Uploaded by Roldan Manganip

Auditing in CIS Environment Exam

advertisement
CORDILLERA CAREER DEVELOPMENT COLLEGE
COLLEGE OF ACCOUNTANCY
ICT 301AC: Auditing in CIS Environment
INSTRUCTIONS:
 Answers must be Handwritten. Please write LEGIBLY
 Label answers properly
 Submit answers through messenger or email.
I.
Multiple Choice:
1. An on-line access control that checks whether the user’s code number is authorized to
initiate a specific type of transaction or inquiry is referred to as
a. Password
b. Compatibility test
c. Limit check
d. Reasonableness test
2. Some of the more important controls that relate to automated accounting information
systems are validity checks, limit checks, field checks, and sign tests. These are classified as
a. Control total validation routines
b. Output controls
c. Hash totaling
d. Input validation routines
3. Which one of the following represents a lack of internal control in a computer-based
information system?
a. The design and implementation is performed in accordance with management’s
specific authorization.
b. Any and all changes in application programs have the authorization and approval
of management.
c. Provisions exist to protect data files from unauthorized access, modification, or
destruction.
d. Both computer operators and programmers have unlimited access to the
programs and data files.
4. In an automated payroll processing environment, a department manager substituted the
time card for a terminated employee with a time card for a fictitious employee. The
fictitious employee had the same pay rate and hours worked as the terminated employee.
The best control technique to detect this action using employee identification numbers
would be a
a. Batch total
b. Hash total
c. Record count
d. Subsequent check
5. Which of the following errors would be detected by batch controls?
a. A fictitious employee as added to the processing of the weekly time cards by the
computer operator.
b. An employee who worked only 5 hours in the week was paid for 50 hours.
c. The time card for one employee was not processed because it was lost in transit
between the payroll department and the data entry function.
d. All of the above.
6. Which of the following is a disadvantage of the integrated test facility approach?
a. In establishing fictitious entities, the auditor may be compromising audit
independence.
b. Removing the fictitious transactions from the system is somewhat difficult and, if not
done carefully, may contaminate the client's files.
c. ITF is simply an automated version of auditing "around" the computer.
d. The auditor may not always have a current copy of the authorized version of the
client's program.
7. An employee in the receiving department keyed in a shipment from a remote terminal
and inadvertently omitted the purchase order number. The best systems control to detect
this error would be
a. Batch total
b. Sequence check
c. Completeness test
d. Reasonableness test
8. Which of the following methods of testing application controls utilizes software prepared
by the auditors and applied to the client's data?
a. Parallel simulation.
b. Integrated test facility.
c. Test data.
d. Exception report tests.
9. The test–data method is used by auditors to test the
a. Accuracy of input data.
b. Validity of the output.
c. Procedures contained within the program.
d. Normalcy of distribution of test data.
10. Which of the following statements most likely represents a disadvantage for an entity that
maintains computer data files rather than manual files?
a. It's usually more difficult to detect transposition errors.
b. Transactions are usually authorized before they are executed and recorded.
c. It's usually easier for unauthorized persons to access and alter the files.
d. Random error is more common when similar transactions are processed in different
ways.
11. An integrated test facility (ITF) would be appropriate when the auditor needs to
a. Trace a complex logic path through an application system
b. Verify processing accuracy concurrently with processing
c. Monitor transactions in an application system continuously
d. Verify load module integrity for production programs
12. Computer Integrated System application controls include, except
a. Controls over input.
b. Controls over processing and computer data files.
c. Controls over output.
d. Monitoring controls.
13. The applications of auditing procedures using the computer as an audit tool refer to
a. Integrated test facility
b. Auditing through the computer
c. Data-based management system
d. Computer assisted audit techniques
14. User test and acceptance is part of which phase of the system development life cycle?
a. implementation
b. general systems design
c. program specification and implementation planning
d. detailed systems design
15. Which of the following would strengthen organizational control over a large-scale data
processing center?
a. requiring the user departments to specify the general control standards necessary for
processing transactions
b. requiring that requests and instructions for data processing services be submitted
directly to the computer operator in the data center
c. having the database administrator report to the manager of computer operations.
d. assigning maintenance responsibility to the original system designer who best knows
its logic
16. Which of the following is true?
a. Core competency theory argues that an organization should outsource specific core
assets.
b. Core competency theory argues that an organization should focus exclusively on its
core business competencies.
c. Core competency theory argues that an organization should not outsource specific
commodity assets.
d. Core competency theory argues that an organization should retain certain specific
non -core assets in-house
17. A user’s application may consist of several modules stored in separate memory locations,
each with its own data. One module must not be allowed to destroy or corrupt another
module. This is an objective of
a. operating system controls.
b. data resource controls.
c. computer center and security controls.
d. application controls.
18. Hackers can disguise their message packets to look as if they came from an authorized
user and gain access to the host’s network using a technique called
a. Spoofing
b. IP Spooling
c. Dual-homed
d. Screening
19. A digital signature
a. is the encrypted mathematical value of the message sender’s name.
b. is derived from the digest of a document that has been encrypted with the
sender’s private key.
c. is derived from the digest of a document that has been encrypted with the
sender’s public key.
d. is the computed digest of the sender’s digital certificate.
e. allows digital messages to be sent over an analog telephone line.
20. Which of the following is the most important factor in planning for a system change?
a. Having an auditor as a member of the design team.
b. Using state-of-the-art techniques.
c. Concentrating on software rather than hardware.
d. Involving top management and people who use the system.
e. Selecting a user to lead the design team.
21. Which of the following steps is NOT considered to be part of this systems survey?
a. Interviews are conducted with operating people and managers.
b. The complete documentation of the system is obtained and reviewed.
c. Measures of processing volume are obtained for each operation.
d. Equipment sold by various computer manufacturers is reviewed in terms of
capability, cost, and availability.
e. Work measurement studies are conducted to determine the time required to
complete various tasks or jobs.
22. The technique that recognizes the time value of money by discounting the after-tax cash
flows for a project over its life to time period zero using the company’s minimum desired
rate of return is called the
a. net present value method.
b. capital rationing method.
c. payback method.
d. accounting rate of return method.
23. Which of the following is not a test for identifying application errors?
a. reconciling the source code
b. reviewing test results
c. retesting the program
d. testing the authority table
24. Which statement is NOT true? A batch control log
a. is prepared by the user department.
b. records the record count.
c. indicates any error codes.
d. is maintained as a part of the audit trail.
25. The reporting of accounting information plays a central role in the regulation of business
operations. Preventive controls are an integral part of virtually all accounting processing
systems, and much of the information generated by the accounting system is used for
preventive control purposes. Which one of the following is not an essential element of a
sound preventive control system?
a. Separation of responsibilities for the recording, custodial, and authorization
functions.
b. Sound personnel policies.
c. Documentation of policies and procedures.
d. Implementation of state-of-the-art software and hardware.
26. Which of the following is true?
a. Core competency theory argues that an organization should outsource specific
core assets.
b. Core competency theory argues that an organization should focus exclusively on
its core business competencies.
c. Core competency theory argues that an organization should not outsource
specific commodity assets.
d. Core competency theory argues that an organization should retain certain
specific non -core assets in-house.
27. Database currency is achieved by
a. implementing partitioned databases at remote sites.
b. employing data-cleansing techniques.
c. ensuring that the database is secure from accidental entry.
d. an external auditor’s reconciliation of reports from multiple sites.
e. a database lockout that prevents multiple simultaneous access.
28. The TELOS acronym is often used for determining the need for system changes. Which of
the following types of feasibility studies are elements of TELOS?
a. legal, environmental, and economic
b. environmental, operational, and economic
c. technical, economic, legal, and practical
d. practical, technical, and operational
e. technical, operational, and economic
29. Computer systems that enable users to access data and programs directly through
workstations are referred to as
a. On-line computer systems
b. Database management systems (DBMS)
c. Personal computer systems
d. Database systems
30. A device that works to control the flow of data between two or more network segments
a. Bridge
b. Router
c. Repeater
d. Switch
31. The following matters are of particular importance to the auditor in an on-line computer
system, except
a. Authorization, completeness and accuracy of on-line transactions.
b. Integrity of records and processing, due to on-line access to the system by many
users and programmers.
c. Changes in the performance of audit procedures including the use of CAAT's.
d. Cost-benefit ratio of installing on-line computer system.
32. A type of network that multiple buildings are close enough to create a campus, but the
space between the buildings is not under the control of the company is
a. Local Area Network (LAN)
b. Wide Area Network (WAN)
c. Metropolitan Area Network (MAN)
d. World Wide Web (WWW)
33. Which statement is incorrect?
a. Only successful transactions are recorded on a transaction log.
b. Unsuccessful transactions are recorded in an error file.
c. A transaction log is a temporary file.
d. A hard copy transaction listing is provided to users
34. Which statement is not correct?
a. The purpose of file interrogation is to ensure that the correct file is being
processed by the system.
b. File interrogation checks are particularly important for master files.
c. Header labels are prepared manually and affixed to the outside of the tape or
disk.
d. An expiration date check prevents a file from being deleted before it expires.
35. Which statement is NOT correct? The goal of batch controls is to ensure that during
processing
a. transactions are not omitted.
b. transactions are not added.
c. transactions are processed more than once.
d. an audit trail is created.
II.
Enumeration: Provide the items being required
1. What are the levels of Input Validation Controls
2. Classes of Input Controls
3. What are the types of errors that can corrupt the data codes and cause processing errors?
III.
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
Classification: Classify each of the following as a field, record or file interrogation
Limit Check
Validity Check
Version Check
Missing data check
Sign Check
Expiration date check
Numeric – alphabetic Data Check
Sequence Check
Zero-value Check
Harder Label Check
Range Check
Reasonableness Check
Download