General Accounting
Financial System Modernization
Internal Control
Information Security (SM, AC, CM)
Financial Statement Audit
100

The Federal government Fiscal Year end on this date.

What is September 30?

100

Activities to analyzing, identifying and correcting messy, raw data.

What is data cleansing / cleanup?

100

This is the formal name of the group whose initials are C.O.S.O.

What is the Committee of Sponsoring Organizations?

100

This handbook is within DHS series of information security policies for managing and protecting sensitive systems.

What is DHS 4300A Handbook?

100

This opinion on the auditor's report indicates the auditor's belief that the entity's financial statements fairly present its financial results, financial position, and cash flows.

What is unqualified / clean opinion?

200

These are the 2 types of accounts in the Federal accounting system.

What is Budgetary and Proprietary accounts?

200

This is a process to convert and migrate data from one database to another.

What is Extract Transform and Load (ETL)?

200

The three functions of controls are Correction, Detection, and this.

What is Prevention?

200

This is the third Information Security pillar, along with Data Confidentiality and Data Integrity.

What is Data Availability?

200

This GAO manual presents a methodology for auditing information system controls in federal and other governmental entities.

What is Federal Information System Controls Audit Manual (FISCAM)?

300

This is a uniform Chart of Accounts to be used in standardizing federal agency accounting that supports the preparation of standard external reports required by the Office of Management and Budget (OMB) and the Department of Treasury (Treasury).

What is the United States Government Standard General Ledger (USSGL)?

300

A formal declaration by a Designated Approving Authority that authorizes operation of a Business Product and explicitly accepts the risk to agency operations.

What is Authority/Approval to Operate (ATO)?

300

This principle is based on shared responsibilities of a key process that disperses the critical functions of that process to more than one person or department.

What is Segregation/Separation of Duties (SOD)?

300

A smoke alarm is an example of this kind of countermeasure.

What are Detective Countermeasures?

300

This GAO guidance provides a framework for conducting high-quality audits with competence, integrity, objectivity, and independence (aka Yellow Book).

What is Generally Accepted Government Auditing Standards (GAGAS)?

400

This Act prescribes the requirements for the administrative control of funds.

What is the Antideficiency Act (ADA)?

400

This systematic, disciplined improvement approach critically examines, rethinks, and redesigns mission-delivery processes in order to achieve dramatic improvements in performance in areas important to customers and stakeholders.

What is Business Process Reengineering (BPR)?

400

This AICPA Statement on Standards governs the way organizations report on their various compliance controls related to third-party vendors.

What is SSAE18?

400

This is the key documentation in the security authorization package to track IT risk mitigation activities.

What is Plan of Actions & Milestones (POA&M)?

400

This Act enhances the President Administration’s efforts to combat improper payments.


What is Improper Payments Elimination and Recovery Improvement Act of 2012 (IPERIA)?

500

This activity sets aside an estimate amount from the budget (e.g. Purchase Requisition).

What is a commitment?

500

This formal document specifies functional capabilities that the developer agrees to provide and the client agrees to find the product satisfactory if it provides the capabilities.

What is Function Requirements Document (FRD)?

500

Under the COSO 1992 framework, this is the fifth component of Internal Control, the other four being Control Environment, Risk Analysis, Control Activities, and Information/ Communication.

What is Monitoring?

500

When these two match up and get together, an incident occurs, not necessarily a loss.

What are a "Threat and Vulnerability"?

500

These are 3 components in the Fraud Triangle that contribute to increasing the risk of fraud.

What is 1) opportunity, (2) incentive, and (3) rationalization?

M
e
n
u