CONFIDENTIAL 1 AC/DEC 2015/AIS615
UNIVERSITI TEKNOLOGI MARA
FINAL EXAMINATION
COURSE : ACCOUNTING INFORMATION SYSTEM
COURSE CODE : AIS 615
EXAMINATION : DEC 2015
TIME : 3 HOURS
SOLUTIONS
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 2 AC/DEC 2015/AIS615
SOLUTIONS
PART A
QUESTION 1
a. List eight (8) interrelated risk and control components of ERM.
Internal environment /
Objective setting /
Event identification /
Risk assessment /
Risk response /
Control activities /
Information and communication /
Monitoring /
(8/ x ½ mark = 4 marks)
b. Discuss briefly any three (3) basic principles behind ERM.
Companies are formed to create value for their owners.
Management must decide how much uncertainty it will accepts it creates
value.
Uncertainty results in risk, which is the possibility that something negatively
affects the company’s ability to create or preserve value.
Uncertainty results in opportunity, which is the possibility that something
positively affects the company’s ability to create or preserve value.
The ERM framework can manage uncertainty as well as create and preserve
value.
(any 3 points with explanation x 2 marks = 6 marks)
(Total: 10 marks)
QUESTION 2
a. Basic steps being used by criminals to attack an organization’s information system.
1. Conduct reconnaissance / – they first study their target’s physical layout to
learn about the controls it has in place (alarms, guards, placement of
cameras, etc.). /
2. Attempt social engineering / – attackers will often try to use the information
obtained during their initial reconnaissance to ‘trick’ an unsuspecting
employee into granting them access. /
3. Scan and map the target / – if social engineering failed, the next step is to
conduct more detailed reconnaissance to identify potential points of remote
entry. /
4. Research / – conduct research to find known vulnerabilities for those
programs being used by the target. /
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 3 AC/DEC 2015/AIS615
5. Execute the attack / – the criminal takes advantage of a vulnerability to
obtain unauthorized access to the target’s information system. /
6. Cover tracks / – after penetrating the victim’s information system, most
attackers attempt to cover their tracks and create ‘back doors’ that they can
use to obtain access if their initial attack is discovered. /
(any 2 points with explanation x 2.5 marks = 5 marks)
b. Ways users can be authenticated and example:
Credentials Examples
Something they know Password
Personal identification number (PIN)
Something they have Smart card
ID badges
Some physical or Fingerprints
behavioural characteristics Typing patterns
(2 credentials x 1 mark = 2 marks)
(2 examples x 1 mark = 2 marks)
c. Internal control functions and examples:
1. Preventive controls deter problems before they arise.
Examples: hiring qualified personnel, segregating employee duties, and
controlling physical access to assets and information.
2. Detective controls discover problems that are not prevented.
Examples: duplicate checking of calculations, preparing bank reconciliations
and monthly trial balances.
3. Corrective controls identify and correct problems as well as correct and
recover from the resulting errors.
Examples: maintaining backup copies of files, correcting data entry errors,
and resubmitting transactions for subsequent processing.
(1/2 mark x 3 control = 1.5 marks)
(1/2 mark x 3 explanations = 1.5 marks)
(1 mark x any 3 examples = 3 marks)
(Total: 15 marks)
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 4 AC/DEC 2015/AIS615
QUESTION 3
a.
Hashing Encryption
A process that takes plaintext of The process of transforming normal content,
any length and creates a short called plaintext, into unreadable gibberish,
code called a hash. / called ciphertext. Decryption reverses this
process, transforming ciphertext back into
plaintext. /
One-way function (cannot Reversible (can decrypt ciphertext back to
reverse, or ‘unhash’ to recover plaintext). /
original document). /
Any size input yields same fixed- Output sizes approximately the same as
size output. / input size. /
(2 points each x 2 marks = 4 marks)
b. Explain any three (3) best practices for protecting customers’ privacy.
• Management: need to establish a set of procedures and policies for protecting the
privacy of personal information they collect from customers, as well as information
about their customers obtained from third parties.
• Notice: an organization should provide notice about its privacy policies and practices
at or before the time it collects personal information from customers.
• Choice and consent: organizations should explain the choices available to
individuals and obtain their consent prior to the collection and use of their personal
information.
• Collection: collect only the information needed to fulfil the purposes stated in privacy
policies.
• Use and retention: should use customers’ personal information only in the manner
described in their stated privacy policies, and retain that information only as long as it
is needed.
• Access: should provide individuals with the ability to access, review, correct, and
delete the personal information stored about them.
• Disclosure to third parties: organizations should disclose their customers’ personal
information to third parties only in the situations and manners described in the
privacy policies.
• Security: organization must take reasonable steps to protect its customers’ personal
information from loss or unauthorized disclosure.
• Quality: organization should maintain the integrity of their customers’ information
and employ procedures to ensure that it is reasonably accurate.
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 5 AC/DEC 2015/AIS615
• Monitoring and enforcement: organization should assign one or more employees
to be responsible for ensuring compliance with its stated privacy policies.
(any 3 points x 2 marks = 6 marks)
(Total: 10 marks)
QUESTION 4
a. Discuss the objectives and key controls of system availability.
Objective 1: To minimize risk of system downtime
- Preventive maintenance
- Fault tolerance
- Data center location design
- Training
- Patch management and antivirus software
Objective 2: Quick and complete recovery and resumption of normal operations
- Backup procedures
- Disaster recovery plan (DRP)
- Business continuity plan (BCP)
(2 objectives x 1 mark = 2 marks)
(any 2 key controls x 1 mark = 2 marks)
b. Discuss three (3) output controls that can help to provide additional controls over
processing integrity.
User review output /
- Users should carefully examine system output to verify that it is reasonable,
complete, and they are the intended recipients. /
Reconciliation procedures /
- All transactions and other system updates should be reconciled periodically to control
reports, file status/update reports, or other control mechanisms. /
External data reconciliation /
- Database totals should periodically be reconciled with data maintained outside the
system. /
Data transmission controls
- Organizations also need to implement controls designed to minimize the risk of data
transmission errors.
Checksums
- When data are transmitted, the sending device can calculate a hash of the file, called
a checksum. The receiving device performs the same calculation and sends the
result to the sending device. The two hashes must agree; otherwise the file will be
resent.
Parity bits
- Extra digit added to the beginning of every character that can be used to check
transmission accuracy.
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 6 AC/DEC 2015/AIS615
(any 3 points with explanation X 2 marks = 6 marks)
c. i. A clerk entered an invoice received from a vendor who is not on an
authorized supplier list.
Validity check /
ii. A payroll clerk accidently entered an employee's hours worked for the week
as 380 instead of 38.
Limit check/Reasonableness test /
iii. After processing sales transactions, the inventory report showed a negative
quantity on hand for several items.
Sign check /
iv. A customer order for an important part did not include the customer’s
address. Consequently, the order was not shipped on time and the customer called
to complain.
Completeness check /
v. A visitor to the company’s Web site entered 400 characters into the five-digit
Zip code field, causing the server to crash.
Sign cheque /
(5/ x 1 mark = 5 marks)
(Total: 15 marks)
QUESTION 5
a. Explain the purpose of following documents:
Materials requisition Authorize the removal of the necessary quantity of the raw
materials from the storeroom to the factory location where they
will be used. (//)
Move tickets Documents that identify the internal transfer of parts, the location
to which they are transferred, and the time of transfer. (//)
(2 points x 2 = 4 marks)
b. Explain three (3) threats in production operations activities.
THREAT CONTROLS
1. Theft of inventory Physical access controls
Documentation of all inventory movements
Segregation of duties – custody of assets from recording and
authorization of removal
Restriction of access to inventory master data
Periodic physical counts of inventory and reconciliation of
those counts to recorded quantities.
2. Theft of fixed assets Physical inventory of all fixed assets
Restriction of physical access to fixed assets
Maintaining detailed records of fixed assets, including disposal.
3. Poor performance Training
Performance reports
4. Suboptimal investment Proper approval of fixed-asset acquisitions, including use of
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 7 AC/DEC 2015/AIS615
in fixed assets requests for proposals to solicit multiple competitive bids.
5. Loss of inventory or Physical safeguards (eg. Fire sprinklers)
fixed assets due to fire insurance
or other disasters
6. Disruption of Backup and disaster recovery plan
operations
(any 3 threats x 1 mark = 3 marks)
(any 1 control for each threat = 3 marks)
c. Discuss any two (2) internal control procedures for disbursement of payroll to
employees.
i. Restriction of physical access to blank payroll checks and the check signature
machine.
ii. Restriction to access to the EFT system
iii. Pre-numbering and periodically accounting for all payroll checks and review of all
EFT direct deposit transactions
iv. Require proper supporting documentation for all paychecks
v. Use of a separate checking account for payroll, maintained as an imprest fund.
vi. Segregation of duties
vii. Restriction of access to payroll master database
viii. Verification of identity of all employees receiving paychecks
ix. Re-depositing unclaimed paychecks and investigating cause.
(any 2 points with explanations x 2.5 marks = 5 marks)
d. Document flowchart:
Storeroom department /
Production /
Material
requisition /
Release
Release the
the
product
product &&
update
update
perpetual
/
perpetual
record
record
release
release &
&
packing
packing slip
slip
Updated
Perpetual
record
/
(5 / x 1 mark = 5 marks)
(Total: 20 marks)
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 8 AC/DEC 2015/AIS615
PART B
QUESTION 1
a.
(a) Weaknesses (b) Recommendations
1. The plant superintendent or one of the Require each request for the purchase of
foremen verbally authorise the purchase goods to be written on a prenumbered
of goods. purchase requisition form and authorised
by the signature of a manager who has
been formally assigned that responsibility
Besides, the request should be initiated
by the inventory control clerk within the
accounting department
2. The purchase order is not prepared with Provide added copies of each purchase
sufficient copies or adequate controls. order to the accounts payable clerk (as
notification) and to the inventory control
department (as an acknowledgement and
as a medium for posting the ordered
items to the inventory records)
Blank out the "quantity" column on the
copy provided to the receiving
department
Use prenumbered purchase order sets,
and file the open order copy numerically
in the purchasing department
3. A copy of purchase order, used as a Initiate a prenumbered receiving report.
receiving report, is forwarded to the
purchasing department; no copy Prepare copies for the purchasing
therefore accompanies the received department, accounts payable clerk and
goods to the storeroom nor is a copy inventory control clerk, and file a copy
retained in the receiving department to numerically within the receiving
provide a complete reference to received department
goods and a basis for preparing
summaries of received goods.
4. The purchasing department is assigned Purchasing department is to verify that
too many responsibilities; including the each supplier's invoice is supported by a
maintenance of the invoice register and valid purchase order and that the prices
the approval of each supplier's invoice for are reasonable.
payment
Assign the accounts payable clerk the
responsibilities of entering each supplier
invoice in the invoice register, checking
the invoice for clerical accuracy,
comparing invoice to supporting
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 9 AC/DEC 2015/AIS615
documents and etc.
The use of cash disbursement vouchers
and a voucher register should also be
considered.
5. The check preparation procedure and Assign the preparation of checks to a
responsibilities are not appropriately person other than the accounts payable
accomplished. clerk (e.g. general accounting clerk)
Employ prenumbered check sets and
instruct the person who prepares the
checks to "protect" the checks prior to the
time that they are signed, to enter the
checks in the cash disbursements
journal.
6. The check signing and distribution Specify that another manager in the firm
procedure is not well controlled; e.g. to countersign all checks above certain
signed checks are returned to the amount, and have the treasurer forward
accounting clerk who has access to the all signed checks to this individual.
records.
Sent the signed checks directly to the
mailroom for distribution to recipients.
Return the check copies and supporting
documents to the account payable clerk
who maintains the accounting payable
ledger.
7. The filing of documents does not provide Maintain numerical files for all
adequate means of reference nor the prenumbered documents and file copies
basis for ascertaining whether or not any in the departments where initiated e.g.
purchase requisition in the inventory
control department.
8. Control over the accuracy of processing Assign one clerk to post obligations and
should be maintained by someone rather disbursements to the general ledger.
than the clerks (i.e. accounts payable and
general accounting clerks)
(Any 5 weaknesses x 2 marks = 10 marks)
(5 related recommendations x 1 mark = 5 marks)
Or any relevant answers are accepted
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL
CONFIDENTIAL 10 AC/DEC 2015/AIS615
b. Briefly explain the difference between the three inventory management approaches.
EOQ
The optimal order size / to minimize the sum of ordering, carrying and stockout cost /.
This is to maintain sufficient stock / so that production can continue without
interruption.
(3 / x 1 mark = 3 marks)
MRP
An approach to inventory management that seeks to reduce required inventory levels
/ by improving the accuracy of forecasting techniques / to better schedule purchases
to satisfy production needs /.
(3 / x 1 mark = 3 marks)
JIT
A system that minimizes or virtually eliminates inventories / by purchasing and
producing goods / only in response to actual, rather than forecasted, sales /.
(3 / x 1 mark = 3 marks)
c. Explain the purpose of the following documents:-
i. Purchase requisition
A document or electronic form that identifies the requisitioner /; specifies the
delivery location and date needed; identifies the item numbers, descriptions,
quantity and price of each item requested’ and may suggest a supplier /.
(2 / x 1 mark = 2 marks)
ii. Receiving report
A document that records details about each delivery /, including the date
received, shipper, supplier, quantity received /.
(2 / x 1 mark = 2 marks)
iii. Debit memo
A document used to record a reduction to the balance due to a supplier.
(2 / x 1 mark = 2 marks)
(Total: 30 marks)
© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL