Uploaded by Heziel Frianeza

436356489-Audit-in-Cis-Environment

advertisement
1.
d.
2.
b.
When on-line, real-time processing is used, the grandfather-father-son updating backup
concept is relatively difficult to implement because:
a. Locating information points on files is an extremely time-consuming
task.
b. Magnetic fields and other environmental factors cause off-site storage
be impracticable.
c. Information must be dumped in the form of hard copy if it is to be
reviewed before used in updating.
The process of updating old records is destructive.
Which of the following, when used in multiples in a single computer, can help a
corporation reduce its processing time?
a. Input/output devices
c. Central processing units
Physical storage devices
d. Communication devices
3.
Analysis of data in a database using tools which look for trends or anomalies without
knowledge in advance of the meaning of the data is referred to as:
a. Artificial intelligence
b. Data mining c. Virtual reality d. Transitory analysis
4.
ABC Company needs an internal communication network that provides high speed
communication among nodes. Which of the following is appropriate for ABC?
a. Wide Area Network (WAN)
c. File server
b. Local Area network (LAN)
d. Value added network (VAN)
5.
A client is concerned that a power outage or disaster could impair the computer
hardware's ability to function as designed. The client desires of-site back up hardware
facilities that are fully configured and ready to operate within several hours. The client
most likely should consider a:
a. Cold site b. Cool site
c. Warm site
d. Hot site
6.
The use of message encryption software:
a. Guarantees the secrecy of data.
b. Requires manual distribution of keys.
c. Increases system overhead.
d. Reduces the need for periodic password changes.
7.
Which of the following strategies would a CPA most likely consider in auditing an entity
that possesses most of its financial data only in electronic form, such as a papaeriess
system?
a. Continuous monitoring and analysis of transaction processing with an embedded
audit module.
b. Increased reliance on internal control activities that emphasize the segregation of
duties.
c. Verification of encrypted digital certificates used to monitor the authorization of
transactions.
d. Extensive testing of firewall boundaries that restrict the recording of outside
network traffic.
8.
When evaluating internal control of an entity that processes sales transactions on the
Internet, an auditor would be most concerned about the:
a. Lack of sales invoice documents as an audit trail.
c.
d.
b. Potential for computer disruptions in recording sales.
Inability to establish an integrated test facility.
Frequency of archiving and data retention.
9. Josh is the data administrator (DA) for ABC Corporation. An example of Josh's
responsibilities as the DA is to monitor:
a. The database industry.
c. The database security
b. The performance of the database
d. Back up of the system
10. Which of the following is an example of a validity check?
a. The computer ensures that a numerical amount in a record does not exceed some
predetermined amount.
b. As the computer corrects errors and data are successfully resubmitted to the system, the
causes of the errors are printed out.
c. The computer flags any transmission for which the control field value did not match that of
an existing file record.
d. After the data for a transaction are entered, the computer sends certain data back to the
terminal for comparison with data originally sent.
14. A control feature in an electronic data processing system requires the central processing unit
(CPU) to send signals to the printer to activate the print mechanism for each character. The
print mechanism, just prior to printing, sends a signal back to the CPU verifying that the
proper print position has been activated. This type of hardware control is:
a. Echo control
b. Validity control c. Signal control d. Check digit control
15. Which of the following is an example of a validity check?
a. The computer ensures that a numerical amount in a record does not exceed
some predetermined amount.
b. As the computer corrects errors and data are successfully resubmitted to the
system, the causes of the errors are printed out.
c. The computer flags any transmission for which the control field value did not
match that of an existing file record.
d. After data for a transaction are entered, the computer sends certain data back
to the terminal for comparison with data originally sent.
16. Which of the following statements about general controls is not correct?
a. Disaster recovery plans should identify alternative hardware to process company data.
b. Successful IT development efforts require the involvement of IT and non-IT personnel.
c. The chief information officer should report to senior management and the board.
d. Programmers should have access to computer operations to aid users in resolving
problems.
17. A retailing entity uses the internet to execute its purchase transactions. The entity's auditor
recognizes that the documentation of details of transactions will be retained for only a short
period of time. To compensate for this limitation, the auditor most likely would:
a.
b.
c.
d.
Compare a sample of paid vendors' invoices to the receiving records at year-end.
Plan for large measure of tolerable misstatement in substantive tests.
Perform tests several times during the year, rather than only at year-end.
Increase the sample of transactions to be selected for cut-off tests.
18. One of the major problems in a computer system is that incompatible functions may
be performed by the same individual. One compensating control is the use of:
a. Echo checks
c. Computer generated hash totals
b. A check digit systems
d. A computer log
19. Which of the following is the most effective user account management control in
preventing the unauthorized use of a computer system?
a. Management enforces an aggressive password policy that requires
passwords to be 10 characters long, to be non-reusable and to be changed
weekly.
b. An account manager is responsible for authorizing and issuing new
accounts.
c. The passwords and usernames of failed log in attempts are logged and
documented in order to cite attempted infiltration of the system.
d. Employees are required to renew their accounts semiannually.
20. An internet firewall is designed to provide adequate protection against which of the
following?
a. A computer virus.
c. Insider leaking of confidential
information
b. Unauthenticated logins from outsider users, d. A Trojan horse application
21. A client communicates sensitive data across the internet. Which of the following
controls would be most effective to prevent the use of the information if it were
intercepted by an unauthorized party?
a.
A firewall b. An access log c. Passwords
d. Encryption
22. When companies use information technology (IT) extensively, evidence may be
available only in electronic form. What is an auditor's best course of action in such
situations?
a. Assess the control risk as high.
b. Use audit software to perform analytical procedures.
c. Use generalized audit software to extract evidence from client databases.
d. Perform limited tests of controls over electronic data.
23. An auditor is gaining an understanding of a client's internet controls. Which of the
following would likely be the least effective control?
a. The client requires all users to select passwords that are not easily guessed.
b. The client requires users to share potentially useful downloaded programs from public
electronic bulletin boards with only authorized employees.
c. The client uses a proxy server to provide information to external web page users.
d. The client uses a firewall system that produces reports on internet usage patterns.
a.
b.
c.
d.
24. An auditor should obtain sufficient knowledge of an entity's information system relevant
to financial reporting to understand the:
Safeguards used to limit access to computer facilities.
Process used to prepare significant accounting estimates.
Procedures used to assure proper authorization of transactions.
Policies used to detect the concealment of fraud.
29. To achieve audit efficiency and effectiveness with a personal computer, the two crucial
requirements are selecting
a. The appropriate audit tasks for personal computer applications and the appropriate
software to perform the selected audit tasks
b. The appropriate software to perform the selected audit tasks and data that can be
accessed by the auditor’s personal computer
c. Company data that can be accessed by the auditor’s personal computer and the
appropriate audit tasks for personal computer applications
d. The appropriate sample of company data to test with the auditor’s personal computer and
the appropriate software to perform the selected audit tasks
30. At which point in an ordinary sales transaction of wholesaling business is a lack of specific
authorization of least concern to the auditor in the conduct of an audit?
a. Granting of credit
c. Determination of discounts
b. Shipment of goods
d. Selling of goods for cash
31. An online sales order processing system most likely would have an advantage over a batch
sales order processing system by:
a. Detecting errors in the data entry process more easily by the use of edit programs.
b. Enabling shipment of customer orders to be initiated as soon as the orders are received.
c. Recording more secure backup copies of the database on magnetic tape files.
d. Maintaining more accurate records of customer accounts and finished goods inventories.
32. When evaluating internal control of an entity that processes sales transactions on the internet,
an auditor would be most concerned about the:
a. Lack of sales invoice documents as an audit trail.
b. Potential for computer disruptions in recording sales.
c. Inability to establish an integrated test facility.
d. Frequency of archiving and data retention.
33. After obtaining a preliminary understanding of a client's computer control structure, an auditor
may decide not to perform test of controls auditing related to the control procedures within
the computerized portion of the client's control system. Which of the following would not be
a valid reason for choosing to omit tests of controls auditing?
a. The client's computer control procedures duplicate manual control procedures existing
elsewhere in the system.
b. There appear to be major weaknesses that indicate a high control risk.
c. The time and peso costs of testing exceed the time and peso savings in substantive work if
the tests of computer controls show the controls to operate effectively.
d. The client's control procedures appear adequate enough to justify a low control risk
assessment.
34. A client's program that recorded receiving report information entered directly by the receiving
department on vendor shipment receipt included a reasonableness or limit test. Which of
the following errors would this test likely detect?
a. The receipt was for a shipment from unauthorized vendor.
b. The vendor shipped the wrong item.
c. The receiving department clerk entered the quantity of the product received as 0.
d.
The shipment received from the vendor was past due by 2 weeks.
35. All activities related to a particular application in a manual system is recorded in a journal.
The name of the corresponding item in a computerized system is a:
a. master file
c. transaction file
b year-to-date file
d. current balance file
36. Which of the following statements is correct concerning internal control in an electronic data
interchange (EDI) system?
a. Preventive controls generally are more important than detective controls in EDI
systems.
b. Control objectives for EDI systems generally are different from the objectives for
other information systems.
c. Internal controls in EDI systems rarely permit control risk to be assessed at below
maximum.
d. Internal controls related to the segregation of duties generally are the most important
controls in EDI systems.
37. Which of the following is usually a benefit of transmitting transactions in an electronic data
interchange (EDI) environment?
a.
A compressed business cycle with lower year-end receivable balances.
b.
A reduced need to test computer controls related to sales and collections transactions.
c.
An increased opportunity to apply statistical sampling techniques to account balances.
d.
No need to rely on third-party service providers to ensure security.
38.
Many clients now have their data processed at an independent computer service rather
than have their own computer. The difficulty the independent auditor faces when a
computer service center is used is:
a. Gaining the permission of the service center to review their work.
b. Finding compatible programs that will analyze the service center programs.
c. In trying to abide by the Code of Ethics to maintain the security and confidentiality of the
client's data.
d. In determining the adequacy of the service center's internal controls.
39.
Which of the following statements is correct concerning the security of messages in an
electronic data interchange (EDI) system?
a. When confidentiality of data is the primary risk, message authentication is the
preferred control rather than encryption.
b. Encryption performed by physically secure hardware devices is more secure
than encryption performed by software.
c. Message authentication in EDI systems performs the same function as
segregation of duties in other information systems.
d. Security in the transaction phase in EDI systems is not necessary because
problems at that level will usually be identified by the service provider.
40.
Which of the following is usually a benefit of using electronic funds transfer for international
cash transactions?
a. Improvement of the audit trail for cash receipts and disbursements.
b. Creation of self-monitoring access controls.
c. Reduction of the frequency of data entry errors.
d.
Off-site storage of source documents for cash transactions.
41.
Which of the following is an essential element of the audit trail in an electronic data
interchange (EDI) system?
a. Disaster recovery plans that ensure proper backup of files.
b. Encrypted hash totals that authenticate messages.
c. Activity logs that indicate failed transactions.
d. Hardware security modules that store sensitive data.
42.
When the IT system is significant, the auditor should also obtain an understanding of the
IT environment and whether it may influence the assessment of:
a. Inherent and control risks
c. Inherent and detection risks
b. Control and detection risks
d. General and application controls
43.
A personal computer can be used in any of the following configurations, except:
A stand-alone workstation operated by a single users or a number of users at the
different times.
b. A workstation which is part of a local area network of personal computers.
c. A workstation connected to a server.
d. A server connected to another server.
a.
44.
In a computerized payroll system environment, an auditor would be least likely to use test
data to test controls related to:
a. Missing employee numbers.
b. Proper approval of overtime by supervisors.
c. Time tickets with invalid job numbers.
d. Agreement of hour per clock cards with hours on time tickets.
45. Which of the following statements is incorrect?
a. The purpose of CIS application controls is to establish specific control procedures over the
application systems in order to provide reasonable assurance that all transactions are
authorized and recorded, and are processed accurately and on a timely basis.
b. It may be more efficient to review the design of the general CIS controls before reviewing the
CIS application controls.
c. If general CIS controls are not effective, there may be a risk that misstatements might occur
and go undetected in the application systems.
d. The purpose of general CIS controls is to establish a framework of overall control over the
CIS activities and to provide an absolute level of assurance that the overall objectives of
internal control are achieved.
55.
a.
b.
There are two common types of workstations - general purpose terminals and special
purpose terminals. Which of the following is not a general purpose terminal?
Personal computers
c. Point of sale devices
Intelligent terminal
d. Basic keyboard and monitor
User authorization procedures are designed to prevent or detect the following, except:
Unauthorized access to on-line terminal devices, programs and data.
b. Entry of authorized transactions.
c. Unauthorized changes to data files.
d. The use of computer programs by unauthorized personnel and the use of the computer
programs that have not been authorized.
56.
a.
57.
a.
b.
These are programmed routines that check the input data and processing results for
completeness, accuracy and reasonableness.
Pre-processing authorization
c. Master file controls
Cut-off procedures
d. Edit, reasonableness and validation controls
This is the process of establishing control totals over data being submitted for processing
through workstations and comparing the control totals during and after processing to
ensure that complete and accurate data are transferred to each processing phase.
a. Footing
b. Cross-casting
c. Balancing
d. Posting
58.
An entity's contingency plans for computer information systems should include appropriate
backup agreements. Which of the following arrangements would be considered too
vendor-dependent when vital operations require almost immediate availability of
computer resources?
A "cold site" arrangement
A "hot site" arrangement
A "cold and hot site" arrangement
Using excess capacity at another data center within reality
59.
a.
b.
c.
d.
60. The operating system performs all of the following tasks except
a. schedules job processing
b. assigns memory to applications
c. translates third-generation languages into machine language
d. authorizes user access
The most important output control is:
a. Control totals, which are used to verify that the computer's results are correct.
b. Distribution control, which assures that only authorized personnel receive the reports
generated by the system.
c. Review of the data for reasonableness by someone who knows what the output should look
like.
d. Logic tests, which verify that no mistakes were made in processing.
61.
62.
Accounting systems are designed to attain some objectives. Which of the following cannot
be considered an objective of accounting systems?
a.
To protect the business owners and safeguard their assets.
To provide a means by which interested parties may be given information on the financial
position and results of operations of a business organization.
c. To facilitate management planning, control and decision making.
d. To accomplish the different routinary administrative activities of the business organization.
b.
63.
a.
b.
64.
Passwords for microcomputer software programs are designed to prevent:
Inaccurate processing of data c. Unauthorized use of the software
Unauthorized access to the computer d. Incomplete updating of data files
When auditing "around the computer", the auditor performs tests of
a. General computer controls but does not test application computer controls.
b. Application computer controls but does not test general computer controls.
c. Both general and application computer controls.
d. Neither general nor application computer controls.
Download