Filters
Question type

Study Flashcards

The day-to-day operations of the computer are the responsibility of management.

A) True
B) False

Correct Answer

verifed

verified

Program-oriented CAATs:


A) are useful primarily for substantive procedures.
B) allow the auditor to select records for further testing.
C) may be applied regardless of the level of assessed control risk in an application.
D) none of the above

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following is NOT an example of an application control?


A) There are reasonableness tests reviewing hours worked by employees.
B) There are reasonableness tests for the unit selling price of a sale.
C) After processing, all sales transactions are reviewed by the sales department.
D) An equipment failure causes an error message on the monitor.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which one of the following statements is incorrect about network environments?


A) Network-related software often lacks the security features typically available in traditionally centralised systems.
B) Many environments lack standardised procedures.
C) Responsibility for purchasing equipment usually resides with a centralised IT function.
D) Decentralised servers often increase control risk.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Generalised audit software can be used to perform many different kinds of tests.Which of these is NOT one of them?


A) comparing creditor statements with accounts payable files
B) inquiry of management policy on aged debtors
C) random sampling of all other receivables
D) totalling the client's accounts receivable balances

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following output controls is most important?


A) review of the data for reasonableness by someone who knows what the output should look like
B) control totals, which are used to verify that the computer's results are correct
C) distribution control, which assures that only authorised personnel receive the reports generated by the system
D) logic tests, which verify that no mistakes were made in processing

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is NOT an example of a test data approach?


A) testing authorisation of transactions
B) testing input data to final reports
C) testing online passwords
D) testing data access controls

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Generalised audit software is:


A) used when client's software is not compatible with the auditor's.
B) a method of verifying the client's data recorded in a machine language.
C) often used even when client's data are not computerised.
D) all of the above

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A firewall is a system of hardware and software that monitors and controls the flow of e-commerce communications by channelling all network connections through a control gateway.

A) True
B) False

Correct Answer

verifed

verified

Which one of the following is NOT an application control?


A) processing controls
B) hardware controls
C) output controls
D) input controls

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which one of the following is NOT usually part of a contingency plan?


A) regular changing of access codes
B) identifying alternative hardware that can be used to process company data
C) backing up critical data files
D) storing copies of critical software off premises

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

An auditor who is testing IT controls in a payroll system would most likely use test data that contains conditions such as:


A) deductions not authorised by employees.
B) overtime not approved by supervisors.
C) time tickets with invalid job numbers.
D) payroll cheques with unauthorised signatures.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which one of the following computer-assisted auditing techniques allows fictitious and real transactions to be processed together without client operating personnel being aware of the testing process?


A) Parallel simulation
B) Integrated test facility
C) Generalised audit software programming
D) Test data approach

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Discuss the major factors associated with complex IT systems that increase control risk and the likelihood of material misstatements in the financial statements.

Correct Answer

verifed

verified

Factors associated with complex IT syste...

View Answer

A database management system:


A) allows quick retrieval of data, but at the cost of inefficient use of file space.
B) allows quick retrieval of data, but it needs to update files continually.
C) stores data in different files for different purposes, but always knows where they are and how to retrieve them.
D) reduces data redundancy.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Auditing around the computer is acceptable when general controls are strong.

A) True
B) False

Correct Answer

verifed

verified

Which two broad control groupings for IT systems are described by auditing standards? 1) General controls 2) application controls 3) information controls 4) performance controls


A) 2 and 3
B) 3 and 4
C) 1 and 3
D) 1 and 2

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a function of an embedded audit module approach?


A) Tests data used to test specific controls.
B) Analyses the client data.
C) Uses software to define the content of data records.
D) Inserts an audit module into the client's application system.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a generalised audit software package?


A) ACL
B) MYOB
C) Visual Basic
D) none of the above

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Oversight of the IT function to ensure that all activities are carried out consistently with the IT strategic plan is the responsibility of the:


A) chief information officer.
B) data control group.
C) librarian.
D) computer operators.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Showing 81 - 100 of 104

Related Exams

Show Answer