Multiple Choice Chapter 11 1. The following are examples of application risks except a. Inaccurate data b. Incomplete data c. Repeated data d. Duplicate data 2. Within a convenience store register system used to total orders and receive payment from customers, which of the following has the highest risk? a. Duplicate transactions b. Communications failure c. Unauthorized remote access d. Misuse by authorized users 3. The following are examples of application controls except a. Testing the data entry screen b. User ergonomic requirements c. Documentation of backup procedures d. A list of valid source of input data 4. A Company allows data from their sales tracking system to be extracted to spreadsheets by all users. Which of the following is the highest risk associated with this practices a. Copyright violations b. Inefficient user of resources c. Unauthorized access to data d. Incompatible systems 5. Which one of the following is an example of a risk associated with end – user computing? a. Employees make copies of software to work at home b. Employees enter time into company timesheet system c. Employees can view all sales data within the company’s sales tracking system d. Employee can modify his timesheet data after he has entered it into the timesheet system Chapter 11 Review Questions 1. List and explain five application risks 2. How can applications become incompatible systems 3. What are the key questions an IT auditor can ask in helping determine which enduser applications have top priority in an organization? 4. What are the four basic end-user environments? 5. In preparation for the audit of an end-user-developed application, what are the important questions the auditor can ask about the data that can help in assessing application risk? 6. Name and describe three potential risks associated with viruses. 7. A company has a centralized accounting system. Each individual department currently compiles its accounting paper transactions from its local accounting system. To eliminate the paper and increase efficiency, the company wants to implement an interface from the department accounting systems to the centralized accounting system. Name and describe the three most critical controls that you would recommend.