Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 1 Data such as laundromat electricity usage and cycle time, beer purchase quantities, and travel dates are examples of: Tend to be corrupted sources
QUESTION 1
- Data such as laundromat electricity usage and cycle time, beer purchase quantities, and travel dates are examples of:
- Tend to be "corrupted" sources of data
- Red flags that have little to no potential value in verifying or disproving fraud
- Nonfinancial numerical performance data
- Accounting anomalies
QUESTION 2
- In an electronic environment that captures a huge amount of transactions annually, many transactions and data relationship anomalies appear to be a potential fraud or error. To utilize the computer environment effectively, _________________ must be completed.
- The targeted fraud risk assessment process
- CAATT training by the auditor or examiner
- A hypothesis/null hypothesis matrix
- A Benford analysis on all journal en
QUESTION 3
- ____________ are part of the day-to-day operations of most organizations and are often observed by auditors.
- Earnings management
- Transaction adjustments
- Risks
- Anomalies
QUESTION 4
- In most cases, asset misappropriation, corruption, and financial statement fraud last about ____________ from inception to conclusion.
- 24 months
- 2.4 months
- 6 months
- 16 months
QUESTION 5
- __________________ is an attempt to identify the fraud as early as possible, in contrast to the optimal situation in which the fraud is prevented or deterred.
- Implementing internal controls that prevent collusion
- Conducting an annual fraud risk assessment
- Separation of duties
- Effective fraud detection
QUESTION 6
- Who takes the lead in establishing, implementing, and maintaining a formal fraud risk management program?
- Board and management
- Regulatory agencies such as the PCAOB and SEC
- Corporate shareholders
- Internal auditors
QUESTION 7
- The targeted fraud risk assessment approach assumes that there should be a direct relationship between the ________________ and the _________________________.
- specific industry involved; risk levels typically associated with that industry
- Level of risk associated with a material weakness in the company's controls; amount of attention devoted to that area during an audit
- Organization's tolerance for risk; implementation of appropriate internal controls
- Accounts receivable department; accounts payable department
QUESTION 8
- Generally, three procedures are effective in identifying breakdowns in internal controls due to override and collusion: journal entries recording in the books and records, as well as other adjustments to financial information should be examined for proper back-up document; significant accounting estimates needs to be reviewed; and___________________________.
- Unusual "one-time" transactions should be scrutinized to ensure they have an appropriate underlying business rationale
- A properly functioning board-operated audit committee that has the ability to investigate anomalies independently should be established
- A robust whistleblower mechanism should be implemented, and its existence widely published throughout the organization
- Care should be taken by the board to ensure that the external auditor is indeed independent, in fact, and appearance
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started