Chapter 12
Chapter 12
1. Statement 1 : The open invoice method is often used to manage trade accounts
receivable (sales to other business organizations).
Statement 2 : The balance forward method is used extensively for consumer accounts.
2. Statement 1: Almost all boards of directors are composed of individuals who are not
independent.
Statement 2: A Thomson Financial survey revealed the strong belief that executives
have abused stock-based compensation.
a. Both true
b. Both false
c. Only statement 1 is true.
d. Only statement 2 is true.
5. Statement 1 : Payroll fraud is the distribution of fraudulent paychecks to existent
and/or nonexistent employees.
Statement 2 : A pass-through fraud is similar to the shell company fraud with the
exception that a transaction actually takes place.
Statement 2: Most people who commit fraud use the embezzled funds to save for
retirement.
a. Statement 1 is false
b. Statement 2 is false
c. Both statements are true
d. Both statements are false
Statement 2: The first key stage of information system is the Data Collection.
a. Statement 1 is false
b. Statement 2 is false
c. Both statements are true
d. Both statements are false
12. Statement 1: The Three levels of computer ethics are: Pop, Para and Geographical.
Statement 2: Those who do not benefit should not carry the burden of risk.
a. Statement 1 is false
b. Statement 2 is false
c. Both statements are true
d. Both statements are false
13. I. Fake suppliers have physical facilities, the perpetrator of the fraud will sometimes rent a
P.O. box to receive payments by mail.
II. The audit procedure to use in Sequential Invoice Numbers is ACL to sort the records of the
invoice file by invoice number and vendor number.
III. To divert attention away from excessive purchases made from the same vendor, a
perpetrator may create several phony suppliers that share the same mailing address.
IV. A management review and signature is required for all checks that exceed the threshold.
Those that fall below the limit are reviewed.
a. I, III, IV are true
b. II & IV are true
c. II & III are true
d. All statements are true
15. Statement 1: An illegal gratuity occurs when an employee acts on behalf of a third party
during the discharge of his or her duties or has self - interest in the activity being performed.
Statement 2: Bribery Is the use of force by an individual or organization to obtain something of
value.
a. Statement 2 is false.
b. Statement 1 is false.
c. Both statements are false.
d. Both statements are true.
MULTIPLE CHOICE
1. SOX imposes new corporate disclosure requirements,except:
a. Annual reports filed with the SEC must include a statement by management,
asserting that it is responsible for creating and maintaining adequate internal
controls and asserting to the effectiveness of those controls.
b. Officers must certify that the company’s accounts “fairly present” the firm’s
financial condition and results of operations.
c. Public companies must report all off-balance-sheet transactions.
d. Public companies are prohibited from making loans to executive officers
and directors
2. They set auditing, quality control, and ethics standards; to inspect registered accounting
firms; to conduct investigations; and to take disciplinary actions.
a. Public Company Accounting Over- sight Board (PCAOB)
b. Philippine Financial Reporting Standards (PFRS)
c. Board of Accountancy (BOA)
d. Generally Accepted Auditing Standards (GAAP)
a. ACI
b. ACL
c. AC
d. ACIL
6. The auditor should document in the working process the criteria used for ____ the fraud
risk factors.
a. Identifying
b. Assessing
c. Analyzing
d.Recording
8. __________ are required to pay only a minimum amount off the balance.
a. Accountant
b. Customers
c. Vendor
d. Supplier
9. The asset misappropriation scheme type that has the biggest loss according to ACFE study is
a. Skimming
b. Cash Larceny
c. Check Tampering
d. Payroll
12. The only evidence of fraud in the underlying data is in the timing difference between when
payment is received and when it is recorded. This fraud technique refers to?
a. Lapping Account Receivable
b. Payroll fraud
c. Non cash fraud
d. Theft of cash
13.When the fraud has had a material effect on the financial statements or the auditor is unable
to evaluate its degree of materiality, the auditor should:
I. Consider the implications for other aspects of the audit.
II. Discuss the matter with senior management and with a board of director’s audit
committee.
III. Attempt to determine whether the fraud is material.
IV. Suggest that the client consult with legal counsel, if appropriate.
a. I
b. I, II
c. II, III, IV
d. I, II, III, IV
14. The auditor’s judgments about the risk of material misstatements due to fraud may affect the
audit in which ways:
a. Engagement staffing and extent of supervision.
b. Professional skepticism.
c. Nature, timing, and extent of procedures performed.
d. All of the above
16. It consists of three factors that contribute to or are associated with management and
employee fraud.
a. The perpetrators of Frauds
b. The Fraud Triangle
c. Fraud
d. Sarbanes-Oxley Act and Ethical Issues
21. It involves finding the answers to two questions: (1) How do managers decide what is right
in conducting their business? and (2) Once managers have recognized what is right, how do
they achieve it?
a. Justice
b. Ethical Decisions
c. Business Ethics
d. Minimize risk
22. All systems professionals need to reach this level of competency so they can do their jobs
effectively.
a. Para computer ethics
b. Pop computer Ethics
c. Geographical computer ethics
d. Theoretical computer ethics
23. This will highlight records that possess series characteristics, which can then be retrieved for
further review.
A. Vendors with P.O. Boxes
B. Vendors with Employee Addresses
C. Sequential Invoice Numbers
D. Multiple Companies with the Same Address
24. To highlight suspicious activity that warrants further investigation, sort payments records that
fall within this range by vendor.
A. Vendors with P.O. Boxes
B. Vendors with Employee Addresses
C. Invoice Amounts Slightly below the Review Threshold
D. Multiple Companies with the Same Address
25. _______________, such as cash and bearer bonds, are more susceptible to
misappropriation than _______________ such as steel girders and physical plant equipment.
26. This class of risk factors involves the inadequacy or lack of controls designed to prevent or
detect misappropriation of assets.
a. Industry
b. Procedure
c. Controls
d. Management
27. involves giving , offering , soliciting , or receiving things of value to influence an official in the
performance of his or her lawful duties .
a. Bribery
b. Illegal gratuities
c. Conflict of interest
d. Unicorn
28. involves an executive , manager , or employee of the organization in collusion with an
outsider.
a. Bribery
b. Corruption
c. Economic extortion
d. Unicorn