IT Audit Manual-Volume. I: B. II and III
IT Audit Manual-Volume. I: B. II and III
2. IT Audit is a process of collecting and evaluating evidence to determine whether a computer system has
been designed to
a. maintain data integrity b. safeguard assets
c. allows organisational goals to be achieved effectively and uses resources efficiently
d. All of the above
5. Management’s goals and objectives in utilising technology to support business processes include
i. Confidentiality ii. Integrity
iii. Applicability iv. Reliability
9. There is a potential risk that the organisation could incur penalties should
a. confidentiality of data not protected
b. integrity of data not observed
c. legal and regulatory procedures not be enforced.
d. in all the cases stated above.
10. A framework for all audits and auditors and define the mandatory requirements of the audit is
provided by the
a. professional standards b. auditors professional knowledge
c. legal and professional mandate d. computer system
13. Pick the correct one with respect to the objectives of undertaking an IT audit as a component
of a financial statement audit include to
i. understand how well management capitalises on the use of information technology to
improve its important business processes
ii. understand the pervasive effect of information technology on the client’s important
business processes, including the development of the financial statements and the business
risks related to these processes.
iii understand how the client’s use of information technology for the processing, storage and
communication of financial information affects the internal control systems and our consideration
of inherent risk and control risk
2
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
iv. understand the effectiveness of controls over the information technology processes that
have a direct and important impact on the processing of financial information and suggest
alternative information technology platform for better business output
16. The objectives of IT audit include assessment and evaluation of processes that
a. Ensures asset safeguarding b. Ensures maintenance of requisite data or information
c. both d. None
19. Staff skills, awareness and productivity to plan, organize, acquire, deliver, support and monitor
information systems and services are come under which category of assets?
a. Facilities b. People
c. Resources d. Application System
3
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
a. i, ii and iii b. ii, iii and iv
c. i, ii and iv d. All of the above
22. IT Audit is all about examining whether the IT processes and IT Resources combine together to fulfil
the intended objectives of the organization while complying with the extant rules to ensure
i. Effectiveness ii. Efficiency
iii. Economy iv. Easiness
a. i and ii b. i and iv
c. ii, iii and iv d. All of the above
28. With the help of CAATs tools, IT auditor can plan for
a. 100 per cent compliance testing of auditee’s data.
b. 100 per cent substantive testing of auditee’s data.
c. 100 per cent both compliance and substantive testing of auditee’s data.
d. 100 per cent of either compliance or substantive testing of auditee’s data.
4
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
29. Application software and transaction data should be protected from unauthorised alteration by the use
of appropriate
i. physical access control ii. logical access control
iii. system access control iv. resource access control
30. Statement I-Once an application goes into production, programmers should no longer have access to
programs and data.
Statement II-If programmers are provided access, all activity should be logged, reported, and reviewed by an
independent group.
a. Only Statement I is correct b. Only Statement II is correct
c. Both Statement I and II are correct d. Neither Statement I nor Statement II is correct
32. Which demonstrates how a specific transaction was initiated, processed, and summarised?
a. Audit trail b. Audit log
c. transaction trail d. transaction log
34. A forum of developers and users to exchange testing and acceptance criteria on new IT security
products has created by
a. National Institute of Design and Framework
b. National Institute of Standards and Technology
c. Indian Institute of Information and Technology
d. Indian Institute of Mass Level Communication
5
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
36. Statement I-Self-training is an efficient measure from the standpoint that end users tend to ask their
colleagues for help, which results in the saving of entity’s money and time
Statement II- An effective training program enhances support cost by a factor of three to six
comparing to self-training.
a. Only Statement I is correct b. Only Statement II is correct
c. Both Statement I and II are correct d. Neither Statement I nor Statement II is correct
.
37. Information Technology controls are used to mitigate the risks associated with
a. application systems b. IT environment
c. Both a & b d. Neither a nor b.
38. IT controls can be classified into two categories pick the correct one
a. General and Specific control b. General and Application controls
c. System and Application controls d. System and Environment controls
39. Pick the incorrect one regarding the components of General Controls
a. controls over data centre operations, system software acquisition and maintenance, access security,
and application system development and maintenance
b. IT policies, standards, and guidelines pertaining to IT security and information protection,
application software development and change controls, segregation of duties, business continuity
planning, IT project management, etc.
c. General IT controls are concerned with the organisation’s IT infrastructure, including any IT related
policies, procedures and working practices
d. controls that help to ensure the proper authorisation, completeness, accuracy, and validity of
transactions, maintenance, and other types of data input.
40. Pick the correct one regarding the categories of General Control
i. Organisation and management controls i.e.IT policies and standards
ii. IT operational controls iii. Physical controls (access and environment)
iv. Logical access controls
41. Application controls pertain to specific computer applications. Application controls are closely related
to individual transactions. Pick the correct ones regarding components of Application controls
i. controls over the input of transactions ii. controls over processing
iii. controls over output iv controls over standing data and master files
6
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
IT Audit Manual Volume. I
Audit of General Controls
2. While conducting the audit of Organisational and Management Controls, in order to determine whether
the controls that the auditee organisation has put in place are sufficient to ensure that the IT activities are
adequately controlled, the IT auditor should ensure
i. IT planning and senior management involvement
ii. Personnel and training policies iii. People’s participation
iv. Internal audit involvement
4. Which shortcoming or risk area of Organisational and Management Controls affects the Principle of Going
Concern?
a. poor reporting structures b. Ineffective staff who do not understand their jobs
c. Inadequate management involvement d. All of the above
5. The ultimate responsibility for the safeguarding of the organisation’s assets rests with
a. Staff using the assets b. management
c. auditor d. beneficiary group.
7. To ensure that in IT Planning and implementation, there exists an active involvement of Senior Level
Management so that IT is given the proper recognition, attention or resources it requires to meet business
objectives. Also there exists a formal organisational IT structure with all staff knowing their roles and
responsibilities, preferably by having written down and agreed job descriptions. Pick the correct where the
involvement of senior level management is desired
i. Proposal approval ii. Analysis of design and development
iii Selection of product and supplier iv. Implementation and Post implementation review.
9. Statement I-The IT strategic plan is likely to affect current year’s audit to a minimum.
Statement II- A review of an organisation’s IT strategic plan could forewarn the IT auditor of problems
which may arise in later years
10. The organisation should develop information technology plans which reflect its corporate strategy and
match its information technology needs for a given future period. Notwithstanding the uniqueness of a business
perspective, an information technology plan must be based on the following
i. It should support and complement the business direction of an organisation.
ii. A planning horizon should be formulated that provides long-term direction and short-to-medium term
deliverables in a manner consistent with the business strategy.
iii. The planning process should recognize the capability and capacity of the organisation to deliver
solutions within the stated planning timeframe.
iv. It should provide a basis for measuring and monitoring performance
11. The organisation should develop information technology plans which reflect its corporate strategy and
match its information technology needs for a given future period. Notwithstanding the uniqueness of a business
perspective, an information technology plan must be based on the following
i. The scope of the plan should be established to facilitate formulation of effective strategies.
ii. Costs of implementation should be justified through tangible and intangible benefits that can be
realised.
8
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
iii. It should be reassessed periodically and disseminated widely.
iv. Responsibility for implementing the plan should be explicit and Management commitment in
implementing the plan should be exhibited
13. Critical risk elements involved in the process of acquisition of IT assets are as follows
i. In IT systems, the scale, cost and impact of an acquisition may have a strategic significance well beyond
the acquisition itself.
ii. Any serious misjudgement in the acquisition decision will impair not only the success of the underlying
IT project but, in addition, the potential business benefits that are anticipated.
iii. Acquisitions frequently involve a significant capital investment for an organisation.
iv. In addition to the investment, the opportunity cost of the capital employed and the time/resources
expended in the acquisition process add to the importance of the acquisition.
14. The importance of IT related acquisitions is usually directly proportional to their post, scale and
complexity. In general, the larger and more complex the acquisition, the higher will be its impact on, and
importance to, the business. In addition, the acquisition may be important to the business due to its
interrelationships with other IT projects. Accordingly, an IT auditor must see that the process adopted for
acquisition of IT Assets should encompass the following elements:
i. adherence to a structured approach, comprising all the key acquisition activities and deliverables,
timelines and milestones, project organisation and resources
ii. enunciation of objectives, including a concise statement of the business expectations from the
acquisition, detailed requirements, and specification of overall scope
iii. defined evaluation and selection criteria, particularly measurement scale, relative weights of all
criteria and the manner in which acquisition and project risks will be minimised
iv. commitment and support of executive management through a senior level project sponsor and, if
appropriate, the establishment of an acquisition steering committee
15. An IT auditor must see that the process adopted for acquisition of IT Assets should encompass the
following elements:
9
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
a. participation from IT, users, consultants, legal and other interested parties, each with a defined set of
responsibilities with respect to the acquisition
b. compatibility with the organisation’s acquisition policies and procedures, including any applicable
regulatory guidelines.
c. both of the above
d. none of the above
16. Unauthorised working practices being adopted by IT staff, increase in the number of errors being made by
IT staff and the risk of system unavailability in case the system is complex and there is no technical
documentation are the control risk categorised under
a. Documentation and Document Retention Policies
b. Internal audit involvement
c. Personnel and Training
d. None of the given
17. Types of documentation an IT auditor should consider according to the audit approach
a. four b. two
c. three d. five
19. Pick the incorrect non-audit requirement that should be taken into account by the organisation while
formulating documentation retention policies
a. end-user requirement b. import regulations
c. taxation regulations d. company legislation requirements The
20. Where the organisation summarises transactions into balances the auditor will need to
a. trace transactions from initiation through to their summarisation in the accounts
b. find or request an alternative audit trail, e.g. asking the organisation to produce a hard copy of the
transactions which make up the summarised balances.
c. either a or b
d. neither a or b
21. Who has the ultimate responsibility of ensuring that an adequate system of internal controls is in place?
a. Stakeholder b. User or beneficiary
c. Government d. Management
22. Risk areas associated with internal audit control perspective are
i. nor reporting to senior management ii. hiring and firing policies
iii. insufficient availability of resources iv. restriction on the scope of work
24. Data protection and privacy legislation, computer misuse legislation to make attempted computer
hacking and unauthorised computer access a criminal offence, banking and finance regulations and copyright laws
to prevent theft & illegal copying of computer software are important compliance legal and regulatory provision
i. The legal and regulatory requirements will vary from one country to another.
ii. The legal and regulatory requirements will be uniform across the border.
iii. Non-compliance shall result into closure of the activity being undertaken by the entity.
iv. IT auditor should assess whether the organisation is aware of local requirements and have taken
appropriate measures to ensure compliance.
a. i and iv b. ii and iv
c. i, iii and iv d. All of the above
25. In the absence of strong personnel and training control mechanism, following risks are anticipated except
a. Outsourcing of works b. Fraud
c. Hardware/software failure d. Errors and omissions caused by people
27. When hiring new members of IT staff, the organisation would be expected to take account of
a background checks including taking up references and police verification
b. confidentiality agreements and codes of conduct
c. both a & b
d. None of the given
11
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
b. Job rotation acts as a preventive control. Staff is less inclined to adopt unapproved working practices
or commit frauds if they know that their job are subject to rotation and taken over by someone else.
c. Segregation of duties ensures that transactions are properly authorised, recorded, and that assets are
safeguarded and activities are checked.
d. It should be ensured that computer systems may be able to enforce separation of duties through the
use of pre-programmed user and group security profiles
29. The ability to apply and enforce adequate separation of duties is largely dependent upon
i. the size of the IT department
ii. the number of computer staff involved
iii. the nature of work of the IT department
iv. the financial resources of the organisation
12
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
34. Computer operations refers to
a. the logistic and infrastructure aspects of hardware
b. the logistic and infrastructure aspects of software
c. the logistic and infrastructure aspects of hardware and software
d. None of the given
36. Poorly controlled computer operations are associated with the risks of
i. running of the programme in an incorrect manner
ii. loss or corruption to data files
iii. no-or minimum delay and disruption in processing
iv. lack of backups and contingency planning
38. The structure and level of service specified in a Service Level Agreement will depend upon
i. the working practices ii. the competency of staff
iii. the nature of duties of IT department iv. requirements of each organisation
41. Statement I- There is an increasing trend for IT services to be delivered by third party service providers.
This is termed as outsourcing of the IT services
Statement II- This has arisen because IT is being seen as a core business activity.
43. While conducting the audit of outsourcing of the services, the IT auditor should also focus on issues
related to IPR (Intellectual Property Rights) and evaluate
a. whether the programs etc. developed by outsourcing components to a third party are duly protected as
per contract terms
b. whether the programs etc. developed by outsourcing components to a third party are not prone to
outside use by other organisations.
d. whether the programs etc. developed by outsourcing components to a third party are duly protected
as per contract terms and are not prone to outside use by other organisations
c. whether the programs etc. developed by outsourcing components to a third party are compatible with
the requirement of the business objective and are not prone to outside use by other organisations.
14
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
45. The organisation should have clear, documented operating procedures for all computer systems to
ensure their correct, secure operation. The documented procedures should be available for the detailed
execution of each job, and should include
i. the incorrect handling of data files
ii. scheduling requirements to ensure best use of IT resources
iii. instructions for handling errors or other exceptional conditions which might arise when jobs are run
iv. support contacts in the event of unexpected operational or technical difficulties
47. The IT auditor should be aware that the level and detail of documentation will vary from one organisation
to another, and will depend on factors such as
i. the size of the organisation ii. the type of hardware and software used
iii. the nature of the applications iv. the involvement of senior level management
48. A range of controls is required where an organisation uses computer networks. Network managers should
ensure that there are appropriate controls to secure data in networks, and that the network is adequately
protected from unauthorised access. The controls may include
i. integration of duties of operators and network administrators
ii. establishment of responsibility for procedures and management of remote equipment
iii. monitoring of network availability and performance.
iv. requisite reports and utilities to measure system response time and down time
51. Newer devices such as biometric devices use voice recognition, facial features, hand geometry,
fingerprints, retina scan etc. to control physical access to the system. The process is of
a. four types-one to one, one to many, many to one and many to many
b. three types- one to one, one to many and many to one
c. two types- one to many and many to one
d. single type-many to one
52. Pick the correct one regarding the process of physical access using biometric devices, voice recognition
etc.
a. One to many- where the identity of the person is disclosed first and then the biometric input is
compared to the specific data relating to that identity.
b. Many to one- where the biometric input is compared with the data available in the system to recognize
the person and to give access.
c. both a & b.
d. None of the above.
53. Risk of water damage is largely dependent on the location of the computer facilities. Some of the water
risk areas are
i. Office located near river-side, lake side or sea-side has more water risk
ii. Computer equipment located in close proximity to pipes and water tanks are at increased water risk.
iii Computer equipment located in basements or on floors immediately below or in the vicinity of water
are at increased water risk
iv. Automatic moisture detectors may reduce the water risk by alerting IT staff of potential water ingress.
54. “A system of measures and procedures, both within an organisation and in the software products used,
aimed at protecting computer resources (data, programs and terminals) against unauthorised access attempts.” is
related to
a. Physical Access Control b. Logical Access Control
c. System Access Control d. Environmental Access Control
55. i. Logical access controls can exist at both an installation and application level. Controls within the
general IT environment restrict access to the operating system, system’s resources and applications,
whilst the application level controls restrict user activities within individual applications.
ii. The importance of logical access controls is increased where physical access controls are more
effective.
iii. Logical access controls usually depend on the in-built security facilities available under the operating
system or hardware in use. Additional access controls can be gained through the appropriate use of
proprietary security programs.
iv. The most common form of logical access control is login identifiers (ids) followed by password
authentication.
16
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
a. i, ii and iii b. ii, iii and iv
c. All of the above d. i, iii and iv
56. Where an organisation makes use of wide area networks and global facilities such as the Internet
a. logical access security is not desirable ii. logical access security is of less importance
c. logical access security is of particular importance
d. None of the given.
59. i. Any files containing master file or standing data information should also be protected.
ii. Unauthorised access to the source code of an application could be used to make amendments in the
programming logic leading to fraud, data loss, and corruption.
iii. Inadequate protection to password files may cause to leaking of logon identification and password and
considerable damage to the entity.
iv. System Software and Utilities consist of software such as editors, compilers, program debuggers.
Access to these should not be restricted as these tools could be used to guard against any amendments to
data files and application software is made.
60. Files used to record the actions of users and hence provide the system administrators and organisation
management with a form of accountability are called
a. System Files b. Action Files
c. Log Files d. Business Files
61. Which can be used to record changes to financial data i.e. who changed what data, from what to what
and when?
a. System Log b. Application Log
c. Transaction Log d. Report Log
17
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
62. Pick the incorrect one
a. The IT auditor should review of the change controls in order to gain assurance that the systems
continue to do what they are supposed to do and the controls continue to operate as intended.
b. Change refers to changes to the system software (operating system and any utilities) and individual
applications.
c. The scale of change can vary considerably and accordingly effect that a change has on the operation of
the system may be out of proportion to the size or scale of the change made.
d. None of the above
68. It may be ensured in IT audit that the organisation’s procedures to control changes should include
i. Procedures for management authorisation
ii. Thorough testing after amended software is used in the live environment.
iii. The amended software is transferred or “transported” to the live environment authorised by
operations management
iv. The establishment of procedures for making emergency changes.
18
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
69. It may be ensured in IT audit that the organisation’s procedures to control changes should include
a. Management review of the effects of any changes and the preparation of fall-back plans (just in case
anything goes wrong)
b. Maintenance of adequate records
c. Both a & b
d. None of the above.
72. The objective of having a Business Continuity and Disaster Recovery Plan and associated controls is to
ensure
a. that the organisation can accomplish its mission and it would not lose the capability to process,
retrieve and protect information maintained in the event of an interruption or disaster leading to
temporary loss of computer facilities
b. that the organisation can accomplish its mission and it would not lose the capability to process,
retrieve and protect information maintained in the event of an interruption or disaster leading to
permanent loss of computer facilities
c. that the organisation can accomplish its mission and it would not lose the capability to process,
retrieve and protect information maintained in the event of an interruption or disaster leading to
temporary or permanent loss of computer facilities
d. None of the given.
73. The absence of a well-defined Business Continuity and Disaster Recovery Plan may pose risk and hamper
i. The organisation’s ability to accomplish its mission after re-starting its operations
ii. To retrieve and protect the information maintained.
iii. To keep intact all the organisational activities after the disaster.
iv. To start its operations on full scale at the earliest to minimise the business loss in terms of money,
goodwill, human resources and capital assets
74. The IT auditor while assessing the adequacy of business continuity and disaster recovery plan should
consider:
19
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
i. Evaluating the financial and other resources to determine to legality and competency of the business
continuity and disaster recovery plan documented by the business.
ii. Verifying that the business continuity and disaster recovery plans are effective to ensure that
information processing capabilities can be resumed promptly after an unanticipated interruption by
reviewing the results from previous tests performed, if any, by the IT organisation and the end users.
iii. Evaluating off site storage to ensure its adequacy by inspecting the facility and reviewing its contents
and security and environmental controls. It may be ascertained whether backups taken earlier have ever
been tested for data recovery by the auditee organisation.
iv. Evaluating the ability of IT and user personnel to respond effectively in emergency situations by
reviewing emergency procedures, employee training and results of their drills.
20
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
IT Audit Manual Volume. I
Audit of Application Control
1. The controls that provide assurance that all transactions are valid, authorised, complete and recorded are
a. General Controls b. Application Controls
c. Utility Controls d. All of the above
3. Before getting on to evaluation of application controls, it will be necessary for an IT auditor to secure a
reasonable understanding of the system by preparing a brief including the following
i. indicating the major transactions ii. describing the transaction flow and main output
iii. list of the IT personnel given with logical access to application
iv. indicating the major data files maintained
5. The objective of Input control is to ensure that the procedures and controls reasonably guarantee that
i. the data received for processing are genuine, complete, not previously processed, accurate and
properly authorised
ii. data are entered accurately and without duplication.
iii. data are entered timely and punctually.
iv. data entered are duly filtered by IT Steering Committee
7. While evaluating the input control mechanism, the IT auditor should ensure that
i. all prime input, including changes to standing data, is appropriately authorised.
ii. for on-line systems, the ability to enter data from a terminal is adequately restricted and controlled.
iii. if there is a method to prevent and detect duplicate processing of a source document.
iv. all authorised input has been submitted or, in an on-line system transmitted and there are procedures
for ensuring correction and resubmission of rejected data.
8. To place reliance on the automated controls the IT auditor would need to determine that the appropriate
levels of authority have been set up and that they have been working for the whole accounting period /
transaction cycle. This would involve except
a. looking at access matrices b. obtaining printout of user permissions
c. reviewing audit logs of changes in permissions
d. reviewing the output data to determine the genuineness of input data
10. A collection of input documents which are treated as one group is called
a. Block b. Batch
c. Class d. Bunch
11. Statement I- Where it is possible to by-pass input control mechanism by entering or altering data from
outside the application, there should be automatic application integrity checks which would detect and
report on any external changes to data.
Statement II-The results of the installation review should be reviewed to ensure that the use of system
amendment facilities, such as editors, is properly controlled
22
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
i. IT applications may have in-built controls which automatically check that data input is accurate and
valid. Validation may also be achieved by manual procedures such as double checking input
documents or review by a supervisor.
ii. The accuracy of data input to a system cannot be controlled by imposing a number of computerised
validity checks on the data presented to the system
iii. Automated validation checks should be sufficient to ensure that all data accepted into the system is
capable of acceptance by all subsequent processes, including acceptance into other systems where there
is an automatic transfer of data.
iv. Validation checks can reduce the risk of an application crashing because of logic errors arising when
attempting to process input data with values outside pre-defined limits
13. Format checks, validity checks, range checks, limit checks, check digits, compatibility checks, etc. are
some of programmed application controls pertaining to
a. Authorisation of input data b. Completeness of data input
c. validation of input data d. Matching of input data
15. While checking the rejected input, the IT auditor should ensure
i. that all data rejected will be subsequently corrected, re-input to and accepted by the system.
ii. that whether individual transactions or complete batches should be rejected will be determined by IT
auditor during the course of the audit.
iii. that placing of rejected items in suspense is in existence as it overcomes the possibility of rejected
items being lost
iv. Where items are held in suspense the auditor should review the procedures for identifying, correcting
and clearing these transactions.
16. Processing controls ensure complete and accurate processing of input and generated data. This objective
is achieved by providing controls for
i. adequately validating input and generated data,
ii. processing correct files
iii. detecting and rejecting errors during processing and thrashing them
iv. proper transfer of data from one processing stage to another
23
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
c. i, ii and iv d. All of the above
20. If output controls prevailing in the application are weak or are not appropriately designed these may lead
to risks of
i. repeated errors in the output generated leading to loss of revenue, loss of creditability of the system as
well as that of the organisation.
ii. availability of the data at the time when it is desired.
iii. availability of the data to an authorised person/user.
iv. even sometimes, the information which may be of very confidential nature may go to the wrong
hands.
21. Information stored in master and standing data files is usually critical to the processing and reporting of
financial and operational data. Information on master files can affect many related transactions and must
therefore be adequately protected. Weak Control in the system in maintenance of Master/Standing Data Files
may lead to except
a. unauthorised and uncontrolled amendments to the standing data as well as Master data files.
b. unrestricted and uncontrolled physical and logical access to the application data files.
c. poor documentation of the amendment procedures, etc.
d. none of the above
24
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
22. While checking the integrity and accuracy of Master Files and Standing Data, the IT auditor should ensure
that
i. amendments to standing data are properly authorised and controlled.
ii. integrity of Master and Standing Files is verified by checking, control totals and periodic reconciliation
with independently held records.
iii. amendment procedures are properly documented and controlled by management authorisation and
subsequent review
iv. physical and logical access to application data files are restricted and controlled.
a. the ability of end users to design and implement their own information system, utilizing computer
hardware products.
b. the ability of end users to design and implement their own information system, utilizing computer
software products.
c. is the ability of end users to design and implement their own information system, utilizing computer
hardware and software products.
d. is the ability of service provider to design and implement their own information system for the users,
utilizing computer hardware and software products.
24. The use of networks is increasing and bringing organisations the following benefits
i. ability to create beneficiaries
ii. the ability to use and share data and other peripherals
ii. to leave system administration to a central team
iv. allow users to send almost instantaneous messages and allow users to access the systems from
remote locations
25. Networks open up an organisation’s computer systems to a wide, potentially anonymous user base.
Where the organisation’s systems are connected to networks, there is potentially a greater risk of unauthorised
access by outsiders i.e. hackers and non-authorised employees, leading to
i. loss and corruption of data whether intentionally or in transmission
ii. fraud from internal as well as external sources
iii. system unavailability due to damage of network links, servers and communication lines etc.
iv. accidental and deliberate disclosure of confidential information
26. The links tend to have a higher capacity and they don’t require modems and do not suffer from digital to
analog conversion errors are
a. Analog links b. Digital link
c. Hybrid links d. None of the above
25
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
27. A modem that instead of answering an incoming call, requires the caller to enter a touch-tone code and
hang-up so that modem can return the call. When the modem receives the caller’s code against a stored set of
phone number. If the code matches an authorised number, the modem dials the number and then opens a
connection for the original caller is
a. Digital Modem b. Hybrid Modem
c. Call Back Modem d. Interactive Modem
29. The IT auditor should ensure that safety policy on network focuses on
i. physically isolate the machine from the main information system
ii. assign an experienced and trusted administrator to look after the Internet machine
iii. avoid anonymous access to the machine or, if it must be allowed, avoid setting up directories that can
be both read and written to
iv. close all necessary logical ports on the Internet server
32. i. firewall aims to help control traffic between the corporate network and the Internet
ii. A router can be set up to allow only specific Internet services between the gateway and other specified
Internet hosts.
iii. Software on the gateway host may provide additional services such as logging, authentication and
encryption, and packet filtering
iv. It is possible for an external computer on the Internet to pretend to be one of the computers on the
corporate network. One particular function of the firewall is to allow any external packets that claim to be
coming from the corporate network
Answers
Answer
Audit of General Controls
29
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
33. B Two broad types of activity: programming (systems and applications) and computer operations
34. C
35. D Other areas (i) media management (ii) job scheduling (iii) back-ups and disaster recovery (iv)
maintenance (vi) network monitoring and administration:
36. D Poorly controlled IT operation may lead to frequent and maximum disruption in processing.
37. B
38. B
39. C Other provisions are-Service hours (ii) User support level (iii) Performance i.e. response times,
turnaround times (iv) Contingency (v) Security and (vi) Restriction.
40. A IT is not seen as being a core business activity that’s why being outsourced.
41. B
42. B Outsourcing involves the risk of allowing a third party to have access to the business secrets,
important data and other related facts
43. C
44. A
45. B Correct and not-incorrect handling of data
46. D
47. C
48. A Separation of duties and not integration be done.
49. C Fire/water damage or damage from other natural disasters are environmental issues
50. D
51. C
52. D One to many, where the biometric input is compared with the data available in the system to
recognize the person and to give access
Many to one, where the identity of the person is disclosed first and then the biometric input is
compared to the specific data relating to that identity
53. B It depends on the location of computer system and not the office.
54. B
55. D The importance of logical access controls is increased where physical access controls are less
effective.
56. C
57. D Super-users enhance the risk and so management needs to have proper control of them.
In second case, the IT auditor may need to obtain additional support and assistance from an IT
auditor with the relevant skills and experience instead of relying upon Internal mechanism and
super-users
58. B Use of latest version tested periodically is an area associated with change control.
59. A System Software and Utilities consist of software such as editors, compilers, program debuggers.
Access to these should be restricted as these tools could be used to make amendments to data files
and application software.
60. C
61. B A system log can record who logged onto the system and what applications, data files or utilities
they used whilst logged on
62. D
63. C Other requirements-(i) Problem rectification (ii) to improve security (iii) Routine updates (iv)
Changes in requirements
64. D
65. A All changes to systems configurations are authorised, tested, documented, controlled, the systems
operate as intended and that there is an adequate audit trail of changes
66. B It will lead to erroneous processing and not error-free processing. Other risk areas
(i) Maintenance difficulties (ii) Use of unauthorised hardware and software (iii) Problems with
emergency changes.
67. C
30
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
68. A Thorough testing before and not after amended software is used in the live environment. In
addition it should also be ensured (i) Management review of the effects of any changes (ii)
Maintenance of adequate records and (iii) The preparation of fall-back plans
69. C
70. B All the RFC should be given a unique chronological reference number and not on the based on
sensitivity.
71. B The change board and steering committee make their views known via an individual given the
role of the change manager and not via Management.
72. C
73. D
74. D
Answer
Audit of Application Controls
31
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)
availability of the data to an unauthorised person/use are the risks.
21. D
22. D
23. B
24. A
25. C Other risk areas are virus and worm infections and contravention of copyright, data protection
(privacy) legislation,
26. B
27. C
28. A
29. A Close all unnecessary logical ports and not necessary ones.
30. D
31. C Firewalls consist of a combination of intelligent routers and gateway hosts. A router can be set
up to allow only specific Internet services between the gateway and other specified Internet
hosts. Software on the gateway host may provide additional services such as logging,
authentication and encryption, and packet filtering
32. D
33. C Symmetric encryption uses the same key for encryption and decryption. It is fast but makes key
distribution hard
Asymmetric encryption involves generating a pair of keys which are known as the public and
private keys. It is slow but does not suffer from the key distribution problems
34. B Audit Command Language. Notable audit software are-Applaud, Prospector, Sage Sterling and
CA Panaudit Plus.
32
Prepared by Deepak Kumar Rahi, AAO (LAD/Patna)