Anda di halaman 1dari 12

DE LA SALLE UNIVERSITY MANILA

RVR COB DEPARTMENT OF ACCOUNTANCY


REVDEVT 3rd Term AY 14-15
Auditing Theory
AT Quizzer 9

Prof. Francis H.Villamin


Auditing in a Information Systems (CIS) Environment

1.

Which of the following is not an advantage of a computerized accounting system?


a. Computers process transactions uniformly
b. Computers help alleviate human errors
c. Computers can process many transactions quickly
d. Computers leave a thorough audit trail which can be easily followed

2.

A common difficulty in auditing a computerized accounting system is


a. data can be erased from the computer with no visible evidence
b. because of the lack of an audit trail, computer systems have weaker controls and more substantive
testing is required
c. because of the uniform nature of transaction processing, computer systems have strong controls and
less substantive testing is required
d. the large dissemination of entry points into the computer system leads to weak overall reliance on
information generated by a computer

3.

Which of the following most likely represents a disadvantage for an entry that maintains computer data
files rather than manual files?
a. Its unusually more difficult to detect transposition errors
b. Transactions are usually authorized before they are executed and recorded
c. It is usually easier for unauthorized persons to access and alter the files
d. Random error is more common when similar transactions are processed in different ways

4.

Which of the following statements best describes a weakness often associated with computers?
a. Computer equipment is more subject to a systems error than manual processing is subject to human
error
b. Computer equipment processes and records similar transactions in a similar manner
c. Control activities for detecting invalid and unusual transactions are less effective than manual control
activities
d. Functions that would normally be separated in a manual system are combined in a computer system

5.

An auditor would most likely be concerned with which of the following controls in a distributed data
processing system?
a. Hardware controls
b. Systems documentation controls
c. Access controls
d. Disaster recovery controls

6.

Which of the following types of evidence would an auditor most likely examine to determine whether
internal control is operating as designed?
a. Gross margin information regarding the clients industry
b. Confirmations of receivables verifying account balances
c. Client records documenting the use of computer programs
d. Anticipated results documented in budgets or forecasts

7. An auditor anticipates assessing control risk at a low level in a computerized environment. Under these
circumstances on which of the following activities would the auditor initially focus?
a. Programmed control activities
b. Application control activities
c. Output control activities
d. General control activities

AT Quizzer 9

Information Systems Audit & Assurance

Page 2

8.

After the preliminary phase of the review of a clients computer controls, an auditor may decide not to
perform tests of controls (compliance tests) related to the controls within the computer portion of the
clients internal control. Which of the following would not be a valid reason for choosing to omit such
tests?
a. The controls duplicate operative controls existing elsewhere in the structure.
b. There appear to be major weaknesses that would preclude reliance on the stated procedure.
c. The time and dollar costs of testing exceed the time and dollar savings in substantive testing if the
tests of controls show the controls to be operative.
d. The controls appear adequate.

9.

Auditing by testing the input and output of a computer system instead of the computer program itself will
a. Not detect program errors which do not show up in the output sampled
b. Detect all program errors, regardless of the nature of the output
c. Provide the auditor with the same type of evidence
d. Not provide the auditor with confidence in the results of the auditing procedures

10. Which of the following client information technology (IT) systems generally can be audited without
examining or directly testing the IT computer programs of the system?
a. A system that performs relatively uncomplicated processes and produces detailed output
b. A system that affects the number of essential master files and produces a limited output
c. A system that updates a few essential master files and produces no printed output other than final
balances
d. A system that performs relatively complicated processing and produces very little detailed output
11. An auditor who wishes to capture an entitys data as transactions are processed and continuously test the
entitys computerized information system most likely would use which of the following techniques?
a. Snapshot application
b. Embedded audit module
c. Integrated data check
d. Test data generator
12. Which of the following computer-assisted auditing techniques processes client input data on a controlled
program under the auditors control to test controls in the computer system?
a. Test data
b. Review of program logic
c. Integrated test facility
d. Parallel simulation
13. To obtain evidence that on-line access controls are properly functioning, an auditor most likely would
a. Create checkpoints at periodic intervals after live data processing to test for unauthorized use of the
system
b. Examine the transaction log to discover whether any transactions were lost or entered twice due to a
system malfunction
c. Enter invalid identification numbers or passwords to ascertain whether the system rejects them
d. Vouch a random sample of processed transactions to assure proper authorization
14. An auditor most likely would introduce test data into a computerized payroll system to test controls related
to the
a. Existence of unclaimed payroll checks held by supervisors
b. Early cashing of payroll checks by employees
c. Discovery of invalid employee ID numbers
d. Proper approval of overtime by supervisors
15. When an auditor tests a computerized accounting system, which of the following is true of the test data
approach?
a. Several transactions of each type must be tested
b. Test data are processed by the clients computer programs under the auditors control
c. Test data must consist of all possible valid and invalid conditions
d. The program tested is different from the program used throughout the year by the client
16

Which of the following is not among the errors that an auditor might include in the test data when auditing
a clients computer system?
a. Numeric characters in alphanumeric fields
b. Authorized code
c. Differences in description of units of measure
d. Illogical entries in fields whose logic is tested by programmed consistency checks

AT Quizzer 9

Information Systems Audit & Assurance

Page 3

17

Which of the following computer-assisted auditing techniques allows fictitious and real transactions to be
processed together without client operating personnel being aware of the testing process?
a. Integrated test facility
b. Input control matrix
c. Parallel simulation
d. Data entry monitor

18

Which of the following methods of testing application controls utilizes a generalized audit software
package prepared by the auditors?
a. Parallel simulation
b. Integrated testing facility approach
c. Test data approach
d. Exception report tests

19

In creating lead schedules for an audit engagement, a CPA often uses automated work paper software.
What client information is needed to begin this process?
a. Interim financial information such as third quarter sales, net income, and inventory and receivables
balances
b. Specialized journal information such as the invoice and purchase order numbers of the last few sales
and purchases of the year
c. General ledger information such as account numbers, prior year account balances, and current year
unadjusted information
d. Adjusting entry information such as deferrals and accruals, and reclassification journal entries

20

Using microcomputers in auditing may affect the methods used to review the work of staff assistants
because
a. The audit fieldwork standards for supervision may differ
b. Documenting the supervisory review may require assistance of consulting services personnel
c. Supervisory personnel may not have an understanding of the capabilities and limitations of
microcomputers
d. Working paper documentation may not contain readily observable details of calculations

21. An auditor would least likely use computer software to


a. Access client data files
b. Prepare spreadsheets
c. Assess computer control risk
d. Construct parallel simulations
22. A primary advantage of using generalized audit software packages to audit the financial statement of a
client that uses a computer system is that the auditor may
a. Access information stored on computer files while having a limited understanding of the clients
hardware and software features
b. Consider increasing the use of substantive tests of transactions in place of analytical procedures
c. Substantiate the accuracy of data through self-checking digits and hash totals
d. Reduce the level of required tests of controls to a relatively small amount
23. Auditors often make use of computer programs that perform routine processing functions such as sorting
and merging. These programs are made available by electronic data processing companies and others
and are specifically referred to as
a. Compiler programs
b. Supervisory programs
c. Utility programs
d. User programs
24. Berry Corporation has numerous customers. A customer file is kept on disk storage. Each customer file
contains name, address, credit limit, and account balance. The auditor wishes to test this file to determine
whether credit limits are being exceeded. The best procedure for the auditor to follow would be to
a. Develop test data that would cause some account balances to exceed the credit limit and determine if
the system properly detects such situations
b. Develop a program to compare credit limits with account balances and print out the details of any
account with a balance exceeding the credit limit
c. Request a printout of all account balances so they can be manually checked against the credit limits
d. Request a printout of a sample of account balances so they can be individually checked against the
credit limits

AT Quizzer 9

Information Systems Audit & Assurance

Page 4

25. How has Electronic Data Interchange (EDI) systems affected audits?
a. Since orders and billing transactions are done over the computer, source documents cannot be
obtained
b. Auditors often need to plan ahead to capture information about selected transactions over the EDI
c. There is no audit trail in an EDI system, so controls are typically assessed as weak
d. Since all transactions occur over the computer, reliability is high and little substantive testing is needed
26. Since the computer can do many jobs simultaneously, segregation is not as defined as it is in a manual
system. How can a computer system be modified to compensate for the lack of segregation of duties?
a. The computer system should be under the direction of the internal audit department
b. The computer system should be accessible to various competent partners so they can check on each
others work
c. Strong controls should be built into both the computer software and hardware to limit access and
manipulation
d. Many companies run complete parallel manual and automated accounting systems for a cross check
on input and output
27. Internal control is ineffective when the computer personnel
a. participates in computer software acquisition decisions
b. designs documentation for computerized systems
c. originates changes in master files
d. provides physical security for program files
28. Accounting functions that are normally considered incompatible in a manual system are often combined
by computer software. This necessitates an application control that prevents unapproved
a. access to the computer library
b. usage of software
c. revisions to existing software
d. testing of modified software
29. An auditors consideration of a computers control activities has disclosed the following four
circumstances. Which circumstance constitutes significant deficiency in internal control?
a. Computer operators do not have access to the complete software support documentation
b. Computer operators are closely supervised by the programmers
c. Programmers are not authorized to operate computers
d. Only one generation of backup files is stored in an off-premise location
30.

One key control in the organization of the information systems department is the
a. separation of the systems development group and the operations (data processing) group
b. operating personnel should strictly control access to the clients database
c. controller should manage the information system since it supplements the accounting work already
done under the supervision of the controller
d. information systems department should be under the direction of systems development personnel
since they are responsible for the overall performance of the system

31. In an electronic data processing system, automated equipment controls or hardware controls are
designed to
a. arrange data in a logical sequential manner for processing purposes.
b. correct errors in the computer programs.
c. monitor and detect errors in source documents.
d. detect and control errors arising from use of equipment.
32. Which of the following characteristics distinguishes computer processing from manual processing?
a. Computer processing virtually eliminates the occurrence of computational error normally associated
with manual processing.
b. Errors or fraud in computer processing will be detected soon after their occurrences.
c. The potential for systematic error is ordinarily greater in manual processing than in computerized
processing.
d. Most computer systems are designed so that transaction trails useful for audit purposes do not exist.
33. What is the computer process called when data processing is performed concurrently with a particular
activity and the results are available soon enough to influence the particular course of actions being taken
or the decision being made?
a. Real-time processing
b. Batch processing
c. Random access processing
d. Integrated data processing

AT Quizzer 9

Information Systems Audit & Assurance

Page 5

34. Which of the following statements is false? In data processing,


a. data refers to facts which have been organized in a meaningful manner.
b. the sources of data are within the firm and outside the firm.
c. data processing refers to the operations needed to collect and transform data into useful information.
d. mechanical data processing is a system in which the operations are performed with the assistance of
major mechanical devices.
35. The grandfather-father-son approach to providing protection for important computer files is a concept that
is most often found in
a. on-line, real-time systems
b. punched-card systems
c. magnetic tape systems
d. magnetic drum systems
36. Which of the following employees in a companys electronic data processing department should be
responsible for designing a new or improved data processing procedures?
a. Flowchart editor
b. Programmer
c. Systems analyst
d. Control-group supervisor
37. An electronic data processing technique which collects data into groups to permit convenient and efficient
processing is known as
a. document-count processing
b. multi-programming
c. batch processing
d. generalized audit processing
38. A fundamental purpose of a database management system is to
a. store all data for an organization in multiple files.
b. reduce data redundancy.
c. use physical data organizations concepts instead of logical data organization concepts.
d. change the manner in which application programs access individual data elements.
39. A partial set of standard characteristics of a real-time system is
a. batched input, online files, and an extensive communication network.
b. reliance upon sequential files, prompt input from users, and interactive programs.
c. online files, prompt input from users, and an extensive communication network.
d. the use of high-level language and the major need being for historical reports.
40.

All activity related to a particular application in a manual system is recorded in a journal. The name of the
corresponding item in a computerized system is a
a. master file
b. year-to-date file
c. transaction file
d. current balance file

41.

Which of the following is not a major reason for maintaining an audit trail for a computer system?
a. Deterrent to fraud
b. Monitoring purposes
c. Analytical procedures
d. Query answering

42.

An auditor would most likely be concerned with which of the following controls in a distributed data
processing system?
a. Hardware controls
b. System documentation controls
c. Access controls
d. Disaster recovery controls

43.

Which one of the following is not considered a typical risk associated with outsourcing (the practice of hiring
an outside company to handle all or part of the data processing)?
a. Inflexibility
b. Loss of control
c. Loss of confidentiality
d. Less availability of expertise

AT Quizzer 9

Information Systems Audit & Assurance

Page 6

44.

The initial debugging of a computer program should normally be done by the


a. programmer
b. internal auditor
c. machine operator
d. control group

45.

Which of the following is not one of the main components of a computer?


a. Processing unit
b. Storage (memory) unit
c. Arithmetic unit
d. Verifier

46.

The normal sequence of documents and operations on a well-prepared systems flowchart is


a. top to bottom and left to right.
b. bottom to top and left to right.
c. top to bottom and right to left.
d. bottom to top and right to left.

47.

The purpose of using generalized computer programs is to test and analyze a clients computer
a. systems
b. equipment
c. records
d. processing logic

48.

The computer system most likely to be used by a large savings bank for customers accounts would be
a. an on-line, real-time system
b. a batch processing system
c. a generalized utility system
d. a direct access data base system

49.

Which of the following lists comprises of the components of the data processing cycle?
a. Batching, processing, output
b. Collection, refinement, processing, maintenance, output
c. Input, classifying, batching, verification, transmission
d. Collection, refinement, storing, output

50.

Which of the following is not a characteristic of a batch processed computer system?


a. The collection of like transactions which are sorted and processed sequentially against a master file.
b. Keypunching of transactions, followed by machine processing.
c. The production of numerous printouts.
d. The posting of transaction, as it occurs, to several files, without intermediate printouts.

51.

The internal controls over computer processing include both manual procedures and procedures designed
into computer programs (programmed control procedures). These manual and programmed control
procedures comprise the general CIS controls and CIS application controls. The purpose of general CIS
controls is to
a. Establish specific control procedures over the accounting applications in order to provide reasonable
assurance that all transactions are authorized and recorded and are processed completely,
accurately, and on a timely basis
b. Establish a framework of overall controls over the CIS activities and to provide a reasonable level of
assurance that the overall objectives of internal control are achieved
c. Provide reasonable assurance that systems are developed and maintained in an authorized and
efficient manner
d. Provide reasonable assurance that access to data and computer programs is restricted to authorized
personnel

52.

CIS application controls include the following, except


a. Controls over input
b. Controls over processing and computer data files
c. Controls over output
d. Controls over access to systems software and documentation

53.

The auditor is required to consider how an entitys general CIS controls affect the CIS applications
significant to the audit. Accordingly, the auditor should
a. Review the design of the general CIS controls only
b. Review the design of the CIS application controls only
c. Review the design of the general CIS controls before reviewing the CIS application controls
d. Review the design of the CIS application controls before reviewing the design of the general CIS
controls

AT Quizzer 9

Information Systems Audit & Assurance

Page 7

54.

The two broad categories of CIS controls are general controls and application controls. General controls
include controls
a. For developing, maintaining and modifying computer programs
b. That relate to the correction and resubmission of erroneous data
c. Designed to provide reasonable assurance that only authorized users receive output from processing
d. Designed to provide reasonable assurance that all data submitted for processing have been properly
authorized

55.

The significance of hardware controls is that they


a. Ensure that run-to-run totals in application systems are consistent
b. Reduce the incidence of user input errors in online systems
c. Ensure correct programming of operating system functions
d. Assure that machine instructions are executed correctly

56.

The following statements relate to internal control in an electronic data interchange (EDI) environment.
Which is true?
a. In EDI systems, preventive controls are generally more important than detective controls
b. Control objectives for EDI systems generally are different from the objectives for other computer
information systems
c. Internal controls that relate to the segregation of duties generally are the most important controls in
EDI systems
d. Internal controls in EDI systems rarely permit control risk at below the maximum

57.

An entity has recently converted its revenue/receipt cycle from a manual processing to an online, real-time
processing system. Which is the most probable result associated with conversion to the new
computerized processing system?
a. Less segregation of traditional duties
b. Significant increase in processing time
c. Reduction ion the entitys risk exposures
d. Increase in processing errors

58.

The most important segregation of duties in the organization of the information systems function is
a. Using different programming personnel to maintain utility programs from those who maintain the
application programs
b. Having a separate information officer at the top level of the organization outside of the accounting
function
c. Assuring that those responsible for programming the system do not have access to data processing
operations
d. Not allowing the data librarian to assist in data processing operations

59. Which of the following activities would most likely be performed in the information systems department?
a. Initiation of changes to master records
b. Conversion of information to machine-readable form
c. Correction of transactional errors
d. Initiation of changes to existing applications
60. For control purposes, which of the following should be organizationally segregated from the computer
operations function?
a. Data conversion
b. Surveillance of CRT messages
c. Systems of development
d. Minor maintenance according to a schedule
61. Which of the following is not a major reason for maintaining an audit trail for a computer system?
a. Deterrent to fraud
b. Monitoring purposes
c. Analytical procedures
d. Query answering
62.

Alpha National Bank has an on-line real-time system, with terminals installed in all of its branches. This
system will not accept a customers cash withdrawal instructions in excess of P10,000 without the use of a
terminal audit key. After the transaction is authorized by a supervisor, the bank teller then processes the
transaction with the audit key. This control can be strengthened by
a. On-line recording of the transaction on audit override sheet
b. Increasing the dollar amount to P15,000
c. Requiring manual, rather than on-line, recording of all transactions
d. Using parallel simulation

AT Quizzer 9

Information Systems Audit & Assurance

Page 8

63. The use of header label in conjunction with magnetic tape is most likely to prevent errors by the
a. Computer operator
b. Keypunch operator
c. Computer programmer
d. Maintenance technician
64. For the accounting system of Atlantis Company, the amounts of cash disbursements entered into a
terminal are transmitted to the computer that immediately transmits the amounts back to the terminal for
display on the terminal screen. This display enables the operator to
a. Establish the validity of the account number
b. Verify the amount was entered accurately
c. Verify the authorization of the disbursement
d. Prevent the overpayment of the account
65. When computer programs or files can be accessed from terminals, users should be required to enter
a(an)
a. Parity check
b. Personal identification code
c. Self-diagnosis test
d. Echo check
66. The possibility of erasing a large amount of information stored on magnetic tape most likely would be
reduced by the use of
a. File protection rings
b. Check digits
c. Completeness tests
d. Conversion verification
67. Mark Corp. has changed from a system of recording time worked on clock cards to a computerized payroll
system in which employees record time in and out with magnetic cards. The computer system
automatically updates all payroll records. Because of this change
a. A generalized computer audit program must be used
b. Part of the audit trail is altered
c. The potential for payroll related fraud is diminished
d. Transactions must be processed in batches
68.

Which of the following controls most likely would assure that an entity can reconstruct its financial
records?
a. Hardware controls are built into the computer by the computer manufacturer
b. Backup diskettes or tapes of files are stored away from originals
c. Personnel who are independent of data input perform parallel simulations
d. Systems flowcharts provide accurate descriptions of input and output operations

69.

Computer systems are typically supported by a variety of utility software packages that are important to an
auditor because they
a. May enable unauthorized changes to data files if not properly controlled
b. Are very versatile programs that can be used on hardware of many manufacturers
c. May be significant components of a clients application program
d. Are written specifically to enable auditors to extract and sort data

70.

Where disk files are used, the grandfather-father-son updating backup concept is relatively difficult to
implement because the
a. Location of information points on disks is an extremely time consuming task
b. Magnetic fields and other environmental factors cause off-site storage to be impractical
c. Information must be dumped in the form of hard copy of it is to be reviewed before used in updating
d. Process of updating old records is destructive

71. In creating lead schedules for an audit engagement, a CPA often uses automated work paper software.
What client information is needed to begin this process?
a. Interim financial information such as third quarter sales, net income, and inventory and receivables
balances
b. Specialized journal information such as the invoice and purchase orders numbers of the last few sales
and purchase of the year
c. General ledger information such as account numbers, prior year account balances, and current year
unadjusted information
d. Adjusting entry information such as deferrals and accruals and reclassification journal entries

AT Quizzer 9

Information Systems Audit & Assurance

Page 9

72. Using microcomputers in auditing may affect the methods used to review the work of staff assistants
because
a. The audit fieldwork standards for supervision may differ
b. Documenting the supervisory review may require assistance of consulting services personnel
c. Supervisory personnel may not have an understanding of the capabilities and limitations of
microcomputers
d. Working paper documentation may not contain readily observable details of calculations
73.

An entity has the following invoices in a batch:


Invoice #
Product
Quantity
Unit Price
201
F10
150
P 5.00
202
G15
200
P 10.00
203
H20
250
P 25.00
204
K35
300
P 30.00
Which of the following numbers represent the record count?
a. 1
b. 4
c. 810
d. 900

74.

Which of the following input controls is a numeric value computed to provide assurance that the original
value has not been altered in construction or transmission?
a. Hash total
b. Parity check
c. Encryption
d. Check digit

75.

Which of the following is an example of a validity check?


a. The computer ensures that a numerical amount in a record does not exceed some predetermined
amount
b. As the computer corrects errors and data are successfully resubmitted to the system, the causes of
the errors are printed out
c. The computer flags any transmission for which the control field value did not match of an existing file
record
d. After data for transaction are entered, the computer sends certain data back to the terminal for
comparison with data originally sent

76.

Which of the following is a computer test made to ascertain whether a given characteristic belongs to the
group?
a. Parity check
b. Validity check
c. Echo check
d. Limit check

77.

A control feature in an electronic data processing system requires that central processing unit (CPU) to
send signals to the printer to activate the print mechanism for each character. The print mechanism, just
prior to the printing, sends a signal back to the CPU verifying that the proper print position has been
activated. This type of hardware control is referred to as
a. Echo control
b. Validity control
c. Signal control
d. Check digit control

78.

Which of the following is an example of a check digit?


a. An agreement of the total number of employees to the total number of checks printed by the computer
b. An algebraically determined number produced by the other digits of the employee number
c. A logic test that ensures all employee numbers are nine digits
d. A limit check that an employees hours do not exceed 50 hours per work week

79.

In a computerized system, procedure or problem-oriented language is converted to machine language


through a(an)
a. Interpreter
b. Verifier
c. Compiler
d. Converter

AT Quizzer 9

Information Systems Audit & Assurance

Page 10

80. What type of computer system is characterized by data that are assembled from more than one
location and records that are updated?
a. Microcomputer system
b. Minicomputer system
c. Batch processing system
d. On-line real time system
81. Should the auditor feel, after obtaining an understanding of the CIS internal structure, that control risk
cannot be reduced, he or she will
a. Issue a disclaimer.
b. Issue an adverse opinion.
c. Increase the sample size for tests of controls.
d. Expand the substantive testing portion of the audit.
82. Control risk assessment when a computer is used would not involve
a. Identifying specific control procedures designed to achieve the control objectives.
b. Identifying the interdependent control procedures which must function for an identified specific
control procedure to be effective.
c. Evaluating the design of control procedures to determine control risk.
d. Performance of specific tests of control audit procedures.
83. Which of the following represent examples of general, application and user controls activities,
respectively, in the computer environment?
a. Control over access to programs, computer exception reports, and manual checks of computer
output.
b. Manual checks of computer output, control over access to programs, and computer exception
reports.
c. Computer exception reports, control over access to programs, and manual checks of computer
output.
d. Manual checks of computer output, computer exception reports, and control over access to
programs.
84.
Which of the following is least likely a risk characteristic associated with a CIS environment?
a. Error embedded in an applications program logic may be difficult to manually detect on a timely
basis.
b. The separation of functional responsibilities diminishes in a computerized environment.
c. Initiation of changes in the master file is exclusively handled by respective users.
d. The potential unauthorized access to data or to alter them without visible evidence may be
greater.
85. The use of a computer changes the processing, storage, and communication of financial information.
A CIS environment may affect the following, except:
a. The accounting and internal control systems of the entity.
b. The overall objective and scope of an audit.
c. The auditors design and performance of tests of control and substantive procedures to satisfy
the audit objectives.
d. The specific procedures to obtain knowledge of the entitys accounting and internal control
systems.
86.

A compiler is
a. A procedure-oriented language.
b. A machine that converts procedure oriented language to a machine language.
c. A program that converts procedure oriented language to a machine language.
d. A program that translate symbolic language to machine language.

87.

An operating system is
a. The assembler program including the source and object program.
b. All hardware and software needed to operate the computer system.
c. The program that manage the processing operations of the computer.
d. Only the hardware of the computer system.

88. A CIS where two or more personal computers are linked together through the use of special
software and communication lines and allows the sharing of application software, data files, and
computer peripherals such as printers and optical scanners is a/an
a. Local area network (LAN).
b. On-line system.
c. Batch processing system.
d. Wide area network (WAN).

AT Quizzer 9

Information Systems Audit & Assurance

Page 11

89. What type of online computer system is characterized by data that are assembled from more than
one location and records that are updated immediately?
a. Online, batch processing system.
b. Online, real-time processing system.
c. Online, inquiry system.
d. Online, downloading/uploading system.
90. Mainframe computer systems include several advanced processing procedures. Two of the most
common processing procedures are multiprocessing and multiprogramming. Which of the following
statements about these processing procedures is false?
a. Multiprogramming allows multiple programs to be executed at exactly the same time.
b. Multiprogramming switches back and forth between programs during processing.
c. Multiprocessing allows the sharing of a central memory during processing.
d. Multiprocessing allows multiple programs to be executed at exactly the same time.
91. When the client has a large number of transactions that processed by stand alone personal
computer, the auditor
a. May do tests of controls which he intends to rely on, if appropriate, to reduce the assessed
control risk, and do audit work on the data a preliminary date.
b. Understand the control environment and flow of transactions but must omit preliminary audit
tests.
c. May do tests of controls and if those controls can be relied on, do interim testing and omit year
end audit testing.
d. Usually omits the understanding of control environment because the stand alone personal
compute environment is not reliable.
92. How does the stand alone personal computer environment of the client entity affect the auditors
procedures?
a. The auditor often assumes that control risk is reasonably low.
b. Because of the advantage provided by the use of stand alone personal computers, the audit
procedures are restricted to low level.
c. The auditor usually concentrates the audit efforts on substantive tests at or near the end of the
year.
d. To be cost effective, the auditor makes an extensive review of general CIS and CIS application
controls as basis of reducing the audit efforts to be performed on detailed testing of balances
and transaction classes.
93. Audit team members can use the same database and programs when their PCs share a hard disk
and printer on a LAN. Which of the following communication devices enables a PC to connect to a
LAN?
a. A network interface card (NIC) that plugs into the motherboard.
b. A fax modem that sends that plugs into the motherboard.
c. An internal modem that plugs into the motherboard.
d. An external modem with a cable connection to a serial port.
94. Auditing in a Computer Information Systems Environment, states, In planning the portions of the
audit which may be affected by the clients CIS environment, the auditor should obtain an
understanding of the significance and complexity of the CIS activities and the availability of data for
use in the audit. The following relate to the complexity of CIS activities except when
a. Transactions are exchanged electronically with other organizations (for example, in electronic
data interchange systems (EDI).
b. Complicated computations of financial information are performed by computer and/or material
transactions or entries are generated automatically without independent validation.
c. Material financial assertions are affected by computer processing.
d. The volume of transactions is such that users would find it difficult to identify and correct errors in
processing.
95.

The auditor is required by the standard to consider the CIS environment in designing audit
procedures to reduce risk to an acceptably low level. Which of the following statements is
incorrect?
a. The auditors specific audit objectives do not change whether financial information is processed
manually or by the computer.
b. The methods of applying audit procedures to gather audit evidence are not influenced by the
methods of computer processing.
c. The auditor may use either manual audit procedures, computer-assisted audit techniques
(CAATs), or a combination of both to obtain sufficient appropriate audit evidence.
d. In some CIS environments, it may be difficult or impossible for the auditor to obtain certain data
for inspection, inquiry, or confirmation without the aid of computer.

AT Quizzer 9
96.

Information Systems Audit & Assurance

Page 12

Regardless of the nature of an entitys environment, the auditor must consider internal control. In a
CIS environment, the auditor must, at a minimum, have
a. A background in programming procedures.
b. An expertise in programming procedures.
c. A sufficient knowledge of the computers operating system.
d. A sufficient knowledge of the computer information system.

97. The use of CIS will least likely affect the


a. The procedures followed by the auditor in obtaining a sufficient understanding of the
accounting and internal control systems.
b. The auditors specific objectives.
c. The consideration of inherent risk and control risk through which the auditor arrives at the risk
assessment.
d. The auditors design and performance of tests of control and substantive procedures
appropriate to meet the audit objective.
98.

Who is ultimately responsible for the design and implementation of cost-effective controls in a CIS
environment?
a. The internal audit manager.
b. The entitys management.
c. The CIS manager.
d. The control group in the CIS environment.

99. Which of the following is unique to CIS?


a. Error listing.
b. Flowchart.
c. Questionnaires.
d. Pre-numbered documents.
100. Are the following risks greater in CIS than in manual systems?
a
b
Erroneous data conversion
Yes
Yes
Erroneous source document preparation
Yes
Yes
Repetition of errors
No
No
Concentration of data
Yes
No

c
Yes
Yes
Yes
Yes

d
Yes
No
Yes
Yes

Anda mungkin juga menyukai