Documente Academic
Documente Profesional
Documente Cultură
QUESTION #1)
The need for assurance services arises
because:
a.There is a consonance of
interests of the preparer and
t h e u s e r o f t h e financial statements.
b.There is a potential bias in providing
information.
c.Economic transactions are less
complex than they were a decade
ago.
d.Most users today have a
ccess to the system that
g e n e r a t e s t h e financial
statements they use
e.None of the above.
RFJPIA CUP LEVEL 2 Auditing Theory (EASY
QUESTION #2)
Which of the following is explicitly
included in the Auditors
responsibilitysection of the auditor's
report?
a.Reason for modification of opinion.
b.Philippine Financial Reporting
Standards.
c.Philippines Standards on Auditing.
d.Division of responsibility with another
auditor.
e.Management representations.
RFJPIA CUP LEVEL 2 Auditing Theory (EASY
QUESTION #3)
The measure of variability of a statistical
sample that serves as an estimate of the
population variability is the:
a.Basic precision.
b.Range
.c . M e a s u r e s o f c e n t r a l
tendency.
d.Standard deviation.
e.Interval.
CLINCHER QUESTIONS
RFJPIA CUP LEVEL 2 Auditing Theory
(CLINCHER QUESTION #1)
Which of the following is not a
distinguishing feature of risk-based
auditing?
a.Identifying areas posing the highest
risk of financial statement errors.
b.Analysis of internal control.
c.Collecting and evaluating evidence.
d.Concentrating audit resources in
those areas presenting the highest risk of
financial statement errors.
e.None of the above.
RFJPIA CUP LEVEL 2 Auditing Theory
(CLINCHER QUESTION #2)
In conducting a substantive test of an a
ccount balance, an auditorhypothesize
s that no material error exists. The risk
that sample results will support the
hypothesis when a material error
actually does exist is the risk of:
a.Incorrect rejection.
b.Alpha error.
c.Incorrect acceptance.
d.Type I error.
e.Risk of overreliance.
RFJPIA CUP LEVEL 2 Auditing Theory
(CLINCHER QUESTION #3)
In a distributed data base
(DDB) environment, control tests for
access controladministration can be
designed which focus on:
a.Reconciliation of batch control totals.
b.Hash totals.
c.Examination of logged activity.
FINAL ROUND
EASY QUESTIONS
RFJPIA CUP LEVEL 2 Auditing Theory
(AKIC)ACE QUESTION
This exists when other information
contradicts information contained in the
inancial statements.
a.Material inconsistency.
b.Material difference
.c.Material deviation
.d.Material error.
e.None of the choices
RFJPIA CUP LEVEL 2 Auditing Theory
(MTIM) JOKER QUESTION
The term "present fairly, in all material
respect", means
a.The financial statements conform to
GAAP.
b.The financial statements may still be
materially misstated because the
auditors may not have discovered
the errors.
c.The financial statements are
accurately prepared.
d.The auditor considers only those
matters that are significant to the users
of the financial statements.
e.Immaterial amounts are omitted from
the financial statements
RFJPIA CUP LEVEL 2 Auditing Theory
(SIC)
This occurs when by virtue of a close
relationship with an assurance client, its
directors, officers or employees, a firm or
a member of the assurance team
becomes too sympathetic to the clients
interests. Answer: Familiarity threat.
d.The
client changed its capitalization policy f
or small tools in2010.
e.All of the above.
RFJPIA CUP LEVEL 2 Auditing Theory
(MSUM)
Experience has shown that certain cond
itions in an organization aresymptoms of
possible management fraud. Which of
the following conditions would not be
considered an indicator of possible
fraud?
a.Managers regularly assuming
subordinates' duties.
b.Managers dealing in matters outside
their profit center's scope.
c.Managers not complying with
corporate directives and procedures.
d.Managers subject to formal
performance reviews on a regular basis.
e.None of the above.
RFJPIA CUP LEVEL 2 Auditing Theory
(MU)
Given the increasing use of
microcomputers as a means for
accessing databases, along with on-line
real-time processing, companies face a
serious challenge relating to data
security. Which of the following is not an
appropriate means for meeting this
challenge?
a. Institute a policy of strict identification
and password controls housed in the
computer software that permit only
specified individuals to access the
computer files and perform a given
function.
b.Limit terminals to perform only certain
transactions.