
89. A television editorial said that your non-profit organization spends 80% of
contributions for telemarketing. What type of risk is this?
a. information integrity
b. reputation
c. customer expectations
d. all of the above
a. subjectivity
b. multiple inputs from stakeholders
c. formulas
d. all of the above
Answer d. is the correct answer. Answers a., b. & c. list items to use. The more
combinations of input subjective and use of the simple formulas applied in a risk
assessment the more accurate the results will be. An accurate risk assessment is
important so that the most appropriate application of controls can be applied.
91. Which of the following are objectives of risk monitoring and updating?
a. identify any new risks and systematically track them to best understand the
impact of the consequences
b. effectively manage these risks and the contingency plan
c. decide how to manage any new risks
d. all of the above
Answer d. is the correct answer. Answers a., b. & c. list important parts of risk
monitoring and updating.
92. What risk assessment term best describes the tangible outcomes of risk on the
decisions, events, or processes?
a. risk
b. consequences
c. exposure
d. threat
93. An effective risk management process requires significant success factors. Some of
these success factors are full support of the process unit’s team, senior management
support, an on-going evaluation process, and competence of the process unit’s team.
What additional success factors would be appropriate to complete an effective risk
management process?
94. The applicability and enforcement of The IIA Code of Ethics includes:
Answer c. is the correct answer. The IIA Code of Ethics specifically states
because a particular conduct is not mentioned in the Rules of Conduct does not
prevent it from being unacceptable or discreditable.
95. Your Store sold an item on its ecommerce site accepting a stolen credit card issued
by a bank in another country. This risk is an example of:
a. country risk
b. transaction risk
c. credit risk
d. reputation risk
Answer b. is the correct answer. This loss was caused by a transaction (risk).
Use of ecommerce in many cases increases that type of risk. Some amount of
transaction risks exist also with sales in physical locations. This type of risk
always exists any time exchanges are made of money, product, or service.
Answers a., c. & d. list other types of risks.
96. The risk management term for the likelihood of risk is.
a. impact
b. exposure
c. threat
d. probability
Answer d. is the correct answer and the definition of “probability” as used in risk
management. Answers a., b. & c. list 3 additional terms used in risk management.
97. Your company decided to take advantage of the international marketplace. Part of
this effort is to partner with companies in host countries. This is an excellent example of
addressing risk by:
a. sharing
b. avoiding
c. prioritizing
d. accepting
Answer a. is the correct answer. Answers b., c. & d. are other methods to address
risk but not correct for this situation or question.
Answer b. is the correct answer. The key word is “interested”. All stakeholders
includes all with interest in an organization including people who are not process
owners such as Board of Director members, suppliers, and stockholder. The
question does not ask about only those who are involved directly with the risk
management process. Answers a. & d. are not correct as they list only those
directly responsible for risk management in their area of responsibility. Answer c.
is not correct as it includes people who are not stakeholders and have no interest
in an organization’s success. Although we use the phase that “all are responsible
for risk management” the word “all” is only applicable within an organization.
a. risk assessment
b. information and communication
c. control environment
d. control activities
Answer c. is the correct answer. The core of any business is the individual
attributes its people including integrity, ethical values, competence, and the
environment in which they operate. This environment includes the tone set by
upper-level management. Answers a., b. & d. list other COSO components that all
rely on the environment.
100. Companies or processes that do not find a position in the industry where they can
best defend itself against competitive forces or can influence an alignment with the
competitive forces is an example of:
a. legal risk
b. regulatory risk
c. ethical risk
d. reputational risk
Answer d. is the correct answer. Although answers a., b. & c. could be considered
specific types of risks they are too specific for this question. The key words are in
the first sentence of the question “prevent scandals”. Scandals are damaging to
reputation. Another consideration for the selection of the correct answer is that
legal, regulatory, and ethical risks could all cause reputational risk. In this case
and in these answer choices reputational risk is broader in scope and could be a
result of all or any of the remaining answers. So in order to select any or all of the
remaining answers the choice would have to be all of the above which is not an
option in these answers. Hence reputational risk is the best option.
102. When auditing the adequacy of policies and procedures the most important factor
about policies and procedures is that they are:
Answer d. is the correct answer. The most important requirement for the
adequacy of policies and procedures is that they work effectively. Answer a. is
partially correct in that policies and procedures to be effective must be
understood and believed in. Answers b. & c. are not correct because of the use of
the word “all”. Further they are very specific.
103. As a risk and control specialist in a multinational corporation named Serve All
Communications Inc. the executive committee has asked for your input on a major
acquisition. This acquisition will mean that the company will be acquiring a current
competitive telecommunications company that in addition to being a direct competitor
also provides products and services which could complement Serve All Communications
Inc’s product and service base.
From the executive point of view, this would address two issues. The first is that the
merger would eliminate a competitive element. The second is that it would allow Serve
All Communications Inc. to expand its product and service base. The merger would cost
Serve All Communications Inc. $12,600,000 and involve the possible relocation of
facilities costing an additional $5,000,000. In addition because of duplication of work
between the two company’s decisions of layoffs and relocations of staff is a concern.
This could cause social, geographic, and other labor issues.
Financing for this project will be 35% from internal funds and 65% from new equities
including both common and preferred stock which will become available to shareholders.
This is a major project. As the risk and control specialists you should recommend to the
executive committee that they consider:
Answer a. lists an equity ratio for common stockholder analysis. It will indicate
how much of the total capitalization will actually come from owners if the
acquisition occurs. Answer c. lists a financial ratio that will indicate how much
business assets can decline in value before they become insolvent. Both of these
ratios would possibly be useful in a more detail analysis. However, they should
probably be addressed during or after a SWOT analysis is initiated.
Which of the following would be considered the most important product or service
differentiation effort?
a. pricing
b. availability of product or service
c. product design
d. customer service
e. all of the above
Answers a., b., c. & d. are all correct. Hence answer e. may be considered a
choice. However, the question asks for the “most” important. When a word like
“most” is used that means that many or all of the answers are good answers.
However, “most” means the best of the good answers. Customer service is a key
to product differentiation.
Initially most companies will try to provide the best service and quality to their
clients or customers. However, things happen and things go wrong. Providing
excellent customer service can rectify those things that went wrong. In some
cases providing excellent customer service and going above and beyond to
rectify a problem with a client or customer can actually have a more positive effect
that if nothing went wrong in the first place. Unfortunately, many companies do
not understand this. The customer service staff is often the lowest paid and least
trained employees in an organization.
One company was going to cut their customer service staff by 20%. A comment
was made why would you require upset customers to wait another 15 o 20
minutes beyond the 10 minutes or so they are waiting now for assistance. Upset
customers or clients want quick and effective response to address their unhappy
issues. Customer service can either establish a positive or negative perception
quickly. Remember it is easier to keep the customer or clients you have than to
find new ones.
105. Three new members of a Board of Directors have recently been elected. At one of
the first meetings to discuss a methodology to enhance an internal control philosophy,
which has become somewhat weakened over recent years, the conversation focused on
the design of posters which would emulate an enhanced control philosophy. Some of
the Board of Directors members suggested a local graphic designer to design the
posters. Another member suggested that the posters be supplemented by pamphlets,
which could also be designed by the same local graphic designer. One of the new
Board members is also a member of the audit committee and has substantial experience
on Board Audit Committees as well as being a CAE for a number of companies. In
addressing this new control philosophy effort this new member should indicate:
a. that to maintain objectivity the graphic work should be put out to bid
b. the graphics work is not the only thing that should be considered
c. the cost of the graphics could be expensive so considerations should be
given to in-house designs
d. the graphics should be designed with a company-focus not generic
e. all of the above
Answer b. is the correct answer. The issue is that there is a need to stimulate an
enhanced internal control philosophy throughout the company. It seems that the
Board of Directors is focused on graphic advertising to accomplish this. The one
Board of Directors member who has audit and internal control experience should
suggest that other methods to promote and stimulate the integral control
philosophy should be used. The tone must be set by the high-level managers and
emulated not only by posters and signs but by actions and conversation. Posters
and signs are not sufficient to stimulate and emulate a control philosophy.
Answers a., b. & c. list actions that will not accomplish the desired results.
Therefore answer e. is also not correct.
106. The Accounts Payable (AP) Manager asked you as an audit manager to conduct a
meeting to discuss how to more efficiently process payables. The AP Manager indicated
that no audit report would be required only a verbal report that would be distributed only
to attendees at the meeting.
107. Which of the following techniques will most likely provide continuous monitoring?
a. computer-assisted auditing
b. operational auditing
c. embedded audit applications
d. all of the above
108. Section 302 of Sarbanes-Oxley requires that external auditors issue a financial
opinion regarding the accuracy of financial statements. Which section of Sarbanes-
Oxley requires that external auditors issue an opinion on whether effective internal
control over financial reporting was maintained in all material respects by management?
a. section 806
b. section 802
c. section 404
d. none of the above
Answer d. is the correct answer. Answers a., b. & c. list sections that do not
specifically require external auditors to issue an opinion on whether effective
internal control over financial reporting was maintained in all material respects by
management. This requirement is part of section 302. Appendix 1 in the
workbook can be helpful with the descriptions of each section of Sarbanes-Oxley.
109. The Federal Sentencing Guideline, The Foreign Corrupt Practice Act, and
Sarbanes-Oxley are designed to provide regulatory guidance to companies. This means
that companies should comply with internal control and risk management processes,
making and keeping accounting records that accurately and fairly reflect the transactions
of the company. With the addition of the anti-bribery provisions of these regulations a
number of countries have also enacted anti-bribery provisions.
Which one of these regulatory initiatives states that audit committees are responsible for
the hiring, compensation, and overseeing of public auditors?
a. Sarbanes-Oxley
b. Foreign Corrupt Practice Act
c. Federal Sentencing Guideline
d. the anti-bribery provision enacted in 1977 as part of the foreign corrupt
practice act
110. The Board of Directors and other upper-level management must design,
communicate, and emulate the corporate governance and ethical tone throughout the
organization. It is also their responsibility to:
a. efficiency
b. effectiveness
c. economy
d. all of the above
112. Successful companies harness employee energy and enthusiasm. They develop a
climate for trust, encouragement, and productivity. Through people this culture must be
emulated from the very highest levels to the very lower levels within the company.
Which of the following would be an effective way to harness employee energy and
enthusiasm?
Answer d. is the correct answer. Answers a., b. & c. each list an effective way. It
has been proven that when management listens to employees and shows an
interest in the employees work then energy, enthusiasm, and productivity
increase. The Hawthorne study is one evidential event of this. It is important that
management listen to the employees. This has two benefits. First, management
may realize some actual hands-on issues that they may not have been aware of
previously. Second, the fact that management is listening to the employees and
showing and interest will actually stimulate morale. Providing appropriate and
adequate training in the processes that employees must function helps build
knowledge, thinking, and confidence in the employees.
113. Although the Board of Directors members often are members of Boards of
Directors of a number of different companies their main focus should be:
a. the internal controls of the company that they are addressing at any point in
time
b. to identify the internal risks and the external risks pertinent to the
company that they are addressing at any point in time
c. to develop and communicate the policies and procedures relative to the internal
and external controls of the company they are addressing at any point in time
d. to develop a communication channel for the communication of corporate
governance for the company that they are addressing at any point in time
Answer b. is the correct answer. Answer a. is not all inclusive. It only mentions
internal controls. Although Board of Directors needs to communicate concerns
about the internal controls of the company internal controls are not the only issue
they should be concerned with. Further, this answer implies that it is the internal
controls relative to the specific company. The Board of Directors should be
interested in and communicate the concerns about any and all internal and
external risks / internal controls which may impact the company they are
representing. Answer c. can be eliminated because the Board of Directors would
generally not be involved in developing specific policies and procedures. This
also holds true for answer d. It is unlikely that, although Board of Directors may
want a communication channel established that they would be the ones to
establish that tool.
a. an objective
b. a goal
c. a mission statement
d. a combined mission and vision statement
Answer b. is the correct answer. A goal has much more detail and specifics than
the objectives or mission statements. This is a detailed statement. Mission
statements are very broad. Therefore, answers a., c. & d. can be eliminated.
Dealing with this issue an objective statement might be that “our objective is to
satisfy our customer needs and to correct deficiencies as soon as possible”.
115. Although a goal statement is somewhat specific which statement is even more
specific for an issue requiring an immediate correction?
a. strategic planning
b. corporate memo
c. tactical planning
d. all of the above
Answer d. is the correct answer. Answers a., b. & c. all lists the results of
customer dissatisfaction. Providing quality products or services will increase
market share (increase sales and customer base) hence increase revenue,
decrease costs by a loss of customer base (market share), decreased time dealing
with dissatisfied customers, and decrease the cost of rework. It is wise to do the
job correctly the first time. Remember that complaints from dissatisfied
customers spread much faster than praise from satisfied customers - answer c.
This is the risk of success (positive risk) or the risk of failure (negative risk).
a. operational controls
b. preventive controls
c. corrective controls
d. sales and marketing controls
Answer b. is the correct answer. The question asks for the major type of control
weakness. Answer a. is not correct. The situation may have been more global
and caused by upper-level management decisions (the root cause of why the
customers left). This would not be addressed by operational controls. Answer c.
can be eliminated because the question asks for the major control weakness. The
new efforts of the sales task force might be considered a corrective control but
that is not what the question asks. Answer d. lists sales and marketing controls
that might have some consideration. Weakness of these controls may or may not
be the case. Further, this answer is specific to sales and marketing. The main
issue here is that the task force’s the effort would not be required, at least in this
magnitude, if adequate preventive controls were in place to provide quality to the
customers so they would not change in the first place. This situation is common.
Teams are awarded for winning back customers for the company that the
company itself caused to change to the competition. This is not a wise situation.
It is easier to keep a customer by providing adequate quality as perceived by the
customer than it is to win back a customer.
118. As a risk and control expert you have been asked to attend a meeting to address
major issues in the company. The attendees, with the help of the moderator, are listing
pages and pages of recommendations with proposed fixes for the issues. This is the
first meeting of the team and no prior discussion has taken place to address these
issues. As the risk and control expert your comment to the attendees should be:
119. Volatility in business contributes to the extensive nature of risk. These changes
include such items as changes in regulations, external competitive forces, rapid
expansion, rapid reduction, new staff, new systems, and new locations. In simple terms
the more activity such as those mentioned here the more the risk will increase.
Considering a company with these types of activities what would be the best
consideration of how often a risk assessment in the company should be conducted?
a. once a month
b. it depends on the risk appetite and the actuality of frequency and
impact of influencing volatile activities
c. once a quarter is sufficient. risk assessment is a control it is important not to
over control
d. it depends on the management philosophy regarding risk appetite and risk
tolerance
120. It is sometimes said that the shortest distance between two points is a straight line.
One of the consequences of not moving along a straight line between two points is
inefficient use of resources. For example, measuring the distance along a straight line
between two points would reveal one distance. If the distance was measured drifting on
and off the line in either direction (detective control) and then correcting (corrective
control) to get back on the straight line to reach the final point the distance traveled on
the adjusted line would be longer than the straight line (inefficient use of resources).
The more predominate the drift from the straight line the more inefficient reaction would
be required. Further, there may a risk of not reaching the final point within a specified
time or even running out of fuel before reaching the final point. Drifting on and off the
straight line is an example of:
Answer b. is the correct answer. Although there are a number of key words used
in the question such as “types of controls” and “risk” the issue is that a clear
focus on the objective was not maintained. Without a clear focus of the end
objective efforts will tend to drift and cause inefficiencies. Answers a. or c. could
be considered as correct. However, the objective should be first in priority, then
the risk that will stop or slow down the achievement of the objective, and then the
controls to manage the risk. In this case, the risk is drifting from the straight line
and reaching or not reaching the objective as planned. The controls are making
adjustments to get back on the center line. However, before drifting or correcting
it is necessary to know what the final achievement point is (the objective).
Objectives, risk, and controls in that order must be addressed in that order.
Answer d. does not address the problem.
121. The achievement organizational culture is most similar to which management style?
a. autocratic
b. supportive
c. collegial
d. custodial
122. Sarbanes-Oxley (SOX) has 11 major titles each with a number of subsections.
Two of the most important subsections are 302 and 404. Which subsections are most
related to the protection of informants and the protection for employees of publicly traded
companies who provide evidence of fraud?
Answer a. is the correct answer. Subsections 806 & 1107 respectively are the
protection of informants and protection for employees of publicly traded
companies who provide evidence of fraud. Appendix 1 in the workbook provides
a description of all SOX titles and subsections, including 806 & 1107 that are the
most relative to this question. Answers b., c. & d. list other subsections but can
be eliminated because of the word “most” in the question.
124. What are the elements that often drive fraudulent acts?
a. need or want
b. opportunity
c. rationalization
d. all of the above
Answer d. is the correct answer. These are the three basic elements that can
result in fraudulent acts. Answers a. & b. list elements that are somewhat self-
explanatory. If a human feels as though they need or want something then the
need or want may be the driver to get it. Then the opportunity to get it reveals
itself and maybe by devious means the human may move to satisfy these needs
or wants. Answer c lists the element of rationalization that becomes interesting.
In most cases, after a devious or fraudulent act has been committed the human
will think of reasons why it was all right to perpetrate the fraudulent act. For
example a person may steal from a company then when confronted will say well I
should have received the promotion and did not get it so I deserve what I stole.
Generally, the need, the opportunity, and a reason in the person’s mind why it
would be or was all right to conduct the fraudulent act are all necessary for the
fraudulent act to occur. Often the rationalization begins to formulate in the
perpetrator’s mind even before the act is completed.
a. definitive
b. not definitive
c. definitive by most cultures
d. all of the above
Answer b. is the correct answer. Answers a. & c. can be eliminated as these are
not true. Answer d. can be eliminated because it could not be correct because
answers a. & b. contradict each other. There are some academic explanations of
ethics but these are vague, not tangible, and open to interpretation. Example of
these are 1) ethics is the underlying platform from which fraud may be perpetrated
and 2) ethical values are the inherent believes of right and wrong within a person
or group of persons. What is clear is that what is considered ethical by one
person or group of persons may be different than what is considered so by
another person or group of persons.
126. It was recently discovered that a well-respected employee had stolen some cash
from the cash draw in a department. There has never been a history of this employee
doing any such act in the 20 years employment with the company. This employee has
been considered ethical and had been trusted with many company valuable materials.
The root cause of this event was most likely:
a. an opportunity
b. a life environmental change in the employees life situation
c. a need
d. all of the above
Answer b. is the correct answer. If this employee has never had any questionable
issues in the past, something probably changed in that person’s life situation
causing them to take the money. This could create a need. The question asks for
the most likely root cause. Answer a. could probably be eliminated because the
question implies that this employee has had many opportunities in the past and
there were not issues. Answer c. may list a valid cause but this answer does not
indicate what kind of need. The need in this answer may not be a need relative to
the need for the cash that was taken. With answers a. or c. eliminated answer d.
can be eliminated as well.
127. Conducting an adequate risk assessment can be a complex process. There are a
number of mathematical models tools that can help in conducting a risk assessment.
These include the annual loss expectancy, which is the product of the probability and the
impact of the potential risk. The result of multiplying these two elements is the annual
loss expectancy. Another mathematical model is the absolute risk model. This
considers the probability, the impact, and adds the time into the equation. Therefore, the
product of multiplying all three of these elements will result in the absolute risk
assessment. Which of the following would be considered the most important tool when
developing an appropriate and adequate risk assessment?
Answer d. is the correct answer. Answer a., b. & c. list mathematical models that
are appropriate tools when developing a risk assessment, and there are many
more than those mentioned in the question and answers, but they are not the
most important tool. Mathematical models provide a benchmark and an indicator.
The most important tool is not a mathematical tool at all it is human subjectivity.
The knowledge, wisdom, experiences, and different points of view from people are
the most important tools in risk assessment. The mathematical model numbers
are fine but then the question should be asked of people using these models do
these numbers make sense.
Note: Answer a. lists the direct probability estimate model that includes the
inherent risk, control risk, and audit risk. Answer b. lists the modified annual loss
expectancy that includes the probability of the threat, the probability of control
failure, and the maximum impact in money. Answer c. list the annual loss
expectancy model that is explained in the question.
Answer d. is the correct answer. Answer c lists the textbook answer. Answer a.
lists all of the textbook items with one change, supervising. The trap here is that
supervising is a directing control. Hence is the same as directing. Answer b. lists
the word monitoring that is a proactive control which should include two parts not
only the physical media to monitor but the action to react to what is monitored.
Hence the trap here is that the word “monitoring” is definitely a control hence
satisfies the controlling part in the textbook answer. Read the question and the
answers. With this type of question and answer wording it is easy to get off track
and select the not correct answer. Think!
129. The term empowerment is commonly used in business. This simply means that a
person with some power is willing to delegate some of that power to a subordinate. An
example of this is allowing the subordinate to make some routine decisions normally
made by the person with the power. However, a consideration often not considered with
empowerment is that not everyone may want to give up some power and not everyone
may want to receive some power. The recommended stage(s) of instituting
empowerment in an organization are:
Answer d. is the correct answer. Answers a., b. & c. all list the recommended
stages of instituting empowerment in an organization. Identify where or who
should be empowered. Empowering for the sake of empowering is a major risk.
In actuality, it can cause more negative risks or impacts than if the empowerment
did not take place. For example, if someone was given power and did not want it
or was not comfortable with the new power their morale could decrease. On the
other hand, if someone was told to empower someone else and did not want to
give up some power they may feel that they lost some control. Hence, their
morale and attitude could decrease. It is important to know what or who is
involved in the empowerment process and assess the appropriateness of that
effort.
130. Motivation of employees has been a continual effort of managers for years. The
risk of not motivating employees adequately, appropriately, and timely can result in a
decrease in productivity because of attitude, morale, and just human psychological
issues. To manage employees’ efforts effective managers need to adjust to changes
while constantly monitor the morale and attitude of their employees. There are a
number of managerial tools that have been implemented by managers over the years.
Increasing responsibility, recognition, and opportunities for growth and achievement is
best defined as:
Answer b. is the correct answer. The question asks “what had probably not been
asked in the past”. Answers a., c. & d. list general and typical questions that
would have probably been asked in previous conversations at Board of Directors
meetings. Answer b. describes the potential problem. In many cases, controls
are installed as additions to existing controls. However, little effort is employed to
address the adequacy and appropriateness of existing controls. Not addressing
the adequacy and appropriateness of existing controls can create an inefficiency
of effort and a waste of funds and resources. For example, a warehouse
maintains storage of valuable material and was appropriately secured by an
armed guard, security cameras, and key access 24 hours a day seven days a week
at a substantial cost. This is a very appropriate control for that condition.
However, a few years ago all of the valuable material was moved to an off-site
storage facility at an additional substantial cost. If nothing were done to
discontinue the old storage facility controls there would be controls that no longer
served their purpose, costs a substantial amount, provided no benefit, and were
an inefficient use of resources. Answer b. lists control question that is often
missed in a discussion about the appropriateness of existing controls.
132. External suppliers can cause substantial risk to the success of companies in a
number of ways. The most predominant root cause issue of external suppliers delaying
shipments or providing poor quality of required component parts could be:
Answer d. is the correct answer. Be careful of working with only one supplier
(sole source). Sometimes a sole source suppler is necessary because there is
only one suppler that can supply the goods and services needed. Unfortunately,
sole source suppliers are often chosen without that consideration. The trap with
sole source suppliers is that they have the receiver of the goods or services in a
difficult situation. If the sole source suppler provides poor quality or delays
shipments, they can influence the success of the receiver of the goods or
services. If the receiver of the goods or services has no other suppler their
success could be compromised in terms of reputational risk. Answer a. might be
considered because of the comment of highly technical and complex
components, because the more complex something is the higher the risk. That is
true but that is not what the question asks. Answers b. & c. list items could be
issues but these answers are very general and the question specifically asks “the
predominant root cause”.
133. When working with external vendors which of the following would be the least likely
to discuss with the external vendors?
Answer d. is the correct answer. Would this ever be appropriate to discuss with
an external vendor? The answer is yes. However, this type of discussion would
probably be very specific and relative to the work that the external vendor was
performing for the company. Therefore, this topic of discussion is the exception
rather than the rule. Answer a. is correct as it is wise to review the Code of
Conduct with the external vendor as the vendor should be expected to comply
with the company’s Code of Conduct and ethics. Answer b. lists an appropriate
action of discussing the contract when working with external vendors. Legal
professionals should be involved in the design and even the review of the
contract with the vendor. Answer c. lists discussion of the organization chart that
may or may not be necessary. The vendor does need knowledge of parts of the
organizational structure needed to effectively complete the work required.
a. title
b. pay grade indicator
c. organization
d. responsibility
Answer b. is the correct answer. Some pay grade indicators noted by the
company is the best control for appropriate payment of specific amounts of funds.
Answer a. lists a method used by many companies. The problem with this is that
some departments use expanded titles for administrative purposes. For example,
some staff members, who work with specific customers, may have a tile of Vice
President. However, in reality their pay grade may be in reality a different salary
grade. A Vice President with that corporate designation would have a higher pay
grade. Whatever the internal pay code it is higher or different for a real Vice
President than a first-level manager Vice President. This is an important but
simple control. It is not appropriate for a first-level manager to approve fund
payments that they are not authorized to approve for that level of approval.
Answers c. & d. list methods that may be appropriate for information purposes on
payments and budget reasons but would have a less importance for the actual
authorization of payments. An exception might be that one department is
authorized to make a payment for a particular service or product and another
department is not. Therefore, department identification could identify
inappropriate payments. However, the question asks about the levels within the
company authorized to make payments. The key word here is “levels”. Do not
read into the question and answers.
136. One of the most important key considerations for the administration of third-party
relationships is:
Answer d. is the correct answer. Answers a., b. & c. list relationships may be of
consideration but they may or may not be necessary considerations. For
example, the location of the vendor may be a consideration in some cases but not
in others. The question asks for “the most important”. This means that all
answers could be correct individually but the correct answer is the best of the
correct.
Answer d. is the correct answer. Answers a., b. & c. all list items for The Board of
Directors to adopt as part of a risk management process to oversee third-party
vendor relationships.
a. risk to earnings or capital arising from an obligator’s failure to meet the terms
of any contract
b. risk arising from public opinion
c. risk to earnings and capital arising from adverse business decisions or
improper implementation of appropriate business decisions
d. risk to earnings or capital arising from problems with product or service
delivery
Answer c. is the correct answer. Answer a. lists the description of credit risk.
Answer b. lists the description of reputational risk. Answer d. lists the description
of transaction risk.
Answer b. is the correct answer and the main reason measurement is important.
Humans can make errors and misinterpret direction. Therefore, measurements or
monitoring of a project is necessary. Answers a. & d. list the same issue.
Although important, they are not the underlying main reason for measuring or
monitoring. Answer c. sounds good and is true, measuring or monitoring actions
require a noun and verb. However, this is not the correct answer for this question.
a. entity integration
b. establishing goals and objectives
c. process measurements
d. benchmarking
Answer d. is the correct answer. Answers a., b. & c. list common uses of
benchmarking However, there is a caution. Many people or organizations will
benchmark against other entities or organizations and then will implement
whatever those entities implemented. The only thing that gets changed is the
company logo. The caution is that just because something worked somewhere
else does not mean it will work where it is being benchmarked. Benchmarking
should be used as a tool to gather information and to help stimulate ideas that are
best suited for the organization or entity doing the benchmarking. Also, be
careful of the term “best practices”. This is a very vague term that is often
misused. Remember what is a “best practice” in one place may not be a best
practice in another place.
a. control risk
b. audit risk
c. competitive risk
d. managerial risk
Answer a. is the correct answer. Control risk is the risk that results when applied
controls failed to reduce risk to an acceptable level. Residual risk is the risk that
still exists after controls were put in place. Answer b. lists audit risk that means
the auditor did not perform an adequate audit possibly because of considerations
such as scope, sampling, and budgeted time. In any event, management relied on
an opinion from audit and the opinion was not complete or adequate. Answers c.
& d. list situation they are really general terms, although they could be specific
types of risk in a specific situation.
Answer c. is the correct answer. Risk mapping is an excellent risk analysis tool
when use appropriately. It identifies risk into categories and then further defines
them by color such as red the highest risk, yellow a concern, and green a lower
risk. This uses the concept that information is easer to view graphically rather
than just words. The trap is the use of the names for the categories. Most often,
the categories are named high, medium, and low. However, these terms can mean
different things to different people. It is important that specific definitions of
these terms be identified and communicated to everyone involved. For example, a
high could mean over 1,000,000,000, a medium would mean 500,000 to
1,000,000,000, and a low could mean zero to 5000,000. Answers a., b. & d. list
items that are easily addressed.
146. One of the ways to manage risk after it has been identified, measured, and
prioritized is to control the risk. What is another way to manage risk?
147. When an organization is identifying what they do, who their clients are, and how
they intend to succeed they are:
a. establishing a mission
b. establishing objectives
c. establishing the ground work to establish business objectives
d. establishing a focus to develop a mission
Answer c. is the correct answer. The question outlines that they are not at the
point of establishing the objectives yet. Answers a. & d. are not relevant to this
question. Answer b. is not correct since to establish effective business objectives
an organization must establish a mission.
148. Frequent and highly volatile changes in the business environment should require:
Answer d. is the correct answer. Answers a., b. & c. list items that are required.
Changes in the work environment require changes in objectives, risks, and
controls. The more volatile the work environment is the more frequent and
intense these three components should be addressed.
149. The adequacy and effectiveness of an organization’s activities related to risk and
control management should be a consideration of:
a. the organization
b. internal auditors when planning an engagement of that organization or
activity
c. the external auditors when planning a financial based audit of the
organization or activity
d. the controllers
Answer b. is the correct answer. Answers a. & d. list considerations that may be
appropriate to some degree however they are too broad for this question. Answer
c. list consideration related to external auditors and financial audits. The work by
external auditors, especially when focused on a financial audit, would probably
not be concerned with the adequacy and effectiveness of an organization’s
operational risk and control management. The question implies a broader scope
than financial audits.
a. internal auditors
b. management
c. external auditors
d. Audit Committee
Answer a. is the correct answer. The key words are “providing an opportunity to
make significant improvements to an organization's existing risk management and
control processes”. Answers b., c. & d., list other organizations that by their
functions would be part of the existing risk and control processes. Internal audit
has the opportunity to assess those existing risk and control process and
recommend improvements.
151. External vendors can receive or supply various services, various products,
subcomponents, advice, and training. Because of the increasing potential risk when
employing external vendors, it is wise to have legal advice when designing a contract
with an external vendor. These contracts should:
Answer a. is the correct answer. Generally, there is a caution about the word
“always” when used in multiple-choice questions. In this case, the word “always”
is used in every answer choice possibly causing some additional consideration.
Answers a., b., c. & d. list some type of audit of the activity between the contractee
and the contractor. Answer b. could really be eliminated because a generic audit
clause may not be appropriate in all case. However, for ease of work in
developing contracts this is sometimes the case. Answers c. & d. also can be
eliminated because they are specific to physical components. As is mentioned in
the question there can be many types of vendor services. Some vendor services,
like training, do not generally contain any or at least a small amount of physical
components. Answers c. & d. would be more relevant to a manufacturing
environment. So by elimination answer a. results as the correct or best answer.
152. The lack of quality and collaboration among departments can cause inefficient use
of resources, a risk that can be costly. What is a term used for managing this risk?
a. differentiation
b. communication
c. integration
d. tone at the top
Answer c. is the correct answer. Integration means bringing the individual units
together to an appropriate degree to work in harmony. The key word here is an
appropriate degree. Some differentiation is good. Answer a. lists differentiation
that, in this context, means that individual departments are working
autonomously. That is they are working as individual units. Although this can be
good to some degree, because it stimulates thinking and innovation, excessive
autonomy can be counterproductive. Managing differentiation can become
difficult because of psychological and independence issues in individual
departments. In the context of the question, integration is the opposite of
differentiation. Answer b. lists communication that could be appropriate to
facilitate the integration but as an answer is not specific enough to be a good
answer choice. Although individual departments may work to some degree as
individual units their efforts should be directed to the overall organization goals
so that the entire organization is all working in the same direction. Answer d.
follows the same thought process as communications.
153. Providing education about why a change is necessary, involving those who will be
affected by the change in the change process itself, and supporting the change effort
can all help facilitate change. What are two approaches for change that should be
implemented with caution?
Answer c. is the correct answer. The question asks for two approaches of change
that should be approached with caution. Although coercion and manipulation
may be used they should be used on rare occasions and when the consequences
of these approaches have be thoroughly anticipated. Answers a. & d. list
negotiation that can approach these same issues if not managed properly. In
negotiation if one side feels like they have lost then resentment will be a
consequence which may impact the success of the objective. Answer b. lists
items that require less caution than answer c. These caution areas may be used
but with a specific not arbitrary purpose.
154. There are a number of advantages in the monitoring of Key Risk Indicators. One
of these advantages is that Key Risk Indicators can provide an indication of the
achievement of the risk appetite and tolerance. Another advantage of constant
monitoring of Key Risk Indicators is:
155. How long after a self-assessment workshop should an internal auditor who
participated in a self-assessment workshop conduct a follow-up audit?
a. never
b. when requested and agreed upon between the CAE and the process owner
senior management
c. generally between 6 and 12 months
d. it depends on the severity of the issues identified and discussed in the
workshop
156. The facilitator of a self-assessment project must outline the rules of the workshop
before the workshop actually begins. What are two of the most important rules to be
communicated by the facilitator, in a general business workshop, before the actual
workshop begins?
a. when the workshop will begin and end as well as how agreement will be
reached
b. who will be expected to attend each workshop meeting as well as how the
report will be drafted and distributed
c. how the report will be distributed and how fraud, security, or propriety issues
will be discussed
d. how agreement will be reached and that fraud, security, or propriety
issues will not be discussed
Answer d. is the correct answer. These are the two most important things that
everyone participating must understand and agree with before the self-
assessment project meeting begins. Answers a., b. & c. list items that must be
outlined.
157. The word evidence is often mistakenly only associated with fraudulent or
wrongdoing activities. This is not always the case. Evidence developed in the risk and
control assessment process can be an effective guide for the appropriate application of
risk identification, risk management, risk prioritization, and application of appropriate
controls. Which type of evidence would most likely be associated with a Delphi
Technique risk assessment?
a. sufficient evidence
b. opinion evidence
c. relevant evidence
d. circumstantial evidence
158. How many questions should be included in a typical risk and control questionnaire
or survey?
159. Which type of risk is most representative of a lack of harmony of employees working
together for a common goal?
a. communications risk
b. strategic risk
c. environmental risk
d. information & technology risk
161. Less than perfect knowledge about current or pending circumstances in a process
is a challenge that process owners address every day. This situation is best defined as
what type of risk?
a. probabilistic risk
b. environmental risk
c. external risk, the impact from external uncontrollable sources
d. inherent risk
162. An internal auditor has just completed an audit of a warehouse, which contained
valuable material. It was found that the warehouse access was not secured. What
would be an appropriate recommendation, in the audit report, to secure the warehouse
access?
a. place a guard at the access door with a log book to record the time and date
of who entered and exited
b. obtain a key access pass thru lock in the door hardware section at the
hardware store across the street and install it on the access door
c. install video cameras so as to monitor who enters and exits and the time and
date of access and exit
d. provide a mechanism that will physically secure the access door with
monitoring and recording the date, time, and name of who entered and
exited
Answer d. is the correct answer. Answer d. describes the overall objective. There
are a number of mechanisms and devices that will achieve this objective. It will be
up to the process owner to satisfy this objective and decide on a guard, a log, a
camera, a lock, other devices, or combination of these. Answers a., b. & c.
describe actions that are too specific. Some guidance from the internal auditor
may be necessary for acceptance of adequate devices. An internal auditor,
providing internal audit services and possibly even consulting services, should
not be that specific.
163. A senior manager responsible for all warehouse operations has asked the internal
auditor, (a one auditor organization) to consult with that department to develop new
inventory control policies. As part of regulatory requirements, this auditor must conduct
an inventory audit within this warehouse department twice a year. The auditor’s
response to the manager should be:
a. review the consulting guidelines of the audit department with the manager
b. suggest that they schedule a start time to begin work on the policies
c. suggest that the external auditors conduct the inventory and the internal
auditor will work on the policy
d. suggest that an outside consultant help with the policy development
Answer d. is correct and the best answer. Answer a. describes an action that is
too general a response for the question. There is no mention of what are the
guidelines. Answer b. can be eliminated quickly because the auditor will still have
to conduct the inventory audit. Developing a policy and then auditing the policy is
not the best approach for an auditor. Answer c. lis an action that may not be
appropriate because the question indicates that it is a requirement that the
internal auditor conduct the inventory audit. Be careful of assuming anything
when reading the answers.
164. Why would it be necessary for an internal auditor or risk and control specialist to be
a team participant on a self-assessment project?
a. because, of all the participants, they would have the only understanding of
risk and control management
b. because they would be the facilitator of the workshop
c. it is not necessary
d. it is important that they are always in attendance to make sure controls are
addressed adequately
166. Self-assessment projects typically utilize two main tools. They are the facilitated
workshop and questionnaires. When should questionnaires, in a self-assessment
project, be used as a primary tool?
Answer b. is the correct answer. There are two ways to identify the correct
answer. The first is to realize that questionnaires can be a useful tool when trying
to obtain an assessment from a large group or when it is impractical to physically
interact with all the participants. This could be because of physical constraints
such as budget, location, time, or other logistics. The second way to arrive at the
correct answer is to eliminate the remaining answers. Answers a., c. & d. can be
eliminated because of the words “always”, “never”, and “only”. Questionnaires
are a tool. They can be developed in various formats and for various purposes.
They may or may not be used with other tools. They may or may not be used at
all.
Answer d. is the correct answer. Answers a., b. & c. list very appropriate items for
process owner consideration when developing KRIs. However, the question asks
what should always be considered. A major consideration, none of the answers
list, is to understand the business situation and environment. Then develop KRIs
and adjust using such things as the answers list to interrelate with the specific
business situation. Risk assessment is not the same in all situations.
168. Developing collaboration and sharing of ideas among risk and control specialists
and process owners can have a tremendous benefit to a process. The adequate
management of internal and emerging risks can contribute greatly to the necessary
compliance and success of a process. The amount of time for the benefits to be realized
may vary depending on each specific situation. However, over time a collaborative risk
and control scheme may help reduce actual risks by less intrusive methods such as
directed internal and external audits. These can be of particular importance in highly-
integrated, interrelated, and diverse organizations. Organizations that are ultra-flexible
in order to rapidly change products and services is a definition of:
169. Providing consulting and self-assessment can be a new approach to risk and
control management for both the client and the risk and control specialists. These new
approaches may require a change in thinking for all involved. What is the most
significant reason why humans do not like to change?
Answer b. is the correct answer. Answers a., c. & d. list reasons why humans do
not like to change from their comfort zone to a new zone. Hence, all of these
answers should be considered and addressed when a change agent (risk and
control specialists) is trying to implement something new (change).
171. The self-assessment process can improve processes in a number of ways. What
is the most important benefit of self-assessment?
172. Conducting an internal audit can be extensive depending on the complexity of the
process, the politics of the process staff, and the audit staff itself. However even as the
audit is brought to conclusion, with professional and satisfactory results, all of this
professional effort can be lost if the concerns identified during the audit are not reported
or communicated effectively. The objective of the audit is to motivate the reader or
readers of reports to correct the issues identified during the audit. Which of the following
would be the most effective way an auditor could motivate the readers?
a. present a clear concise audit report with adequate evidence to support the
findings and concerns
b. present an oral presentation of the concerns to upper-level management
c. present the concerns to lower-level management then to upper-level
management
d. present all the levels of detail to lower-level management and upper-level
management
173. Process owners attending a self-assessment workshop for the first time may
require some pre-workshop training that should include:
174. Which of the following is the best example of risks that business process owners
must manage but have little control of when the risk will occur or the impact of the risk?
a. new employees
b. changes in socially accepted norms
c. changes in process IT systems
d. an increase in required security
175. The generally accepted elements of reporting finding are the condition, the criteria,
the cause, the effect, and the recommendation. It is important with the contemporary
reporting approach that internal auditors or reviewers try to identify and recommend
corrective action for the actual root cause of the issues they have identified. Therefore,
in reference to the root cause the review or audit should:
Answer a. is the correct answer. Answers b., c. & d. list important considerations
when developing a questionnaire. Remember that some words may be
controversial for some people and not for others. It is best to avoid any words
that may be controversial. Answer c. lists a concept of sales techniques. The
respondent is the buyer. Do not make the buyer work to interpret or answer the
questions in the questionnaire. Keep the questionnaire simple. Understand
recipients’ knowledge and background. Use terms appropriate for the recipients.
177. A multinational corporation whose reputation is critical not only to the corporation
but to the world economy is about to perform a risk assessment to manage its
reputational risk. The least concern of this risk assessment process in this company
should be:
Answer d. is the correct answer. The key words in the question are “the least
concern”. In addition, the question states that the reputation is most important to
the corporation as well as the world economy. This means that no matter what
the cost that reputational risk should be managed. In most other situations, the
cost- benefit would be a primary factor of consideration. However, in some
extraordinary circumstances, cost-benefit is ignored and the risk must be
managed no matter what the cost. Another situation could be a life threatening
situation. Again the cost of managing the risk may be a lesser consideration than
in normal circumstances. These types of risk assessments should be the
exception rather than the rule and should be conscious decisions. Answers a. , b.
& c. list less concern.
a. the workshop
b. the internal auditor who wrote the report because it is not a formal audit report
c. the self-assessment team leader
d. the internal audit department
179. Generally there are three considerations when identifying risk. They are exposure
analysis, environmental analysis, and threat scenarios. Which one of these three
considerations would not be appropriate when conducting a risk identification process?
a. exposure analysis
b. environmental analysis
c. threat scenario
d. none of these
Answer d. is the correct answer. Answers a., b. & c. are viable risk identification
models. Utilizing any one of these individually or in some combination depends
upon the probability and impact of the risk situation, the process where the risk is
to be identified, and the timing of the impact of the potential risk.
a. physical security
b. attitude and morale
c. the development of policies and procedures
d. the correction of fraud or inappropriate acts
Answer b. is the correct answer. Attitude and morale are considered soft
controls. Answers a., c. & d. list items that are considered hard controls. A note
with answer d. is that fraud and inappropriate acts should not be discussed in a
general business self-assessment. A special self-assessment for that specific
purpose would be more appropriate. Discussion in self-assessment workshops
helps to address soft issues, controls, or risks. Remember that poor attitude or
morale is actually a risk.
a. human risk
b. communications risk
c. inherent risk
d. union risk
Answer c. is the correct answer. Inherent risk is the risk of putting assets to work.
These assets can be employees or other assets such as inventory, plant and
equipment, or technology. Now there is some debate over this term inherent risk.
One definition is that described here. Another definition is that inherent risk is
that risk which is apparent after all controls have been removed from the process.
Not to debate which definition is correct but to prevent a trap which is to make
sure that everyone involved in any conversation utilizing the term inherent risk are
all using the same definition. Answer a. lists human risk that is the issues relative
to people and the interaction among people. Answer b. lists communication risk
that is risk caused as a result of inappropriate or inadequate communications
among people. Answer d. lists union risk that is risk as a result of the influences
and relationship between process owners and respective unions. Now in the case
of the question putting employees to work as a general statement may or may not
involve unions.
a. in such a way that the process owners will embrace the concepts
b. conduct corporate governance presentations at the higher levels and then
work down to the lower levels as appropriate
c. dictate the consequences of not implementing an adequate corporate
governance scheme
d. develop a risk and control training program appropriate for each specific
audience
183. The Enterprise Risk Management (ERM) model is an expanded and enhanced
model of COSO and other previously developed integrated control models. Like the
previously developed models, ERM was developed and implemented as a reactionary
control tool. ERM includes a larger number and many more detailed components and
control objectives than COSO and previous models. As a result ERM:
Answer b. is the correct answer. Answers a., c. & d. could probably be eliminated
quickly because of the word “all”. It is a rare occurrence where anything can
eliminate all of the risks. ERM like any of the other control models is only a tool.
Human intervention is a key element in the interpretation and analysis of the data
incorporated into these models. Human subjectivity, opinion, and objectivity
should be a major part of the use of these models.
184. Because of an increasing number of laws and regulations added to the increased
responsibility of the Board of Directors of a large manufacturing company the Board of
Directors has become concerned about compliance. Consequently, they have created a
team of internal auditors, risk and control specialists, process owners, and legal
professionals to review and ensure that the controls are in place to ensure compliance.
The Board of Directors has asked this team of professionals to review and suggest
improvements in the control scheme of all the process and sub-process as well as the
interrelation among these process units. This is a complex company with multi-level,
multi-functional, and multi-geographic implications. What should be the primary and
clear focus of this professional team to address the adequacy of controls in these
processes?
Answer d. is the correct answer. It would be wise for this team to review and
determine the adequacy of controls as they relate to the current environment.
However, process improvement is not only looking at the current situation.
Today’s business, and as implied in the question, is constantly changing.
Therefore, process improvement requires an assessment of the current control
situation as well as an anticipation of future control needs. An effective
constantly and continuous process improvement scheme requires constantly and
continuous changing risk and control management. Answer a. is too general.
Read the entire set of answers because some questions have answers that are
combinations of answers.
Answer b. is the correct answer. The duration of the consequences of the risk
event occurring is the most significant of the answers. The duration of that threat,
depending on the length of time that the threat occurred could have a more
significant impact on the consequences than the other answers. Answers a., b. &
c. list items that would all have impacts less that the duration of consequences.
Answer b. is the correct answer. Answers a., c. & d. list other important
considerations when developing a questionnaire. Many times questionnaires
contain many pages, many questions, and small print. These types of
questionnaires are generally ineffective. Most readers will lose interest after a few
questions. Hence, answers of many questions become just random selections.
As a result, the conclusions drawn from the questionnaire become inaccurate.
Keep the questionnaire simple containing a few pages, readable type size, and
one question at a time. Remember there are two objectives of questionnaires.
The first objective is to increase the number of responses. The second objective
is to increase the accuracy of the answers. Keep the questions simple and
address one question at a time. With multiple questions incorporated into one
question and only one answer choice which question would be answered. It is
also wise, unless it is absolutely necessary, not ask for personal information such
as name, department, and organization. Anonymity is often an important
consideration with questionnaires. Once the perception of anonymity is broken
the credibility of the questionnaires will be compromised.
187. The Delphi Technique, in risk evaluation, is a tool that is most similar to:
188. The manager of the risk and control review team requested to team members that
the concerns or findings in their reports be quantified in monetary value, numbers, or
percentages. What are the most primary advantages and disadvantages of these types
of quantifications?
189. Three common approaches when performing a risk assessment are calculating the
risk factors, using historical data, and subjective analysis. Which of the following would
be the best approach when conducting a risk assessment of the operations in a
process?
a. multiplying the probability times the impact times the time to determine the
annual loss expectancy
b. conducting a risk self-assessment to discuss a subjective and objective view
of the potential risk
c. reviewing industry historical risk events
d. none of the above
Answer d. is the correct answer. This question and the answers may require
some thought. Answers a., b. & c. list good approaches to risk assessment.
However, the question asks for the “best approach”. The best approach is a
combination of all of these answers. This is especially true when the question
asks about a risk assessment in the operations component of the process. A risk
assessment in operations would be wide-spread in perspective. Answer a.
describes using the numbers that would not be enough. Answer b. describes an
approach that is important in any risk assessment. Hence, of all three of the
answers answer b. would probably be the most important. The depth of this
would be dependent upon each situation. Answer c. approach would probably
have little or no impact.
Answer b. is the correct answer. This question sounds simple but the answers
can cause some debate and may require some extra thought. The question asks
for the primary component. That means that there might be more than one good
answer. The correct answer is the best or most important of the good answers.
Do not answer fast. Answers a., c. & d. list components of a self-assessment
project. However if all of these are accomplished and no appropriate action is
taken then the self-assessment project will be a waste of time.
191. What type of risk best describes a risk that will require additional control
considerations?
a. service
b. reputation
c. outsourcing
d. residual
Answer d. is the correct answer. Residual risk is the remaining risk after
management’s response to risk by the addition of adequate and appropriate
controls. This implies that some risk had been addresses by internal controls but
not all risk was controlled. So either this residual risk is being accepted or will
require additional application of controls. In either case, this is an additional
control consideration. Answers a. & b. list risks that can be controlled by
providing services that are viewed by customers and potential customers as
excellent. Answer c. lists outsourcing risk from the outsourced vendor who has
provided inferior quality products or services. This results in increased negative
reputation to both the outsourced vendor as well as the organization doing the
outsourcing. This can be controlled to some degree by selecting the best
outsourcing partner, using more than one supplier, and carefully developing
contracts with legal support. Reading the question is important. The question
asks for additional control considerations. This implies that control
considerations had been already applied but more may be needed. The remaining
answers do not imply that any control considerations were applied at all.
192. A SWOT analysis is a tool that would have a most applicable use:
a. in a risk assessment
b. in a feasibility assessment
c. in a control adequacy assessment
d. in a financial compliance assessment
Answer b. is the correct answer. A SWOT analysis tool is most applicable when
analyzing the feasibility of proceeding or not proceeding with a project. The
SWOT, by discussion of a group of subject matter experts, identifies the
Strengths, Weaknesses, Opportunities, and Threats of the proposed project. For
example, what are the Strengths, Weaknesses, Opportunities, and Threats of
making a substantial investment in a new facility? Answers a., c. & d. list items
where SWOT might have a use. Answer b. list feasibility analysis where SWOT
would almost always be an applicable tool.
193. It is important to understand the management style of the process owners where a
self-assessment is planned. Which management style would be most conducive for a
successful self-assessment?
a. autocratic
b. custodial
c. management by objectives
d. collegial
Answer b. is the correct answer. Answer a. is very general and does indicate what
issues will be discussed. Answer c. implies subject matter experts from every
process. A self-assessment project should be kept to the least number of subject
matter experts that would be necessary to accomplish the objective. The more
participants are in attendance the more complex process. As such the less likely
anything productive will be accomplished. Answer d. is not correct because
answer b. is correct.
195. The Public Company Accounting Oversight Board was initiated after Sarbanes-
Oxley. As with anything, the laws and regulations for business are improved with new
laws and regulations. ISO 31000 is one of the most recent documentations. The
purpose of ISO 31000 is to:
Answer a. is the correct answer. Answers b. & c. just list random statements.
Answer d. describes the new Basel III model.
196. Written reporting of risk and control concerns will help ensure more comprehensive
risk assessments than undocumented reports. In addition, written reporting can become
a management tool facilitating management decisions. How many written reports should
be presented in a typical internal audit?
a. one final report with distribution as required in the internal audit charter
b. two reports consisting of one with an executive summary for high-level
management and one more detailed for the individual process owners
c. two reports consisting of one with an executive summary and one interim
detailed report for line management
d. as many informal and formal reports as is necessary to motivate
management to address the issues
Answer d. is the correct answer. Answers a., b. & c. may appear correct and may
actually be part of some internal policy for reporting. However, they may only be
effective in some situations. There should be flexibility in reporting. The delivery
of reports should be a combination of verbal reports, formal written reports, and
informal reports. There should be no surprises in the last and final report.
Management should already know what the issues are and hopefully are already
addressing them before the final report is published. Interim status reports are
very appropriate. The detail and frequency and to whom reports are delivered
should be dependent upon the complexity of the audit and the involved
management style or politics.
197. COSO, ERM, CoCo, and other control models have one main common element.
What is the main common element integrated within all of these models?
a. strategic planning
b. action
c. integration
d. a feedback mechanism
Answer c. is the correct answer. This is actually given in the question itself. So
sometimes, it is wise to look at the obvious. Do not disregard something because
it appears in the question. Sometimes the answer to the question is in the
question. Answer a. lists strategic planning that is specifically mentioned only in
ERM. Answers b. & d. list action and a feedback mechanism that are specifically
mentioned in CoCo. The commonality of all of these models is that they
encourage the integration of multiple dimensions of a process.
198. It is most important when internal auditors, a control by their existence, are
performing a risk assessment include some subjectivity, some objectivity, and human
thought intervention. It is still important to utilize and understand the available risk
assessment mathematical formulas. What mathematical risk assessment formula would
most represent the situation when internal audit did not provide an adequate or complete
appraisal or report to management?
Answer c. is the correct answer. One of the components of the modified annual
loss expectancy is the probability of a control failure. Internal audit is a control by
its very nature and existence. In this case, that control did not work as intended.
The actual formula that specifically includes audit risk (internal audit not
functioning as intended) is the direct probability estimate formula. However, this
formula is not included in the answers. Hence, the next best thing to recognize a
control failure from the answers given is answer c. Answers a. & b. list the same
formula with different names. Answer d. lists a method that groups risks and
represents them on a matrix often by category of high, medium, and low and by
color green, yellow, and red.
199. Internal auditors acting as consultants would provide the most benefit to a process
owner if they explained:
The correct answer is b. Answers a., c. & d. list items that would all be useful and
helpful information for any process owner. However, the most beneficial
information would be providing an understanding of external (or so called
emerging) risks. Most process owners have a lesser understanding of external
risk than they do of general risk concepts. As a result, external risks are generally
not managed as well as they should be.
200. Generally speaking where could an internal auditor provide the most
understanding of risk for process owners?
Answer b. is the correct answer. Strategic management and external risk are
similar in concept. Both have to deal with the positive impacts, negative impacts,
and external forces (external risks). Generally, many process owners have a
lesser understanding of external risks than of internal risks. However, external
risk can have as much or more of an impact on a process than internal risks. An
increased understanding by process owners of external risk and how to manage
them is a major step to process success. Answer a., c. & d. list important items
but answer b. lists where the internal auditor or risk and control specialists can
provide the most benefit in helping increase process owners risk management.
201. Some ways to manage risk are to control the risk, share the risk, or avoid the risk.
The best example of controlling a risk is:
202. COSO is an integrated control model. COSO has become not only a useful tool in
the management of risks and controls but is recommended for use by some
contemporary risk and control laws and guidelines. There are five components in the
COSO model and three control objectives. Combined these can help evaluate 15
process dimensions. In addition, there are a number of subcomponents within these
components and control objectives. Tone at the Top, a crucially important
subcomponent, is one of these subcomponents. Tone at the Top is a subcomponent of
which of the COSO control objectives?
a. operations
b. compliance
c. financial
d. none of the above
Answer d. is the correct answer. Tone at the Top is not a subcomponent of the
COSO control objectives. It is part of the control environment component.
Answers a., b. & c. list control objectives not control environments.
203. Internal auditors have an opportunity to bring additional value to process owners
by providing corporate governance, consulting, and advisory services. Operating in the
consulting capacity internal auditors have a greater latitude to provide advice. When
internal auditors function as consultants they must be most aware of:
a. process owners
b. management
c. external auditors
d. perception
Answer d. is the correct and best answer. Answer a., b. & c. list important items
also requiring awareness. The perception of auditor independence and objectivity
is the important point in the question. In every capacity the internal auditor must
manage this.
a. compliance testing
b. traditional auditing
c. assurance
d. self-assessment
Answer c. is the correct answer. Answers a. & b. list key elements of traditional
audit activities. Answer d. lists self-assessment that is a key element of
consulting activities.
205. Human risk (people risk) includes fatigue, memory lapses, inattention, collusion,
unacceptable behavior, sabotage, and negative morale. Which of the following
categories of risk is also most closely related to the human factor?
a. service risk
b. environmental risk
c. contract risk
d. communications risk
206. A senior Vice President has heard that the internal audit department of the
company can provide consulting services, which would replace actual internal audits.
This Vice President asked the CAE how internal audits could be replaced with an
internal audit consulting project. A most appropriate response from the CAE would most
likely be:
a. answers c. & d.
b. internal audit cannot provide consulting services but they could recommend a
group that does
c. first the consulting activity would not necessarily replace the need for actual
internal audits
d. an internal auditor would work with the vice presidents department providing
guidance and direction
Answer a. is the correct and best answer. Answer b. could probably be eliminated
quickly. Generally, contemporary internal audit departments can provide
consulting services. Answers c. & d. described responses that combined would
provide a good general description of the internal audit consulting service. It is
important to inform any process owner that internal audit consulting services will
not, unless in specific situations, eliminate the need for an actual internal audit.
Probably any consulting service would have a follow-up audit. Answer d. is what
the internal auditor acting in a consulting capacity would be providing.
207. Service risk and quality of product are very much related to each other. They are
both focused upon providing the best quality product or service to the customer or client.
Which of the following categories of risk would not be an ingredient of providing quality
product or service as perceived by a client?
a. contract risk
b. outsourced risk
c. marketing or sales risk
d. none of the above
Answer d. is the correct answer. Be careful of the wording. The question asks
which would not be an ingredient of providing quality. Answer a., b. & c. list
ingredients of providing quality product or service. Answer a. lists contract risk
that can include such things as payment agreements, delivery times, quality of
services or products, and costs. Answer b. lists outsourced risk that occurs when
the outsourced vendor provides inferior quality products or services.
Answer c. lists marketing or sales risk that is the selling of services or products to
a clients or customers with the anticipation by the clients or customers that they
will receive value for money with the perceived quality as promised in the sale.
Hence, all of the answers are relative to providing quality products or services.
Hence, answer d. is correct.
Answer b. is the correct answer. Answers a., c. & d. appear correct but they are
general answers for a specific question. Further, all of the answers except b. are
almost the same thing. Risk communications by definition is effectively
communicating to everyone the risk and threat situation and the controls to
manage them. This can include crisis management options, disaster planning,
and recovery operations plans.
Answer d. is the correct answer. Answers a., b. & c. lists groups certainly
involved in corporate governance. However, all of these answers only include
management. They exclude non-management members. Everyone should be
involved in corporate governance, not just management.
212. Audit reports, as well as and risk and control specialists reports, are typically edited
multiple times by multiple levels of management before publication. This can
significantly delay the time from completion of the assessment field work to the
publication of the report. What would significantly help to decrease this editing time?
213. A complete COSO review requires extensive resource including time, effort to
complete, and analysis. Fraud investigations most often require swift and decisive
actions. These two statements are opposite of each other. Consequently:
Answer d. is the correct answer. Fraudulent or wrongdoing acts require swift and
decisive action. COSO is not the best tool to disseminate that swift and decisive
action. COSO is a long-term tool. However, COSO can be used to identify the
root cause of the fraudulent act and help to identify controls that may prevent the
reoccurrence of the fraudulent act. Therefore answers a. & b. are not correct.
Answer c. is not correct because by identifying the control objectives of COSO
Operational, Financial, and Compliance it can be seen that COSO looks beyond
just operations.
Answer d. is the correct answer. Answer a., b. & c. all list requirements of a
contemporary internal auditor. A contemporary internal auditor should be
comfortable evaluating the adequacy of internal controls, risks, and financial
representations. A contemporary internal auditor must also be comfortable, but
not necessarily an expert, with selling techniques and human interactions.
Answer d. is the correct answer. Answers a., b. & c. list items that certainly could
have an impact on the success or failure of an organization, the question asks for
“the most dependent upon”. Answer d. indicates focus. This means how directed
the organization is to the end goal and objective. This focus may be to provide
the best product or service or to specialize in a certain product or service.
Sometimes organizations that try to provide all products to everyone are not
successful. Whereas organizations that specialize and remain focused on that
specialty are successful. These organizations are good at what they do. Being
customer-driven is a key factor to organizational success. Knowing what the
customer wants and needs at any point in time is critical to success. Further, it is
important that an organization monitor and adapt to changing customer needs
quickly. Successful organizations consider their customers their most important
stakeholders.
216. The prime commonality of Basel lll, COSO, CoCo, COBIT, ISO 31000, and ERM
is:
Answer c. is the correct answer. All of these models were reactionary to risk and
control financial, business, and or government issues. Answers a., b. & d. are not
necessarily true.
218. The main purpose of ISO 31000: 2009 is to provide a standard for the
implementation of risk management principles and a generic guideline for risk
management. As such, ISO 31000: 2009 is intended to be a:
219. In order to have an effective risk and control philosophy the tone for corporate
governance must have a foundation at the highest levels in an organization. However, a
concern of risk and control specialists including internal auditors attempting to assist in
solidifying this corporate governance philosophy is that these higher levels of
management may not fully understand all of the elements of a corporate governance
strategy. Therefore, it becomes important that these risk and control specialists educate
these higher levels of management in the details of corporate governance and the
implications of effective and ineffective corporate governance. Appropriate risk and
control education may be necessary. With this in mind, the best approach for the risk
and control specialist should be to:
a. provide a multi-day detailed risk and control education program to these high-
level managers
b. provide a few hours of risk and control education but be prepared for a
longer session as requested
c. provide one day of detail risk education and then one day of control training
to these high-level managers
d. provide a quick overview of corporate governance and their legal implications
to the high-level managers
Answer b. is the correct answer. Helping these high-level managers have a better
and contemporary understanding of corporate governance is a specialty in itself.
First, it is important to understand everything about that audience. Even the
smallest seemingly insignificant point can be important in the success or failure
of the delivery of the topic. Answers a. & c. can be eliminated because most of
the time these high-level managers do not have the time for a multi-day program
nor do they generally need that level of detail. A few scheduled hours of
education is probably most appropriate. This program must be focused on
important topics that quickly gain the attention of the audience. That is why it is
important to understand as much as possible about the audience. Also, be
prepared to continue longer than scheduled. This would be at the invitation of the
audience. The high-level managers may have more questions or topics for
discussion. Therefore, it is wise to reserve time after the scheduled program if
this should occur. Answer d. could be eliminated quickly because of the legal
implications. Legal professionals should address these types of topics but not
risk and control specialists including internal auditors.
Answer d. is the correct answer. Answers a., b. & c. list items that operational
auditing will help to facilitate.
221. The ERM model expanded previous integrated control models into more definitive
areas of analysis. In addition, ERM included two perspectives that had not been
mentioned in much detail in previous models. These are strategic management and the
use of analytical models. Both of these perspectives can help address the changing
environment in which a process operates. Which analytical model is most associated
with the changing environment?
222. CoCo designed by the Canadian Institute of Chartered Accountants has an added
element not specifically apparent in prior integrated control models. This element is a
complete feedback loop including monitoring and action. In addition to this addition what
is one other important key element in the CoCo model that was not in previous models?
Answer a. is the correct answer. Answers b. & d. can be eliminated because CoCo
has three critical objectives not six. They are effectiveness and efficiency of
operations; reliability of internal and external reporting; and compliance with
applicable laws, regulations, and internal policies. There are five components in
CoCo. They are purpose, commitment, capability, action, monitoring, and
learning, not seven as is indicated in answer d. Answer c. is already described in
the question. The question asks for something additional (read the question).
Answer a. lists a key additional element of CoCo.
Answer b. is the correct answer. Answers a. & c. just list random phrases.
Answers d. could be considered. However, answer d. defines a broad definition of
risk including more than just emerging risks. The question asks specifically for a
definition of emerging risk. It is important to read what the question asks and
answer with the best answer provided.
224. An audit manager from a multinational corporation was asked to speak at a high
school career day program. The purpose of the presentation was to provide an overview
of various career opportunities. A student asked the audit manager what exactly is an
internal auditor’s function. The best answer the audit managers could provide would be:
Answer b. is the correct answer. Answer a. could be correct but it is very specific
and is only one dimension of internal auditor activities. Answers c. & d. have the
same narrow focus. In general, internal auditors do not pursue questionable
activities. Internal auditors may gather the detail and facts but the face-to-face
investigation is best left to professional fraud investigators. Generally internal
auditors, unless specifically requested, do not look for fraud. They may
encounter it and have to pursue it as stated in answer d.
225. An effective review, evaluation, and management of key risks is a process that
requires:
Answer a. is the correct answer. Answers b., c. & d. list appropriate and
necessary ingredients for an effective review, evaluation, and management of key
risks.
Answer b. is the correct answer. Answer a. can be eliminated because Basel lll
does not supplement ISO 31000: 2009. Answer c. can be eliminated because,
although Basel lll is a series of strongly recommended financial and banking
regulations it will not eliminate or diminish existing banking regulations (the so
called alphabet soup regulations). Basel lll will only enhance prior versions of the
Basel regulations. Hence, answer d. can be eliminated.
a. preventive auditing
b. program auditing
c. program evaluation
d. all of these answers
Answer d. is the correct answer. Operational auditing is the more typical and the
most used term of a type of audit that will provide continuous monitoring
methodologies to address efficiency, effectiveness, and economy. Answers a., b.
& c. list other terms meaning the same as operational auditing.
a. excessive paperwork
b. rebuttal by employees
c. communications budget issues
d. not understanding the data provided
229. Internal audit is an independent professional service that improves the quality of
information or its context for decision makers. The contemporary concept of the new
internal audit function is to hold the process owners at all levels responsible for the
adequate management of their internal controls. To this end, internal audit provides
oversight, guidance, and review of the adequacy of internal controls. When internal
audit exercises these responsibilities by scheduling internal audits or consulting activities
the internal audit functions prime consideration should be to:
a. schedule audits based how long it has been since the last audit of a specific
process
b. perform an appropriate risk assessment to determine what areas and to
what extent to audit or review
c. assign the number and the expertise of the auditors based on the location of
the audit to be conducted
d. determine when the audit will be conducted based on the availability of the
client
230. The reporting dimension of any operational audit should include face-to-face
closing meetings as well as a written report. An operational audit should include how
many closing meetings?
231. Internal audit has evolved over the years. Consequently the main contemporary
responsibility of internal audit is to:
232. It is advantageous for process owners to implement their own internal control
scheme. Information technology systems can assist with this objective. By
implementing an internal control, monitoring scheme process owners can continuously
monitor the process for deviations from accepted risk norms.
Answer b. is the correct answer. When ad hoc program updates or changes are
made to the system and are not formally updated then problems may occur when
the next change is made. For example, after an ad hoc change which is not
formally documented any issue which caused the ad hoc change will reoccur.
Answer a. can be eliminated after the explanation of the answer. Although answer
c. lists what could be a real problem it would not be the main concern. Answer d.
lists a common problem as many reports provided by information technology
systems have outlived their usefulness. They are inefficient controls. However
the main concern and caution is listed in answer b.
233. One of the purposes of the written audit or review report is to motivate the reader
(process owners) into action to correct issues identified during the audit or review.
Which of the following would be the best standard approach to motivate a reader of such
a report?
Answer c. is the correct answer. Answers a. & b. list good answers in some
cases. However, either one by itself may not be appropriate in all cases. The tone
of the reporting communications both verbal and written should be adjusted for
each person to be motivated. Everyone thinks and responds differently to
information. The writer or communicator must understand the personality and
communication needs of the receiver. Answer d. ca be eliminated since answer c.
is correct
234. What would be the most effective and efficient second layer of controls when
process owners have implemented their own continuous monitoring information
technology system?
Answer a. is the correct answer. The question asks for the most effective and
efficient approach. Answers b. & c. list items that may or may not be necessary.
For example, such training may not be necessary for the process owners. They
may only need to interpret the information provided and not necessarily
understand how the system technically processes that data. They may only need
some training about part of system operation or implementation. Answer d. is
obviously not correct as this would actually be a first level of controls.
235. The manager of a department was concerned with the stationary budget. The
amount spent on copy paper seemed too excessive and was growing. Comparing the
amount of copy paper usage to other similar departments this department’s amount was
157% higher than similar departments. How could the manager incorporate a
continuous monitoring information technology scheme for the use of the copy paper?
a. hold all the copy paper in the office and have employees ask for it as they
needed it
b. allocate a reasonable amount of copy paper to each employee when they
exceeded that they would have to sign for additional paper
c. tell all the employees of the problem and limit the ordering of copy paper
d. incorporate an employee code identifier into the copy machine
Answer d. is the correct answer. Answers a., b. & c. list physical controls that are
good controls but not information technology controls as the question asks.
Answer b. is the correct answer. Answers a. & c. describe levels of detail at which
operational auditing and internal auditors should not get involved. From a broad
perspective, operational auditing is concerned with an organization’s strategy to
achieve its objectives efficiently, effectively, and economically. Answer d. lists
just a random phrase and further would be more detailed than would be
appropriate for an internal auditor.
Answer d. is the correct answer. Internal auditors especially, and risk and control
review specialists as well, should be evaluating the adequacy of internal controls.
Without adequate internal controls, any measurements may be meaningless.
Answers a., b. & c. are not correct if measurement may be meaningless. Further it
is wise when reporting to indicate in the purpose statement of the report that the
“purpose of the review was to determine the adequacy of internal controls related
to” some process.
238. The contemporary professional internal auditor must be able to both look at
historical data and to provide insight into potential risks. Utilizing information technology
tools can assist in this effort. What would be a primary advantage of utilizing information
tools when analyzing data in real time (current)?
Answer d. is the correct answer. Answers a. & b. list the use of information tools
to analyze or report on existing data (historical data) only. The question asks for
uses of information technology tools to analyze data in real time. Answer c. does
not include “real time” monitoring.
239. Including a background of the topic audited or reviewed in a report can be helpful
when developing a perspective of the topic reviewed. How much detail should the
background contain?
Answer b. is the correct answer. The purpose of the background in the written
report is to provide a perspective of the topic audited or reviewed to the reader.
However, it is important not to be condescending to the process owners where
the audit or review was conducted. Process owners work in the process every
day and know the process. The auditor or reviewer was there for a few days or
weeks. However, the background should be sufficient for those who do not work
in the process to provide information so they can somewhat understand how the
process functions. A way to facilitate this balance is for the auditor or reviewer to
work with the process owners explaining that their help in writing the background
would be appreciated and that the purpose is to help those not familiar with the
process to gain a general understanding of the process. Answer a. is a good
answer but the word “balance” in answer b. makes answer b. a better answer.
Answers c. & d. could be eliminated based on the answer explanation.