Audit in Cis
Audit in Cis
1 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
4. 4. The characteristics that distinguish computer pro- c. Only statements (1) and
cessing from manual processing include the follow- (3) are true
ing:
5. 5. Which of the following is not a risk specific to CIS b. Increased human in-
environments? volvement
8. 8. The use of CIS will least likely affect the b. The auditor's specific
audit objectives.
a. The procedures followed by the auditor in obtain-
ing a sufficient understanding of the accounting and
internal control systems.
b. The auditor's specific audit objectives.
c. The consideration of inherent risk and control risk
through which the auditor arrives at the risk assess-
ment.The auditor's design and performance of tests
3 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
a. Error listing
b. Flowchart
c. Questionnaires
d. Pre-numbered documents
10. 10. CIS has several significant effects on an organiza- d. None of the above; ie.,
tion. Which of the folowing would not be important they are all important.
from an auditing perspective?
a. organizational changes
b. the visibility of information
c. the potential for material misstatement
d. None of the above; ie., they are all important.
a. Administrative
b. Specific
c. Application
d. Authorization
4 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
a. Systems control
b. General control
c. Applications control
d. Universal control
13. 13. Controls which apply to a specific use of the system c. Applications controls.
are called
a. Systems controls
b. General controls.
c. Applications controls.
d. User controls.
14. 14. Some CIS control procedures relate to all CIS ac- c. Controls for document-
tivities (general controls) and some relate to specific ing and approving pro-
tasks (application controls).General controls include grams and changes to
programs.
a. Controls designed to ascertain that all data submit-
ted to CIS for processing have been properly autho-
rized.
b. Controls that relate to the correction and resubmis-
sion of data that were initially incorrect.
c. Controls for documenting and approving programs
and changes to programs.
d. Controls designed to assure the accuracy of the
processing results.
15. 15. Which of the following statements is correct? c. Auditors should evalu-
ate general controls be-
a. Auditors should evaluate application controls be-
5 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
16. 16. Which of the following is a component of general c. Back-up and contin-
controls? gency planning
a. Processing controls
b. Output controls
c. Back-up and contingency planning
d. Input controls
17. 17. Which of the following is least likely to be a general d. A control total.
control over computer activities?
6 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
20. 20. Which of the following activities would most likely b. Conversion of informa-
be performed in the CIS department? tion to machine-readable
form.
a. Initiation of changes to master records
b. Conversion of information to machine-readable
form.
c. Correction of transactional errors.
d. Initiation of changes to existing applications.
21. 21. Which of the following IT duties should be separat- d. All of the above should
ed from the others? be separated
a. Systems development
b. Operations
c. IT management
d. All of the above should be separated
22. 22. For control purposes, which of the following b. Systems development
should be organizationally segregated from the com-
puter operations functions?
a. Data conversion
b. Systems development
7 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
23. 23. Which of the following computer related employ- c. The operator.
ees should not be allowed access to program listings
of application programs?
24. 24. Which of the following statements about general d. Programmers should
controls is not correct? have access to computer
operations to aid users in
a. Backup and disaster recover plans should identify resolving problems.
alternative hardware to process company data.
b. Successful IT development efforts require the in-
volvement of IT and non-IT personnel.
c. The chief information officer should report to senior
management. and the board.
d. Programmers should have access to computer op-
erations to aid users in resolving problems.
25. 25. Where computers are used, the effectiveness of c. Systems analyst and
internal control depends, in part, upon whether the programmer
organizational structure includes any incompatible
combinations. Such a combination would exist when
there is no separation of the duties between.
26. 26. Which of the following is a general control that c. Systems documenta-
would most likely assist an entity whose system ana- tion.
lyst left the entity in the middle of a major project?
27. 27. Internal control is ineffective when computer de- c. Originate changes in
partment personnel master files.
a. Check digit.
b. Password.
c. Test facility.
d. Read only memory.
29. 29. Access control in an on-line CIS can best be provid- d. User and terminal iden-
ed in most circumstancesby tification controls, such as
passwords.
a. An adequate librarianship function controlling ac-
cess to files.
9 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
30. 30. Controls which are built in by the manufacturer to c. Hardware controls.
detect equipment failure are called:
a. Input controls.
b. Data integrity controls.
c. Hardware controls.
d. Manufacturer's controls.
31. 31. In a CIS environment, automated equipment con- c. Detect and control er-
trols or hardware controls are designed to: rors arising from the use
of equipment.
a. Correct errors in the computer programs.
b. Monitor and detect errors in source documents.
c. Detect and control errors arising from the use of
equipment.
d. Arrange data in a logical sequential manner for
processing purposes.
32. 32. To determine that user ID and password controls a. Test the system by at-
are functioning, an auditor would most likely: tempting to sign on using
invalid user identifications
a. Test the system by attempting to sign on using and passwords.
invalid user identifications and passwords.
b. Write a computer program that simulates the logic
of the client's access control software.
c. Extract a random sample of processed transactions
10 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
33. 33. Adequate control over access to data processing is a. Deter improper use or
required to manipulation of data files
and programs.
a. Deter improper use or manipulation of data files
and programs.
b. Ensure that only console operators have access to
program documentation.
c. Minimize the need for backup data files.
d. Ensure that hardware controls are operating effec-
tively and as designed by the computer manufacturer.
34. 34. The management of ZNVS Co. suspects that some- c. Passwords
one is tampering with pay rates by entering changes
through the Co.'s remote terminals located in the fac-
tory. The method ZNVS Co. should implement to pro-
tect the system from these unauthorized alterations
to the system's files is
a. Batch totals
b. Checkpoint recovery
c. Passwords
d. Record count
35. 35. Passwords for microcomputer software programs d. Unauthorized use of the
are designed to prevent: software.
36. 36. The possibility of losing a large amount of infor- a. Back-up files
mation stored in computer. files most likely would be
reduced by the use of
a. Back-up files
b. Check digits
c. Completeness tests
d. Conversion verification.
37. 37. Which of the following controls most likely would b. Backup diskettes or
assure that an entity can reconstruct its financial tapes of files are stored
records? away from originals.
38. 38. Unauthorized alteration of on-line records can be d. Data base access con-
prevented by employing: trols
a. Key verification.
b. Computer sequence checks
c. Computer matching
d. Data base access controls
12 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
39. 39. XYZ Company updates its accounts receivable c. Permit reconstruction of
master file weekly and retains the master files and cor- the master file if needed.
responding update transactions for the most recent
2-week period. The purpose of this practice is to
40. 40. Which of the following is not a general control? c. Output controls
a. Separation of duties
b. Systems development.
c. Output controls
d. Hardware controls
41. 41. General controls include all of the following ex- c. Check digit
cept:
a. Systems development.
b. Online security.
c. Check digit
d. Hardware controls.
42. 42. Which of the following is not a general control? a. Computer performed
validation tests of input
a. Computer performed validation tests of input accu- accuracy
racy
b. Equipment failure causes error messages on moni-
tor
13 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
43. 43. Controls which are designed to assure that the a. Input controls
information processed by the computer is authorized,
complete, and accurate are called
a. Input controls
b. Output controls
c. Processing controls
d. General controls
44. 44. Which of the following statements related to appli- d. Application controls re-
cation controls is correct? late to the processing of
individual transactions.
a. Application controls relate to various aspects of the
CIS operation including software acquisition and the
processing of transactions.
b. Application controls relate to various aspects of
the CIS operation including physical security and the
processing of transactions in various cycles.
c. Application controls relate to all aspects of the CIS
operation.
d. Application controls relate to the processing of in-
dividual transactions.
45. 45. Which of the following is not an example of an a. Back-up of data to a re-
applications control? mote site for data security.
transactions.
c. There are reasonableness tests for the unit selling
price of a sale.
d. After processing, all sales transactions are reviewed
by the sales department.
47. 47. Which of the following statements related to appli- d. Application controls re-
cation controls is correct? late to the processing of
individual transactions.
a. Application controls relate to various aspects of
the IT function including software acquisition and the
processing of transactions.
b. Application controls relate to various aspects of the
IT function including physical security and the pro-
cessing of transactions in various cycles.
c. Application controls relate to all aspects of the IT
function.
d. Application controls relate to the processing of in-
dividual transactions.
a. Control risk
b. Reasonable test
c. Check digits
d. Control total
49. 49. When CIS programs or files can be accessed from b. Personal identification
terminals, users should be required to enter a(n) code.
a. Parity check.
b. Personal identification code.
c. Self-diagnosis test.
d. Echo check.
51. 51. Controls which are designed to assure that the a. Input controls.
data that will be processed by the computer is autho-
rized, complete, and accurate are called:
a. Input controls.
b. Processing controls.
16 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
c. Output controls.
d. General controls.
a. Check digits
b. Validity tests.
c. Control totals.
d. Process tracing data.
a. Completeness test.
b. Validity test.
c. Limit test.
d. Control total.
54. 54. When an on-line, real-time (OLRT) system is in use, d. Making a validity check
control over input data can be strengthened by of an identification num-
ber before a user can ob-
a. Providing for the separation of duties between key tain access to the comput-
punching and error listing operations. er files.
b. Attaching plastic file protection rings to reels of
magnetic tape before new data can be entered on the
file.
c. Preparing batch totals to provide assurance that file
17 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
55. 55. A company uses the account code 669 for mainte- d. Valid-code test.
nance expense. However, one of the company clerks
often codes maintenance expense as 996. The highest
account code in the system is 750. What would be the
best internal control check to build into the company's
computer program to detect this error?
56. 56. Which of the following is not an application con- d. Separation of duties
trol? between computer pro-
grammer and operators.
a. Preprocessing authorization of sales transactions
b. Reasonableness test for unit selling price of sale.
c. Post-processing review of sales transactions by the
sales department.
d. Separation of duties between computer program-
mer and operators.
57. 57. Which of the following is correct? d. Check digits are de-
signed to detect transcrip-
a. Check digits should be used for all data codes. tion errors.
b. Check digits are always placed at the end of a data
code.
18 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
a. Batch total
b. Key verifying
c. Self-checking digit
d. An internal consistency check
a. Records totals
b. Hash totals
c. Processing data totals
d. Field totals.
a. Net pay.
b. Hours worked.
c. Department numbers.
d. Total debits and total credits.
61.
19 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
61. In updating a computerized accounts receivable c. The sum of the cash de-
file, which one of the following would be used as a posits less the discounts
batch control to verify the accuracy of the posting of taken by customers.
cash receipts remittances?
62. 62. Which statement is NOT correct? The goal of batch b. Transactions are
controls is to ensure that during processing processed more than
once.
a. Transactions are not omitted.
b. Transactions are processed more than once.
c. Transactions are not added
d. An audit trail is created.
64. 64. The employee entered "40" in the "hours worked b. Limit check
per day" field. Which check would detect this uninten-
tional error?
20 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
a. Numeric/alphabetic check
b. Limit check
c. Sign check
d. Missing data check
65. 65. Output controls are not designed to assure that d. Used appropriately by
information generated by the computer are: management.
a. Accurate.
b. Distributed only to authorized people.
c. Complete.
d. Used appropriately by management.
66. 66. Output controls necd to be designed for which of a. Detecting errors after
the following data integrity objectives? the processing is complet-
ed
a. Detecting errors after the processing is completed
b. Preventing ettors before the processing is complet-
ed
c. Detecting errors in the general ledger adjustment
process
d. Preventing errors in separation of duties for CIS
personnel
a. A storage/retention control.
b. An output review control.
c. A spooler file control.
d. A report distribution control.
21 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
68. 68. The most important output control is b. Review of the data for
reasonableness by some-
a. Distribution control, which assures that only autho- one who knows what the
rized personnel receive the reports generated by the output should look like.
system.
b. Review of the data for reasonableness by someone
who knows what the output should look like.
c. Control totals, which are used to verify that the
computer's results are correct.
d. Logic tests, which verify that no mistakes were
made in processing.
69. 69. Which of the following is not an application con- b. Hardware controls
trol?
a. Processing controls
b. Hardware controls
c. Output control
d. Input controls
70. 70. Which of the following is likely to be of least impor- d. The cost/benefit of data
tance to an auditor in considering the internal control processing operations.
in a company with computer processing?
71. 71. Controls over output are not designed to assure d. Relevant
that data generated by the computer are
22 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
a. Accurate
b. Distributed only to authorized people
c. Complete
d. Relevant
72. 72. Most auditors evaluate application and general b. Most auditors evaluate
contiols in what manner? the effectiveness of gen-
eral controls before evalu-
a. Most auditors evaluate application and general con- ating application controls.
trols simultaneously.
b. Most auditors evaluate the effectiveness of general
controls before evaluating application controls.
c. Most auditors evaluate the effectiveness of applica-
tion controls before evaluating general controls.
d. Most auditors evaluate application and general con-
trols only if they do not intend to rely on systems
controls
73. 73. In their consideration of a client's CIS controls, the b. Hash total.
auditors will encounter general controls and applica-
tion controls. Which of the following is an application
control?
74. 74. Which of the following is not a general control? a. Reasonableness test for
unit selling price of a sale.
a. Reasonableness test for unit selling price of a sale.
b. Equipment failure causes error messages on moni-
23 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
tor.
c. Separation of duties between programmer and op-
erators.
d. Adequate program run instructions for operating
the computer.
75. 75. It involves pplication of audiing procedures using b. Computer assisted au-
the computer as an audirtool. This includes computer dit technique
programs and data the auditor uses as part of the
audit procedures to process data of audit significance
contained in an entity's information systems.
76. 76. The process of assessing control risk considering c. Auditing around the
only non IT controls is known as? computer.
77. 77. When auditing "around" the computer, the inde- d. CIS output
pendent auditor focuses solely upon the source doc-
uments and
a. Test data
b. CIS processing
c. Compliance techniques
d. CIS output
24 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
78. 78. Which of the following CIS generally can be audit- a. A system that per-
ed without examining or directly testing the computer forms relatively uncompli-
programs of the system? cated processes and pro-
duces detail output
a. A system that performs relatively uncomplicated
processes and produces detail output
b. A system that affects a number of essential master
files and produces no a limited output c. A system that
updates a few essential master files and produces no
printed output other than final balances
d. A system that uses an on-line real-time processing
feature.
79. 79. When the client uses a computer but the auditor a. Computer programs
chooses to use only the non-IT segment of internal must be available in Eng-
control to assess control risk, it is referred to as au- lish
diting around the computer. Which one of the follow-
ing conditions need not be present in order to audit
around the computer?
80. 80. Which of the following is not a characteristic of a c. The posting of a trans-
batch-processed computersystem? action, as it occurs, to sev-
eral files, without interme-
a. The production of numerous printouts. diate printouts.
25 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
81. 81. Which of the following procedures is an example a. The auditor traces
of auditing "around" the computer? adding machine tapes of
sales order batch totals to
a. The auditor traces adding machine tapes of sales a computer printout of the
order batch totals to a computer printout of the sales sales journal.
journal.
b. The auditor develops a set of hypothetiçal sales
transactions and, using the client's computer pro-
gram, enters the transactions into the system and
observes the processing flow.
c. The auditor enters hypothetical transactions into
the client's processing system during client process-
ing of live" data.
d. The auditor observes client personnel as they
process the biweekly payroll. The auditor is primarily
concerned with computer rejection of data that fails
to meet reasonableness limits.
82. 82. A disadvantage of auditing around the computer a. Permits no direct as-
is that it sessment of actual pro-
cessing.
a. Permits no direct assessment of actual processing.
b. Requires highly skilled auditors.
c. Demands intensive use of machine resources. d.
Interacts actively with auditee applications.
26 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
83. 83. Auditing by testing the input and output of an IT a. Not detect program er-
system instead of computer program itself will rors which do not show up
in the output sampled.
a. Not detect program errors which do not show up in
the output sampled.
b. Detect all program errors, regardless of the nature
of the output
c. Provide the auditor with the same type of evidence.
d. Not provide the auditor with confidence in the re-
sults of the auditing procedures.
84. 84. Which of the following is NOT a common type of b. Auditing around the
white box approach? computer
a. Test data
b. Auditing around the computer
c. Integrated test facility
d. Parallel simulation
27 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
86. 86. Which of the following best describes the test data a. Auditors process their
approach? own test data using the
clients computer system
a. Auditors process their own test data using the and application program
clients computer system and application program
b. Auditors process their own test data using their own
computers that simulate the client's computer system
c. Auditors use auditor-controlled software to do the
same operations that the client's software does, using
the same data files
d. Auditors use client-controlled software to do the
same operations that the client's software does, using
auditor created data files
88. 88. Creating simulated transactions that are b. Use of test data.
processed through a system to generate results that
are compared with predetermined results, is an audit-
28 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
a. Program checking
b. Use of test data.
c. Completing outstanding jobs.
d. Parallel simulation.
89. 89. An auditor estimates that 10,000 checks were is- d. One transaction
sued during the accounting period. If a computer ap-
plication control which performs a limit check for each
check request is to be subjected to the auditor's test
data approach, the sample should include
90. 90. An integrated test facility (IT) would be appropriate b. Verify processing ac-
when the auditor needs to curacy concurrently with
processing.
a. Trace a complex logic path through an application
system.
b. Verify processing accuracy concurrently with pro-
cessing.
c. Monitor transactions in an application system con-
tinuously.
d. Verify load module integrity for production pro-
grams.
92. 92. When an auditor tests a computerized accounting d. Test data should include
system, which of the following is true of the test data data that the clients sys-
approach? tem should accept or re-
ject
a. Several transactions of each type must be tested
b. Test data must consist of all possible valid and in-
valid conditions
c. The program tested is different from the program
used throughout the year by the client
d. Test data should include data that the clients system
should accept or reject
93. 93. Which of the following statements is not true to c. The test data must
the test data approach when testing a computerized cousist of all possible valid
accounting system? and invalid conditions
94. 94. In auditing through a computer, the test data c. Procedures contained
method is used by auditors to test the within the program.
95. 95. An auditor who is testing IT controls in a payroll a. Time tickets with invalid
system would most likely use test data that contain job numbers
conditions such as
96. 96. Which of the following computer-assisted auditing c. Integrated test facility.
techniques allows fictitious and real transactions to be
processed together without client ocrating personnel
being aware of the testing process?
a. Parallel simulation.
b. Generalized audit software programming.
c. Integrated test facility.
d. Test data approach.
97. 97. A primary reason auditors are reluctant to use an d. Identify and reverse the
ITF is that it requires them to fictitious entries to avoid
contamination of the mas-
a. Reserve specific master file records and process ter file
them at regular intervals
31 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
98. 98. Which of the following is a disadvantage of the b. Removing the fictitious
integrated test facility approach? transactions from the sys-
tem is somewhat difficult
a. In establishing fictitious entities, the auditor may be and, if not done careful-
compromising audit independence. ly, may contaminate the
b. Removing the fictitious transactions from the sys- client's
tem is somewhat difficult and, if not done carefully,
may contaminate the client's
c. ITF is simply an automated version of auditing
"around" the computer.
d. The auditor may not always have a current copy of
the authorized version of the client's program.
99. 99. The audit approach in which the auditor runs b. The generalized audit
his/her own program on a controlled basis in order software approach.
to verify the client's data recorded in a machine lan-
guage is
limit, and account balance. The auditor wishes to test print out the details of any
this file to determine whether credit limits are being account with a balance ex-
exceeded. The best procedure for the auditor to follow ceeding its credit limit.
would be to:
101. 101. Which of the following methods of testing appli- a. Parallel simulation
cation controls utilizes a generalized audit software
package prepared by the auditors?
a. Parallel simulation
b. Integrated testing facility approach
c. Test data approach
d. Exception report tests
102. 102. This question is based on the following flowchart: b. Parallel simulation
This flowchart depicts (dili ma insert and flowchart kay
free version ra)
33 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
103. 103. When performing a parallel simulation the audi- b. Can be applied to a vari-
tor may use generalized audit software (GAS). Which ety of client's after detailed
of the following is not seen as an advantage to using customizations
GAS?
104. 104. Parallel simulation is an audit technique em- d. Live transactions are
ployed to verify processing by making use of audit processed using test pro-
test programs. These audit test programs "simulate" grams.
the processing logic of an application program or
progress under review. Which statement indicates the
use of parallel simulation audit techniques?
105. 105. Which of the following is not one of the three cat- a. Pilot simulation
egories of testing strategies when auditing through
34 / 35
AUDIT IN CIS ENVIRONMENT - SALOSAGCOL
Study online at https://quizlet.com/_gtn4la
the computer?
a. Pilot simulation
b. Parallel simulation
c. Test data approach
d. Embedded audit module
106. 106. Which of the following computer-assisted audit- c. Embedded audit mod-
ing techniques inserts an audit module in the client's ule
application system to identify specific types of trans-
actions?
35 / 35