Auditing in A CIS Environment
Auditing in A CIS Environment
Auditing in A CIS Environment
1. In auditing through a computer, the test data method is used by the auditors to test the
Develop a program to compare credit limits with account balances and print out the
details of any account with a balance exceeding its credit limit.
4. The employee entered "40" in the "hours worked per day" field. Which check would
detect this unintentional error?
Limit check
5. Auditors often make use of computer programs that perform routine processing functions
such as sorting and merging. These programs are made available by electronic data
processing companies and others and are specifically referred to as
Utility programs
6. An auditor who wishes to capture an entity's data as transactions are processed and
continuously test the entity's computerized information system most likely would use
which of the following techniques?
The focus is more on the processing rather than the input and output components of the
system.
8. An auditor is least likely to find that a client's data is input through
Parallel simulation
5. Which of the following is not among the errors that an auditor might include in the test
data when auditing a client's computer system?
Numeric characters in alphanumeric fields
6. Auditing by testing the input and output of a computer system instead of the computer
program itself will
Not detect program errors which do not show up in the output sampled
7. An auditor estimates that 10,000 checks were issued during the accounting period. If a
computer application control which performs a limit check for each request is to be
subjected to the auditor's test data approach, the sample should include
One transaction
8. Which of the following is an example of auditing "around" the computer?
The auditor traces adding machine tapes of sales order batch totals to a computer
printout of the sales journal.
9. Which of the following strategies would a CPA most likely consider in auditing an entity
that processes most of its financial data only in electronic form, such as a paperless
system?
Continuous monitoring and analysis of transaction processing with an embedded audit
module
10. The following are benefits of using IT-based controls, except
Test data are processed by the client's computer programs under the auditor's control.
14. Output controls ensure that the results of computer processing are accurate, complete,
and properly distributed. Which of the following is not a typical output control?
Matching input data with information on master files and placing unmatched items in a
suspense file
15. Which of the following combinations is correct?
1) Integrated test facility
2) Test data
3) Paralel simulation
(1) Test data, live program; (2) Test data, live program; (3) Live data, test program
16. A retail entity uses electronic data interchange (EDI) in executing and recording most of
its purchase transactions. The entity's auditor recognized that the documentation of the
transactions will be retained for only a short period of time. To compensate for this
limitation, the auditor most likely would
Perform tests several times during the year, rather than only at year-end.
17. Parallel simulation is an audit technique employed to verify processing logic by making
use of audit test programs. These audit test programs "simulate" the processing logic of
an application program or programs under review. Which statement indicates the use of
parallel simulation audit technique?
Live transactions are processed using test programs
18. Which of the following statement is not true about test data?
Test data must consist of all possible valid and invalid conditions.
19.
Internal control in a CIS environment
1. In traditional information systems, computer operators are generally responsible for
backing up software and data files on a regular basis. In distributed or cooperative
systems, ensuring that adequate backups are taken is the responsibility of
User management
2. To reduce security exposure when transmitting proprietary data over communication
lines, a company should use
Cryptographic devices
3. A company using EDI (electronic data interchange) made it a practice to track the
functional acknowledgments from trading partners and to issue warning messages if
acknowledgments did not occur within a reasonable length of time. What risk was the
company attempting to address by this practice?
Working paper documentation may not contain readily observable details of calculations.
5. Which of the following procedures would an entity most likely include in its computer
disaster recovery plan?
Store duplicate copies of critical files in a location away from the computer center.
6. Adequate control over access to data processing may help deter improper use or
alteration of data files. The control can best be provided by
User and terminal identification controls, such as passwords
7. Totals of amounts in computer-record data fields, which are not usually added but are
used only for data processing control purposes are called
Hash totals
8. An auditor anticipates assessing control risk at a low level in a CIS environment. Under
these circumstances, on which of the following procedures would the auditor initially
focus?
Hot site
18. Client/server architecture may potentially involve a variety of hardware, systems
software, and application software from many vendors. The best way to protect a
client/server system from unauthorized access is through
A combination of application and general access control techniques
19. After the preliminary phase of the review of a client's computer controls, an auditor may
decide not to perform tests of controls (compliance tests) related to the controls within
the computer portion of the client's internal control. Which of the following would not be a
valid reason for choosing to omit such tests?
Change control
22. In planning the portions of the audit which may be affected by the client's CIS
environment, the auditor should obtain an understanding of the significance and
complexity of the CIS activities and the availability of data for use in the audit. The
following relate to the complexity of CIS activities except when
Establish a framework of overall controls over the CIS activities and to provide a
reasonable level of assurance that the overall objectives of internal control are achieved.
24. Mill Co. uses a batch processing method to process its sales transactions. Data on Mill's
sales transaction tape are electronically sorted by customer number and are subjected to
programmed edit checks in preparing its invoices, sales journals, and updated customer
account balances. One of the direct outputs of the creation of this tape most likely would
be a
Report showing exceptions and control totals
25. The auditor shall consider the entity's CIS environment in designing audit procedures to
reduce risk to an acceptably low level. Which of the following statements is incorrect?
The methods of applying audit procedures to gather audit evidence are not influenced by
the methods of computer processing.
26. Which of the following statements is correct concerning the security of messages in an
electronic data interchange (EDI) system?
Encryption controls may help to assure that messages are unreadable to unauthorized
persons.
28. An entity installed antivirus software on all its personal computers. The software was
designed to prevent initial infections, stop replication attempts, detect infections after
their occurrence, mark affected system components, and remove viruses from infected
components. The major risk in relying on antivirus software is that it may
Validity check
30. A corporation receives the majority of its revenue from top-an secret military contracts
with the government. Which of the following would be of greatest concern to an auditor
reviewing a policy about selling the company's used microcomputers to outside parties?
Whether deleted files on the hard disk drive have been completely erased
31. Preventing someone with sufficient technical skill from circumventing security
procedures and making changes to production programs is best accomplished by
Application controls
33. Computer program libraries can best be kept secure
Restricting physical and logical access
34. A clerk inadvertently entered an account number 12368 rather than account number
12638. In processing this transaction, the errors would be detected with which of the
following controls?
Self-checking digit
35. Which of the following would not be an appropriate procedure for testing the general
control activities of an information system?
Fixed asset transactions are few in number, but large in peso amount.
38. Matthews Corp. has changed from a system of recording time worked on clock cards to
a computerized payroll system in which employees record time in and out with magnetic
cards. The computer system automatically updates all payroll records. Because of this
change
The mainframe computer should subject the data to the same edits and validation
routines that online data entry would require.
42. An entity has recently converted its purchasing cycle from a manual process to an online
computer system. Which of the following is a probable result associated with conversion
to the new IT system?
Traditional duties are less separated.
43. An auditor would most likely be concerned with which of the following controls in a
distributed data processing system?
Access controls
44. The completeness test of computer-generated sales figures can be tested by comparing
the number of items listed on the daily sales report with the number of items billed on the
actual invoices. This process uses
Control totals
45. Which of the following is an encryption feature that can be used to authenticate the
originator of a document and ensure that the message is intact and has not been
tampered with?
Digital signatures
46. Which of the following is an example of a validity check?
The computer flags any transmission for which the control field value did not match that
of an existing file record.
47. The possibility of erasing a large amount of information stored on magnetic tape most
likely would be reduced by the use of
File protection rings
48. End-user computing is most likely to occur on which of the following types of computers?
Personal computers
49. Which of the following controls most likely would assure that an entity can reconstruct its
financial records?
Department numbers
54. The management of ABC Co. suspects that someone is tampering with pay rates by
entering changes through the Co.'s
remote terminals located in the factory. The method ABC Co. should implement to
protect the system from these unauthorized alterations to the system's files is
Passwords
55. End-user computing is an example of which of the following?
Decentralized processing
56. ABC Co. updates its accounts receivable master file weekly and retains the master files
and corresponding update transactions for the most recent 2-week period. The purpose
of this practice is to
The Internet is a private network that only allows access to authorized persons or
entities.
58. Choose the incorrect statement about General IT-controls?
They are manual or automated procedures that typically operate at a business process
level and apply to the processing of transactions by individual applications.
59. An entity should plan the physical location of its computer facility. Which of the following
is the primary consideration for selecting a computer site?
Error listing
61. A customer intended to order 100 units of product Z96014, but incorrectly ordered non-
existent product Z96015. Which of the following controls most likely would detect this
error?
Check digit verification
62. Internal control is ineffective when computer personnel
Originate changes in master files
63. A company is concerned that a power outage or disaster could impair the computer
hardware's ability to function as designed. The company desires off-site backup
hardware facilities that are fully configured and ready to operate within several hours.
The company most likely should consider a
Hot site
64. Which of the following presumptions is not correct?
The specific methods appropriate for implementing the basic auditing concepts do not
change, as systems become more complex.
65. To avoid invalid data input, a bank added an extra number at the end of each account
number and subjected the new number to an algorithm. This technique is known as
A check digit
66. General IT-controls do not include
Controls on procedures used to initiate, record, process and report transactions or other
financial data
67. Which of the following is not an example of an application control?
69. A company's management is concerned about computer data eavesdropping and wants
to maintain the confidentiality of its information as it is transmitted. The company should
utilize
Data encryption
70. Good planning will help an organization restore computer operations after a processing
outage. Good recovery planning should ensure that
Backup/restart procedures have been built into job streams and programs.
71.
Characteristics of CIS
1. Which of the following is least likely to be considered by an auditor considering
engagement of an information technology (IT) specialist on an audit?
Requirements to assess going concern status
2. Which of the following activities would most likely be performed in the CIS department?
4. The characteristics that distinguish computer processing from manual processing include
the following:
1)Computer processing uniformly subjects like transactions to the same instructions.
2) Computer systems always ensure that complete transaction trails useful for audit
purposes are preserved for indefinite purpose.
3) Computer processing virtually eliminates the occurrence of clerical errors normally
associated with manual processing.
4) Control procedures as to segregation of functions may no longer be necessary in
computer environment.
It is usually easier for unauthorized persons to access and alter the files.
11. The use of a computer changes the processing, storage, and communication of financial
information.
The overall objective and scope of an audit.
12. Which of the following is not an advantage of a computerized accounting system?