Filters
Question type

Study Flashcards

One potential disadvantage of IT systems is the reduction or elimination of source documents,which reduces the visibility of the audit trail.

Correct Answer

verifed

verified

A database management system:


A) allows clients to create databases that include information that can be shared across multiple applications.
B) stores data on different files for different purposes, but always knows where they are and how to retrieve them.
C) allows quick retrieval of data, but at a cost of inefficient use of file space.
D) allows quick retrieval of data, but it needs to update files continually.

Correct Answer

verifed

verified

When auditing a client who uses a database management system,the auditor is principally aware of elevated risk due to the fact that:


A) multiple users can access and update data files.
B) the accounting information is only in one place.
C) the database administrator may lack appropriate accounting knowledge.
D) multiple users could all access the data simultaneously causing a system shutdown.

Correct Answer

verifed

verified

Discuss how the integration of IT into accounting systems enhances internal control.

Correct Answer

verifed

verified

Enhancements to internal control resulti...

View Answer

Auditors often use Generalized Audit Software during their testing of a client's internal controls.For the following uses of the software provide a description and an example. Verify extensions and footings Print confirmation requests Compare data on separate files

Correct Answer

verifed

verified

Verify extensions and footings: verify accuracy of the clients computations; foot any subsidiary ledger Print confirmation requests: print data for sample items selected for testing; randomly select accounts receivable customer balances for testing Compare data on separate files: determine that information contained in two or more files agrees; changes in accounts payable or accounts receivables accounts using purchases/sales journals and cash disbursement/cash receipts registers.

________ is not a risk specific to the IT environments.


A) Reliance on the functioning capabilities of hardware and software
B) Increased human involvement
C) Loss of data due to insufficient backup
D) Unauthorized access

Correct Answer

verifed

verified

Many clients have outsourced their IT functions.The difficulty the independent auditor faces when a computer service center is used is to:


A) gain the permission of the service center to review their work.
B) find compatible programs that will analyze the service center's programs.
C) determine the adequacy of the service center's internal controls.
D) try to abide by the Code of Professional Conduct to maintain the security and confidentiality of client's data.

Correct Answer

verifed

verified

C

Which of the following is least likely to be used in obtaining an understanding of client general controls?


A) Examination of system documentation
B) Inquiry of key users
C) Walk through of a sales transaction
D) Reviews of questionnaires completed by client IT personnel

Correct Answer

verifed

verified

Identify the six categories of general controls and give one example of each.

Correct Answer

verifed

verified

General controls fall into the following...

View Answer

Discuss the four areas of responsibility under the IT function that should be segregated in large companies.

Correct Answer

verifed

verified

The responsibilities for IT management,s...

View Answer

When the client changes the computer software:


A) no additional testing is needed by the auditor.
B) and application controls are effective, the auditor can easily identify when software changes are made.
C) and general controls are effective, the auditor can easily identify when software changes are made.
D) application and general controls can no longer by relied upon by the auditor.

Correct Answer

verifed

verified

Auditors:


A) link controls and deficiencies in general controls to specific transaction-related audit objectives.
B) can use a control risk matrix to help identify both manual and automated application controls and control deficiencies for each related audit objective.
C) can rely on IT-based application controls for all cycles if general controls are ineffective.
D) can use the IT staff to determine how much reliance they can place on general controls.

Correct Answer

verifed

verified

An internal control deficiency occurs when computer personnel:


A) participate in computer software acquisition decisions.
B) design flowcharts and narratives for computerized systems.
C) originate changes in customer master files.
D) provide physical security over program files.

Correct Answer

verifed

verified

LANs link equipment within a single or small cluster of buildings and are used within a company .

Correct Answer

verifed

verified

IT controls are classified as either input controls or output controls.

Correct Answer

verifed

verified

Which of the following best explains the relationship between general controls and application controls?


A) Application controls are effective even if general controls are extremely weak.
B) Application controls are likely to be effective only when general controls are effective.
C) General controls have no impact on application controls.
D) None of the above.

Correct Answer

verifed

verified

It is important for the auditor to understand both the general controls and the application controls a company has implemented.Which of the following statements is true about these controls?


A) Auditors do not link IT controls to audit objectives.
B) After identifying specific IT-based application controls that can be used to reduce control risk, auditors can reduce substantive testing.
C) General controls affect audit objectives in only one cycle.
D) The impact of general controls and application controls on audits does not vary depending on the level of complexity in the IT environment.

Correct Answer

verifed

verified

B

Parallel simulation is used primarily to test internal controls over the client's IT systems,whereas the test data approach is used primarily for substantive testing.

Correct Answer

verifed

verified

The audit approach in which the auditor runs his or her own program on a controlled basis to verify the client's data recorded in a machine language is:


A) the test data approach.
B) called auditing around the computer.
C) the generalized audit software approach.
D) the microcomputer-aided auditing approach.

Correct Answer

verifed

verified

When auditing a client whose information is processed by an outside service provider,it is not acceptable for the auditor to rely on the audit report of another independent auditor who has previously tested the internal controls of the service provider,rather than testing the service provider's controls himself or herself.

Correct Answer

verifed

verified

Showing 1 - 20 of 106

Related Exams

Show Answer