. A threat to the expenditure cycle that involves an employee creating and approving fictitious purchase orders is kno

Auditing: A Risk Based-Approach (MindTap Course List)
11th Edition
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Chapter9: Auditing The Revenue Cycle.
Section: Chapter Questions
Problem 12CYBK
icon
Related questions
Question
1. A threat to the expenditure cycle that involves an employee creating and approving fictitious purchase orders is known as:
A. Inventory theft
B. Unauthorized access
C. Check tampering
D. Billing schemes
2.  Purchase orders are used to initiate a payment in the disbursement cycle. True or False
3.Vendor audits are conducted to address the threat of unauthorized access in the disbursement cycle. True or false
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Frauds in Accounting information system (AIS)
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L…
Auditing: A Risk Based-Approach (MindTap Course L…
Accounting
ISBN:
9781337619455
Author:
Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:
Cengage Learning
Principles of Accounting Volume 1
Principles of Accounting Volume 1
Accounting
ISBN:
9781947172685
Author:
OpenStax
Publisher:
OpenStax College
College Accounting (Book Only): A Career Approach
College Accounting (Book Only): A Career Approach
Accounting
ISBN:
9781337280570
Author:
Scott, Cathy J.
Publisher:
South-Western College Pub