close solutoin list

AS5 outlines the processes for “An Audit of Internal Control over Financial Reporting That Is Integrated with an Audit of Financial Statements.” Paragraph 24 of this document lists eight entity-level controls. Entity-level controls are comparable to the pervasive controls covered in this chapter. List A contains entity-level controls from AS5, and List B contains specific control plans. Match the control plans to the correct entity-level controls. List A: Entity-Level Controls 1. Controls related to the control environment. 2. Controls over management override. 3. The company’s risk assessment process. 4. Centralized processing and controls, including shared service environments. 5. Controls to monitor the results of operations. 6. Controls to monitor other controls, including activities of the internal audit function, the audit committee, and self-assessment programs. 7. Controls over the period-end financial reporting process. 8. Policies that address significant business control and risk management practices. List B: Specific Control Plans A. A file of signed code-of-conduct letters. B. A report of all employees not taking required vacation days. C. A report on IT risks and a risk action plan. D. Access control software. E. A systems development life cycle methodology (SDLC). F. Budgetary controls. G. Development of a business interruption plan. H. Establishment of a code of conduct. I. Not covered. J. Program change controls. K. Segregation of duties. L. Selection and hiring control plans. M. Service-level agreements and reporting processes. N. Supervision. O. Use of control frameworks such as COBIT and COSO.

BuyFind

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127
BuyFind

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127

Solutions

Chapter
Section
Chapter 8, Problem 6P
Textbook Problem

AS5 outlines the processes for “An Audit of Internal Control over Financial Reporting That Is Integrated with an Audit of Financial Statements.” Paragraph 24 of this document lists eight entity-level controls. Entity-level controls are comparable to the pervasive controls covered in this chapter.

List A contains entity-level controls from AS5, and List B contains specific control plans. Match the control plans to the correct entity-level controls.

List A: Entity-Level Controls

  1. 1. Controls related to the control environment.
  2. 2. Controls over management override.
  3. 3. The company’s risk assessment process.
  4. 4. Centralized processing and controls, including shared service environments.
  5. 5. Controls to monitor the results of operations.
  6. 6. Controls to monitor other controls, including activities of the internal audit function, the audit committee, and self-assessment programs.
  7. 7. Controls over the period-end financial reporting process.
  8. 8. Policies that address significant business control and risk management practices.

List B: Specific Control Plans

  1. A. A file of signed code-of-conduct letters.
  2. B. A report of all employees not taking required vacation days.
  3. C. A report on IT risks and a risk action plan.
  4. D. Access control software.
  5. E. A systems development life cycle methodology (SDLC).
  6. F. Budgetary controls.
  7. G. Development of a business interruption plan.
  8. H. Establishment of a code of conduct.
  9. I. Not covered.
  10. J. Program change controls.
  11. K. Segregation of duties.
  12. L. Selection and hiring control plans.
  13. M. Service-level agreements and reporting processes.
  14. N. Supervision.
  15. O. Use of control frameworks such as COBIT and COSO.

Expert Solution

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

See Solution

*Response times vary by subject and question complexity. Median response time is 34 minutes and may be longer for new subjects.

Chapter 8 Solutions

Accounting Information Systems
Show all chapter solutions
Ch. 8 - What types of documentation constitute a...Ch. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Describe backup and recovery.Ch. 8 - Describe continuous data protection (CDP), a...Ch. 8 - What is the difference between a hot site and a...Ch. 8 - Describe a denial-of-service attack. What controls...Ch. 8 - Describe the three layers of controls for...Ch. 8 - Explain biometric identification systems.Ch. 8 - Describe the four layers of controls for...Ch. 8 - Distinguish firewalls, intrusion-detections...Ch. 8 - What is data encryption? What is the key in...Ch. 8 - Define computer hacking and cracking, and explain...Ch. 8 - Provide three examples of hacking techniques....Ch. 8 - The chapter discusses environmental hazards with...Ch. 8 - What is the COBIT 5 framework? How does it differ...Ch. 8 - Name the five principles delineated by COBIT 5.Ch. 8 - List the seven enablers in the COBIT 5 framework.Ch. 8 - What are the five IT control process domains in...Ch. 8 - The Enterprise Risk Management (ERM) framework...Ch. 8 - In small companies with few employees, it is...Ch. 8 - No matter how sophisticated a system of internal...Ch. 8 - If personnel hiring is done correctly, the other...Ch. 8 - Monitoring must be performed by an independent...Ch. 8 - A key control concern described in Table 8.2 (p....Ch. 8 - Debate the following point: Business continuity...Ch. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Preventing the unauthorized disclosure and loss of...Ch. 8 - Your boss was heard to say, If we implemented...Ch. 8 - For each of these control plans, suggest a...Ch. 8 - The following is a list of six control plans from...Ch. 8 - The following is a list of six control plans from...Ch. 8 - Question: 1. Using a key of 2 and an algorithm of...Ch. 8 - Question : Listed here are 20 control plans...Ch. 8 - The following is a list of 13 control plans from...Ch. 8 - Assume that accounts payable are processed on a...Ch. 8 - Personnel at CP Company must perform the following...Ch. 8 - AS5 outlines the processes for An Audit of...Ch. 8 - Examine the last column in Table 8.2 (p. 280) for...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Show solutions
How can report writers decide what type of graphic to use in a report?

Essentials of Business Communication (MindTap Course List)

What is a mixed account? A contra account? Give an example of each.

College Accounting (Book Only): A Career Approach

FINANCIAL STATEMENTS AND TAXES Part I of this case, presented in Chapter 3, discussed the situation of DLeon In...

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)