Auditing Theory
Auditing Theory
Auditing Theory
3. Which of the following is least considered if the auditor has to determine whether
specialized
CIS skills are needed in an audit?
a. The auditor needs to obtain a sufficient understanding of the accounting and internal
control
system affected by the CIS environment.
b. The auditor needs to determine the effect of the CIS environment on the assessment
of
overall risk and of risk at the account balance and class of transactions level.
c. Design and perform appropriate tests of controls and substantive procedures.
d. The need of the auditor to make analytical procedures during the completion stage of
audit.
7. Which of the following is least likely a risk characteristic associated with CIS
environment?
a. Errors embedded in an application’s program logic maybe difficult to manually detect
on a
timely basis.
b. Many control procedures that would ordinarily be performed by separate individuals in
manual system maybe concentrated in CIS.
c. The potential unauthorized access to data or to alter them without visible evidence
maybe
greater.
d. Initiation of changes in the master file is exclusively handled by respective users.
8. Which of the following significance and complexity of the CIS activities should an
auditor least
understand?
a. The organizational structure of the client’s CIS activities.
b. Lack of transaction trails.
c. The significance and complexity of computer processing in each significant accounting
application.
d. The use of software packages instead of customized software.
12. Which of the following is the least likely characteristic of personal computers?
a. They are small enough to be transportable.
b. They are relatively expensive.
c. They can be placed in operation quickly.
d. The operating system software is less comprehensive than that found in larger
computer
environments.
17. Personal computers are susceptible to theft, physical damage, unauthorized access
or misuse
of equipment. Which of the following is least likely a physical security to restrict access
to
personal computers when not in use?
a. Using door locks or other security protection during non-business hours.
b. Fastening the personal computer to a table using security cables.
c. Locking the personal computer in a protective cabinet or shell.
d. Using anti-virus software programs.
18. Which of the following is not likely a control over removable storage media to prevent
misplacement, alteration without authorization or destruction?
a. Using cryptography, which is the process of transforming programs and information
into an
unintelligible form.
b. Placing responsibility for such media under personnel whose responsibilities include
duties
of software custodians or librarians.
c. Using a program and data file check-in and check-out system and locking the
designated
storage locations.
d. Keeping current copies of diskettes, compact disks or back-up tapes and hard disks in
a
fireproof container, either on-site, off-site or both.
19. Which of the following least likely protects critical and sensitive information from
unauthorized
access in a personal computer environment?
a. Using secret file names and hiding the files.
b. Keeping of back up copies offsite.
c. Employing passwords.
d. Segregating data into files organized under separate file directories.
20. It refers to plans made by the entity to obtain access to comparable hardware,
software and
data in the event of their failure, loss or destruction.
a. Back-up b. Encryption c. Anti-virus d. Wide Area Network (WAN)
21. The effect of personal computers on the accounting system and the associated risks
will least
likely depend on
a. The extent to which the personal computer is being used to process accounting
applications.
b. The type and significance of financial transactions being processed.
c. The nature of files and programs utilized in the applications.
d. The cost of personal computers.
22. The auditor may often assume that control risk is high in personal computer systems
since , it
may not be practicable or cost-effective for management to implement sufficient controls
to
reduce the risks of undetected errors to a minimum level. This least likely entail
a. More physical examination and confirmation of assets.
b. More analytical procedures than tests of details.
c. Larger sample sizes.
d. Greater use of computer-assisted audit techniques, where appropriate.
23. Computer systems that enable users to access data and programs directly through
workstations are referred to as
a. On-line computer systems c. Personal computer systems
b. Database management systems (DBMS) d. Database systems
24. On-line systems allow users to initiate various functions directly. Such functions
include:
I. Entering transactions III. Requesting reports
II. Making inquiries IV. Updating master files
a. I, II, III and IV c. I and II
b. I, II and III d. I and IV
25. Many different types of workstations may be used in on-line computer systems. The
functions
performed by these workstations least likely depend on their
a. Logic b. Transmission c. Storage d. Cost
26. Types of workstations include General Purpose Terminals and Special Purpose
Terminals.
Special Purpose Terminals include
a. Basic keyboard and monitor c. Point of sale devices
b. Intelligent terminal d. Personal computers
27. Special Purpose Terminal used to initiate, validate, record, transmit and complete
various
banking transactions
a. Automated teller machines c. Intelligent terminal
b. Point of sale devices d. Personal computers
33. A type of network that multiple buildings are close enough to create a campus, but
the space
between the buildings is not under the control of the company is
a. Local Area Network (LAN) c. Metropolitan Area Network (MAN)
b. Wide Area Network (WAN) d. World Wide Web (WWW)
34. Which of the following is least likely a characteristic of Wide Area Network (WAN)?
a. Created to connect two or more geographically separated LANs.
b. Typically involves one or more long-distance providers, such as a telephone company
to
provide the connections.
c. WAN connections tend to be faster than LAN.
d. Usually more expensive than LAN.
35. Gateway is
a. A hardware and software solution that enables communications between two
dissimilar
networking systems or protocols.
b. A device that forwards frames based on destination addresses.
c. A device that connects and passes packets between two network segments that use
the
same communication protocol.
d. A device that regenerates and retransmits the signal on a network.
36. A device that works to control the flow of data between two or more network
segments
a. Bridge b. Router c. Repeater d. Switch
37. The undesirable characteristics of on-line computer systems least likely include
a. Data are usually subjected to immediate validation checks.
b. Unlimited access of users to all of the functions in a particular application.
c. Possible lack of visible transaction trail.
d. Potential programmer access to the system.
38. Certain general CIS controls that are particularly important to on-line processing
least likely
include
a. Access controls.
b. System development and maintenance controls.
c. Edit, reasonableness and other validation tests.
d. Use of anti-virus software program.
39. Certain CIS application controls that are particularly important to on-line processing
least likely
include
a. Pre-processing authorization. c. Transaction logs.
b. Cut-off procedures. d. Balancing.
40. Risk of fraud or error in on-line systems may be reduced in the following
circumstances, except
a. If on-line data entry is performed at or near the point where transactions originate,
there is
less risk that the transactions will not be recorded.
b. If invalid transactions are corrected and re-entered immediately, there is less risk that
such
transactions will not be corrected and re-submitted on a timely basis.
c. If data entry is performed on-line by individuals who understand the nature of the
transactions involved, the data entry process may be less prone to errors than when it is
performed by individuals unfamiliar with the nature of the transactions.
d. On-line access to data and programs through telecommunications may provide
greater
opportunity for access to data and programs by unauthorized persons.
41. Risk of fraud or error in on-line computer systems may be increased for the following
reasons,
except
a. If workstations are located throughout the entity, the opportunity for unauthorized use
of a
workstation and the entry of unauthorized transactions may increase.
b. Workstations may provide the opportunity for unauthorized uses such as modification
of
previously entered transactions or balances.
c. If on-line processing is interrupted for any reason, for example, due to faulty
telecommunications, there may be a greater chance that transactions or files may be lost
and that the recovery may not be accurate and complete.
d. If transactions are processed immediately on-line, there is less risk that they will be
processed in the wrong accounting period.
42. The following matters are of particular importance to the auditor in an on-line
computer system, except
a. Authorization, completeness and accuracy of on-line transactions.
b. Integrity of records and processing, due to on-line access to the system by many
users and
programmers.
c. Changes in the performance of audit procedures including the use of CAAT's.
d. Cost-benefit ratio of installing on-line computer system.
43. A collection of data that is shared and used by a number of different users for
different
purposes.
a. Database b. Information file c. Master file d. Transaction file
46. Due to data sharing, data independence and other characteristics of database
systems
a. General CIS controls normally have a greater influence than CIS application controls
on
database systems.
b. CIS application controls normally have a greater influence than general CIS controls
on
database systems.
c. General CIS controls normally have an equal influence with CIS application controls
on
database systems.
d. CIS application controls normally have no influence on database systems.
47. Which statement is incorrect regarding the general CIS controls of particular
importance in a
database environment?
a. Since data are shared by many users, control may be enhanced when a standard
approach
is used for developing each new application program and for application program
modification.
b. Several data owners should be assigned responsibility for defining access and
security
rules, such as who can use the data (access) and what functions they can perform
(security).
c. User access to the database can be restricted through the use of passwords.
d. Responsibilities for performing the various activities required to design, implement and
operate a database are divided among technical, design, administrative and user
personnel.
48. These require a database administrator to assign security attributes to data that
cannot be
changed by database users.
a. Discretionary access controls c. Name-dependent restrictions
b. Mandatory access controls d. Content-dependent restrictions.
49. A discretionary access control wherein users are permitted or denied access to data
resource
depending on the time series of accesses to and actions they have undertaken on data
resources.
a. Name-dependent restrictions c. Context-dependent restriction
b. Content-dependent restriction d. History-dependent restriction
50. The effect of a database system on the accounting system and the associated risks
will least
likely depend on:
a. The extent to which databases are being used by accounting applications.
b. The type and significance of financial transactions being processed.
c. The nature of the database, the DBMS, the database administration tasks and the
applications.
d. The CIS application controls.
PAPS 1008 – Risk Assessments and Internal Control – CIS Characteristics and
Considerations
53. System characteristics that may result from the nature of CIS processing include,
except
a. Absence of input documents.
b. Lack of visible transaction trail.
c. Lack of visible output.
d. Difficulty of access to data and computer programs.
54. The development of CIS will generally result in design and procedural characteristics
that are
different from those found in manual systems. These different design and procedural
aspects
of CIS include, except:
a. Consistency of performance.
b. Programmed control procedures.
c. Vulnerability of data and program storage media
d. Multiple transaction update of multiple computer files or databases.
58. Which statement is incorrect regarding the review of general CIS controls and CIS
application
controls?
a. The auditor should consider how these general CIS controls affect the CIS
applications
significant to the audit.
b. General CIS controls that relate to some or all applications are typically
interdependent
controls in that their operation is often essential to the effectiveness of CIS application
controls.
c. Control over input, processing, data files and output may be carried out by CIS
personnel,
by users of the system, by a separate control group, or may be programmed into
application software.
d. It may be more efficient to review the design of the application controls before
reviewing the
general controls.
59. Which statement is incorrect regarding the evaluation of general CIS controls and
CIS
application controls?
a. The general CIS controls may have a pervasive effect on the processing of
transactions in
application systems.
b. If general CIS controls are not effective, there may be a risk that misstatements might
occur
and go undetected in the application systems.
c. Manual procedures exercised by users may provide effective control at the application
level.
d. Weaknesses in general CIS controls cannot preclude testing certain CIS application
controls.
60. The applications of auditing procedures using the computer as an audit tool refer to
a. Integrated test facility c. Auditing through the computer
b. Data-based management system d. Computer assisted audit techniques
QUIZZERS
1. An internal auditor noted the following points when conducting a preliminary survey in
connection with the audit of an EDP department. Which of the following would be
considered a
safeguard in the control system on which the auditor might rely?
a. Programmers and computer operators correct daily processing problems as they
arise.
b. The control group works with user organizations to correct rejected input.
c. New systems are documented as soon as possible after they begin processing live
data.
d. The average tenure of employees working in the EDP department is ten months.
2. An on-line access control that checks whether the user’s code number is authorized to
initiate a
specific type of transaction or inquiry is referred to as
a. Password c. Compatibility test
b. Limit check d. Reasonableness test
7. Most of today’s computer systems have hardware controls that are built in by the
computer
manufacturer. Common hardware controls are
a. Duplicate circuitry, echo check, and internal header labels
b. Tape file protection, cryptographic protection, and limit checks
c. Duplicate circuitry, echo check, and dual reading
d. Duplicate circuitry, echo check, tape file protection, and internal header labels
8. Computer manufacturers are now installing software programs permanently inside the
computer as part of its main memory to provide protection from erasure or loss if there is
interrupted electrical power. This concept is known as
a. File integrity c. Random access memory (RAM)
b. Software control d. Firmware
13. The most critical aspect regarding separation of duties within information systems is
between
a. Project leaders and programmers c. Programmers and systems analysts
b. Programmers and computer operators d. Data control and file librarians
14. Whether or not a real time program contains adequate controls is most effectively
determined
by the use of
a. Audit software c. A tracing routine
b. An integrated test facility d. A traditional test deck
16. Which one of the following input validation routines is not likely to be appropriate in a
real time
operation?
a. Field check c. Sequence check
b. Sign check d. Redundant data check
17. Which of the following controls is a processing control designed to ensure the
reliability and
accuracy of data processing?
Limit test Validity check test
a. Yes Yes
b. No No
c. No Yes
d. Yes No
19. Which of the following most likely represents a significant deficiency in the internal
control
structure?
a. The systems analyst review applications of data processing and maintains systems
documentation.
b. The systems programmer designs systems for computerized applications and
maintains
output controls.
c. The control clerk establishes control over data received by the EDP department and
reconciles control totals after processing
d. The accounts payable clerk prepares data for computer processing and enters the
data into
the computer.
20. Which of the following activities would most likely be performed in the EDP
Department?
a. Initiation of changes to master records.
b. Conversion of information to machine-readable form.
c. Correction of transactional errors.
d. Initiation of changes to existing applications.
21. For control purposes, which of the following should be organizationally segregated
from the
computer operations function?
a. Data conversion c. Systems development
b. Surveillance of CRT messages d. Minor maintenance according to a schedule
22. Which of the following is not a major reason for maintaining an audit trail for a
computer
system?
a. Deterrent to irregularities c. Analytical procedures
b. Monitoring purposes d. Query answering
23. In an automated payroll system, all employees in the finishing department were paid
the rate of
P75 per hour when the authorized rate was P70 per hour. Which of the following controls
would have been most effective in preventing such an error?
a. Access controls which would restrict the personnel department’s access to the payroll
master file data.
b. A review of all authorized pay rate changes by the personnel department.
c. The use of batch control totals by department.
d. A limit test that compares the pay rates per department with the maximum rate for all
employees.
25. The use of a header label in conjunction with magnetic tape is most likely to prevent
errors by
the
a. Computer operator c. Computer programmer
b. Keypunch operator d. Maintenance technician
26. For the accounting system of ACME Company, the amounts of cash disbursements
entered
into an EDP terminal are transmitted to the computer that immediately transmits the
amounts
back to the terminal for display on the terminal screen. This display enables the operator
to
a. Establish the validity of the account number
b. Verify the amount was entered accurately
c. Verify the authorization of the disbursements
d. Prevent the overpayment of the account
27. When EDP programs or files can be accessed from terminals, users should be
required to
enter a(an)
a. Parity check c. Self-diagnostic test
b. Personal identification code d. Echo check
28. The possibility of erasing a large amount of information stored on magnetic tape
most likely
would be reduced by the use of
a. File protection ring c. Completeness tests
b. Check digits d. Conversion verification
29. Which of the following controls most likely would assure that an entity can
reconstruct its
financial records?
a. Hardware controls are built into the computer by the computer manufacturer.
b. Backup diskettes or tapes of files are stored away from originals.
c. Personnel who are independent of data input perform parallel simulations.
d. System flowcharts provide accurate descriptions of input and output operations.
30. Mill Co. uses a batch processing method to process its sales transactions. Data on
Mill’s sales
transaction tape are electronically sorted by customer number and are subject to
programmed
edit checks in preparing its invoices, sales journals, and updated customer account
balances.
One of the direct outputs of the creation of this tape most likely would be a
a. Report showing exceptions and control totals.
b. Printout of the updated inventory records.
c. Report showing overdue accounts receivable.
d. Printout of the sales price master file.
31. Using microcomputers in auditing may affect the methods used to review the work of
staff
assistants because
a. The audit field work standards for supervision may differ.
b. Documenting the supervisory review may require assistance of consulting services
personnel.
c. Supervisory personnel may not have an understanding of the capabilities and
limitations of
microcomputers.
d. Working paper documentation may not contain readily observable details of
calculations.
33. After the preliminary phase of the review of a client’s EDP controls, an auditor may
decide not
to perform tests of controls (compliance tests) related to the control procedures within
the EDP
portion of the client’s internal control structure. Which of the following would not be a
valid
reason for choosing to omit such tests?
a. The controls duplicate operative controls existing elsewhere in the structure.
b. There appear to be major weaknesses that would preclude reliance on the stated
procedure.
c. The time and costs of testing exceed the time and costs in substantive testing if the
tests of
controls show the controls to be operative.
d. The controls appear adequate.
34. Which of the following client electronic data processing (EDP) systems generally can
be
audited without examining or directly testing the EDP computer programs of the system?
a. A system that performs relatively uncomplicated processes and produces detailed
output.
b. A system that affects a number of essential master files and produces a limited
output.
c. A system that updates a few essential master files and produces no printed output
other
than final balances.
d. A system that performs relatively complicated processing and produces very little
detailed
output.
35. Computer systems are typically supported by a variety of utility software packages
that are
important to an auditor because they
a. May enable unauthorized changes to data files if not properly controlled.
b. Are very versatile programs that can be used on hardware of many manufacturers.
c. May be significant components of a client’s application programs.
d. Are written specifically to enable auditors to extract and sort data.
36. To obtain evidence that online access controls are properly functioning, an auditor
most likely
would
a. Create checkpoints at periodic intervals after live data processing to test for
unauthorized
use of the system.
b. Examine the transaction log to discover whether any transactions were lost or entered
twice
due to a system malfunction
c. Enter invalid identification numbers or passwords to ascertain whether the system
rejects
them.
d. Vouch a random sample of processed transactions to assure proper authorization
37. Which of the following statements most likely represents a disadvantage for an entity
that
keeps microcomputer-prepared data files rather than manually prepared files?
a. Attention is focused on the accuracy of the programming process rather than errors in
individual transactions.
b. It is usually easier for unauthorized persons to access and alter the files.
c. Random error associated with processing similar transactions in different ways is
usually
greater.
d. It is usually more difficult to compare recorded accountability with physical count of
assets.
40. Auditors often make use of computer programs that perform routine processing
functions such
as sorting and merging. These programs are made available by electronic data
processing
companies and others and are specifically referred to as
a. Compiler programs c. Utility programs
b. Supervisory programs d. User programs
41. Smith Corporation has numerous customers. A customer file is kept on disk storage.
Each
customer file contains name, address, credit limit, and account balance. The auditor
wishes to
test this file to determine whether the credit limits are being exceeded. The best
procedure for
the auditor to follow would be to
a. Develop test data that would cause some account balances to exceed the credit limit
and
determine if the system properly detects such situations.
b. Develop a program to compare credit limits with account balances and print out the
details
of any account with a balance exceeding its credit limit.
c. Request a printout of all account balances so they can be manually checked against
the
credit limits.
d. Request a printout of a sample of account balances so they can be individually
checked
against the credit limits.
43. An auditor used test data to verify the existence of controls in a certain computer
program.
Even though the program performed well on the test, the auditor may still have a
concern that
a. The program tested is the same one used in the regular production runs.
b. Generalized audit software may have been a better tool to use.
c. Data entry procedures may change and render the test useless.
d. The test data will not be relevant in subsequent audit periods.
44. An auditor most likely would introduce test data into a computerized payroll system
to test
internal controls related to the
a. Existence of unclaimed payroll checks held by supervisors.
b. Early cashing of payroll checks by employees.
c. Discovery of invalid employee I.D. numbers.
d. Proper approval of overtime by supervisors.
45. When an auditor tests a computerized accounting system, which of the following is
true of the
test data approach?
a. Test data must consist of all possible valid and invalid conditions.
b. The program tested is different from the program used throughout the year by the
client.
c. Several transactions of each type must be tested.
d. Test data are processed by the client’s computer programs under the auditor’s
control.
46. Which of the following statements is not true to the test data approach when testing
a
computerized accounting system?
a. The test need consist of only those valid and invalid conditions which interest the
auditor
b. Only one transaction of each type need be tested.
c. The test data must consist of all possible valid and invalid conditions.
d. Test data are processed by the client’s computer programs under the auditor’s
control.
47. Which of the following is not among the errors that an auditor might include in the
test data
when auditing a client’s EDP system?
a. Numeric characters in alphanumeric fields.
b. Authorized code.
c. Differences in description of units of measure.
d. Illogical entries in fields whose logic is tested by programmed consistency checks.
48. An auditor who is testing EDP controls in a payroll system would most likely use test
data that
contain conditions such as
a. Deductions not authorized by employees.
b. Overtime not approved by supervisors.
c. Time tickets with invalid job numbers.
d. Payroll checks with unauthorized signatures.
49. Auditing by testing the input and output of an EDP system instead of the computer
program
itself will
a. Not detect program errors which do not show up in the output sampled.
b. Detect all program errors, regardless of the nature of the output.
c. Provide the auditor with the same type of evidence.
d. Not provide the auditor with confidence in the results of the auditing procedures.
50. Which of the following computer-assisted auditing techniques allows fictitious and
real
transactions to be processed together without client operating personnel being aware of
the
testing process?
a. Integrated test facility c. Parallel simulation
b. Input controls matrix d. Data entry monitor
51. Which of the following methods of testing application controls utilizes a generalized
audit
software package prepared by the auditors?
a. Parallel simulation c. Test data approach
b. Integrated testing facility approach d. Exception report tests
53. Which of the following is not a characteristic of a batch processed computer system?
a. The collection of like transactions which are sorted and processed sequentially
against a
master file.
b. Keypunching of transactions, followed by machine processing.
c. The production of numerous printouts.
d. The posting of a transaction, as it occurs, to several files, without immediate printouts.
54. Where disk files are used, the grandfather-father-son updating backup concept is
relatively
difficult to implement because the
a. Location of information points on disks is an extremely time consuming task.
b. Magnetic fields and other environmental factors cause off-site storage to be
impractical.
c. Information must be dumped in the form of hard copy if it is to be reviewed before
used in
updating.
d. Process of updating old records is destructive.
55. An auditor would most likely be concerned with which of the following controls in a
distributed
data processing system?
a. Hardware controls c. Access controls
b. Systems documentation controls d. Disaster recovery controls
56. If a control total were computed on each of the following data items, which would
best be
identified as a hash total for a payroll EDP application?
a. Total debits and total credits c. Department numbers
b. Net pay d. Hours worked
57. Which of the following is a computer test made to ascertain whether a given
characteristic
belongs to the group?
a. Parity check c. Echo check
b. Validity check d. Limit check
Page 14 of 15
AT-030507
58. A control feature in an electronic data processing system requires the central
processing unit
(CPU) to send signals to the printer to activate the print mechanism for each character.
The
print mechanism, just prior to printing, sends a signal back to the CPU verifying that the
proper
print position has been activated. This type of hardware control is referred to as
a. Echo check c. Signal control
b. Validity control d. Check digit control
59. Which of the following is an example of a check digit?
a. An agreement of the total number of employees to the total number of checks printed
by the
computer.
b. An algebraically determined number produced by the other digits of the employee
number.
c. A logic test that ensures all employee numbers are nine digits.
d. A limit check that an employee’s hours do not exceed 50 hours per work week.
60. In a computerized system, procedure or problem-oriented language is converted to
machine
language through a(an)
a. Interpreter b. Verifier c. Compiler d. Converter
61. A customer erroneously ordered Item No. 86321 rather than item No. 83621. When
this order
is processed, the vendor’s EDP department would identify the error with what type of
control?
a. Key verifying c. Batch total
b. Self-checking digit d. Item inspection
62. The computer process whereby data processing is performed concurrently with a
particular
activity and the results are available soon enough to influence the course of action being
taken
or the decision being made is called:
a. Random access sampling c. On-line, real-time system
b. Integrated data processing d. Batch processing system
63. Internal control is ineffective when computer department personnel
a. Participate in computer software acquisition decisions.
b. Design documentation for computerized systems.
c. Originate changes in master file.
d. Provide physical security for program files.
64. Test data, integrated test data and parallel simulation each require an auditor to
prepare data
and computer programs. CPAs who lack either the technical expertise or time to prepare
programs should request from the manufacturers or EDP consultants for
a. The program Code c. Generalized audit software
b. Flowchart checks d. Application controls
65. Which of the following best describes a fundamental control weakness often
associated with
electronic data processing system?
a. EDP equipment is more subject to system error than manual processing is subject to
human error.
b. Monitoring is not an adequate substitute for the use of test data.
c. EDP equipment processes and records similar transactions in a similar manner.
d. Functions that would normally be separated in a manual system are combined in the
EDP
system like the function of programmers and operators.
66. Which of the following tasks could not be performed when using a generalized audit
software
package?
a. Selecting inventory items for observations.
b. Physical count of inventories.
c. Comparison of inventory test counts with perpetual records.
d. Summarizing inventory turnover statistics for obsolescence analysis.
67. All of the following are “auditing through the computer” techniques except
a. Reviewing source code c. Automated tracking and mapping
b. Test-decking d. Integrated test facility
68. The output of a parallel simulation should always be
a. Printed on a report.
b. Compared with actual results manually.
c. Compared with actual results using a comparison program.
d. Reconciled to actual processing output.
Page 15 of 15
AT-030507
69. Generalized audit software is a computer-assisted audit technique. It is one of the
widely used
technique for auditing computer application systems. Generalized audit software is most
often
used to
a. Verify computer processing.
b. Process data fields under the control of the operation manager.
c. Independently analyze data files.
d. Both a and b.
70. From an audit viewpoint, which of the following represents a potential disadvantage
associated
with the widespread use of microcomputers?
a. Their portability.
b. Their ease of access by novice users.
c. Their easily developed programs using spreadsheets which do not have to be
documented.
d. All of the above.
71. Which of the following functions would have the least effect on an audit if it was not
properly
segregated?
a. The systems analyst and the programmer functions.
b. The computer operator and programmer functions.
c. The computer operator and the user functions.
d. The applications programmer and the systems programmer.
72. To obtain evidence that user identification and password control procedures are
functioning as
designed, an auditor would most likely
a. Attempt to sign on to the system using invalid user identifications and passwords.
b. Write a computer program that simulates the logic of the client’s access control
software.
c. Extract a random sample of processed transactions and ensure that the transactions
were
appropriately authorized.
d. Examine statements signed by employees stating that they have not divulged their
user
identifications and passwords to any other person.
SUGGESTED ANSWERS
1. D
2. D
3. D
4. D
5. D
6. D
7. D
8. D
9. A
10. D
11. B
12. B
13. A
14. D
15. A
16. D
17. D
18. A
19. B
20. A
21. D
22. B
23. A
24. A
25. D
26. C
27. A
28. D
29. D
30. A
31. A
32. A
33. C
34. C
35. A
36. B
37. A
38. C
39. C
40. D
41. D
42. D
43. A
44. B
45. A
46. A
47. B
48. B
49. D
50. D
51. A
52. D
53. D
54. D
55. D
56. D
57. D
58. D
59. D
60. D
61. D
62. A
63. C
QUIZZERS
1. B
2. C
3. D
4. C
5. C
6. D
7. C
8. D
9. D
10. B
11. B
12. D
13. B
14. B
15. D
16. C
17. A
18. A
19. B
20. B
21. C
22. C
23. D
24. D
25. A
26. B
27. B
28. A
29. B
30. A
31. D
32. D
33. D
34. A
35. A
36. C
37. B
38. C
39. D
40. C
41. B
42. B
43. A
44. C
45. D
46. C
47. A
48. C
49. A
50. A
51. A
52. C
53. D
54. D
55. C
56. C
57. B
58. A
59. B
60. C
61. B
62. C
63. C
64. C
65. D
66. B
67. A
68. B
69. C
70. B
71. D
72. A
- end of AT-5916 -