Sie sind auf Seite 1von 1

ATG 383 - Expenditure Cycle - Matching Threats and Control Procedures

For each threat, select one or more controls that address the issue. Every control is matched to
one threat. Each threat has one or more controls. Controls may be both preventative and detective.

Threats Controls

1. _____ Acquire goods for inflated prices. a) Bank reconciliation prepared by


individual who does not handle cash
2. _____ Acquire goods of inferior quality. receipts or disbursements.
b) Black out quantities on the purchase
3. _____ Obtain goods from unauthorized order. Receiving clerk signs PO once
vendors. quantities are filled in.
c) Cancel invoices and supporting
4. _____ Vendors receive kickbacks from documents when paid.
purchasing agents. d) Check mathematical accuracy of vendor
invoices.
5. _____ Goods that were not ordered are e) Collect and review vendor performance
accepted. data.
f) Compare quantities on vendor invoices
6. _____ Receiving does not accurately with quantities indicated on the copy of
count goods received. the receiving reports.
g) Conduct periodic vendor audits.
7. _____ Inventory is stolen. h) Conduct physical inventory counts and
adjust records.
8. _____ Vendor miscalculates the total i) Document all transfers of inventory.
amount due. j) Establish policy of only paying original
invoices.
9. _____ Pay for goods not received. k) File invoices by due date.
l) Maintain price lists for frequently
10. _____ Pay full amount for purchases
purchased items.
rather than take discount.
m) Periodically reconcile subsidiary ledger
to A/P control account.
11. _____ Same invoice paid for two times.
n) Purchases are charged to an account that
is the responsibility of the person
12. _____ A payment to a vendor is not
creating the requisition.
posted to the vendor's subsidiary ledger.
o) Receiving only accepts deliveries for
13. _____ Checks are issued to fictitious which it has a valid receiving report.
vendors. p) Require invoices to be accompanied by
completed voucher package.
14. _____ Checks are stolen and used for q) Segregate authorization of payment
unauthorized purposes. from check signing.
r) Sequentially prenumber checks and
account for their usage.
s) Software prevents creation of purchase
order unless vendor's name is on
approved vendor list.
t) Store inventory in secure locations.

Das könnte Ihnen auch gefallen