Auditing Cis
Auditing Cis
Auditing Cis
1.
2.
3.
4.
5.
6.
7.
c.
d.
8.
9.
a.
b.
c.
d.
Compact disk
Tapes
Diskettes
Hard disk
a.
b.
c.
d.
22. The auditor may often assume that control risk is high in
personal computer systems since, it may not be practicable or
cost-effective for management to implement sufficient controls
to reduce the risks of undetected errors to a minimum level.
This least likely entail
a. More physical examination and confirmation of
assets.
b. More analytical procedures than tests of details.
c. Larger sample sizes.
d. Greater use of computer-assisted audit techniques,
where appropriate.
23. Computer systems that enable users to access data and
programs directly through workstations are referred to as
a. On-line computer systems
b. Personal computer systems
c. Database management systems (DBMS)
d. Database systems
24. On-line systems allow users to initiate various functions
directly. Such functions include:
I.
Entering transactions
II.
Requesting reports
III.
Making inquiries
IV.
Updating master files
a. I, II, III and IV
b. I and II
c. I, II and III
d. I and IV
25. Many different types of workstations may be used in on-line
computer systems. The functions performed by these
workstations least likely depend on their
a. Logic
b. Transmission
c.
Storage
d. Cost
26. Types of workstations include General Purpose Terminals and
Special Purpose Terminals. Special Purpose Terminals include
a. Basic keyboard and monitor
b. Point of sale devices
c. Intelligent terminal
d.
Personal computers
27. Special Purpose Terminal used to initiate, validate, record,
transmit and complete various banking transactions
a. Automated teller machines
b.
Intelligent terminal
c. Point of sale devices
d. Personal computers
28. Which statement is incorrect regarding workstations?
a. Workstations may be located either locally or at
remote sites.
b. Local workstations are connected directly to the
computer through cables.
c. Remote
workstations
require
the
use
of
telecommunications to link them to the computer.
d. Workstations cannot be used by many users, for
different purposes, in different locations all at the
same time.
29. On-line computer systems may be classified according to
a. How information is entered into the system.
b. How it is processed.
c. When the results are available to the user.
d. All of the above.
30. In an on-line/real time processing system
a.
b.
c.
d.
a.
b.
c.
d.
Access controls.
System development and maintenance controls.
Edit, reasonableness and other validation tests.
Use of anti-virus software program.
a.
b.
c.
d.
a.
b.
c.
d.
53. System characteristics that may result from the nature of CIS
processing include, except
a. Absence of input documents.
b. Lack of visible transaction trail.
c. Lack of visible output.
d. Difficulty of access to data and computer programs.
d.
procedures
b.
c.
d.
d.
79. Which one of the following input validation routines is not likely
to be appropriate in a real time operation?
a. Field check
b. Sequence check
c. Sign check
d. Redundant data check
80. Which of the following controls is a processing control designed
to ensure the reliability and accuracy of data processing?
a.
b.
c.
d.
Limit test
Yes
No
No
Yes
d.
d.
a.
b.
c.
d.
a.
b.
c.
d.
Their portability.
Their ease of access by novice users.
Their easily developed programs using spreadsheets
which do not have to be documented.
All of the above.
135. Which of the following functions would have the least effect on
an audit if it was not properly segregated?
a. The systems analyst and the programmer functions.
b. The computer operator and programmer functions.
c. The computer operator and the user functions.
d. The applications programmer and the systems
programmer.
136. To obtain evidence that user identification and password
control procedures are functioning as designed, an auditor
would most likely
a. Attempt to sign on to the system using invalid user
identifications and passwords.
b. Write a computer program that simulates the logic of
the clients access control software.
c. Extract a random sample of processed transactions
and ensure that the transactions were appropriately
authorized. Examine statements signed by
employees stating that they have not divulged their
user identifications and passwords to any other
person.
137. In considering a client's internal control structure in a computer
environment, the auditor will encounter general controls and
application controls. Which of the following is an application
control?
a. Organization charts.
b. Hash total.
c. Systems flowcharts.
d. Control over program changes
138. Auditing by testing the input and output of a computer system-i.e., auditing "around" the computer--instead of the computer
software itself will
a. Not detect program errors that do not appear in the
output sampled.
b. Detect all program errors, regardless of the nature of
the output.
c. Provide the auditor with the same type of evidence.
d. Not provide the auditor with confidence in the results
of the auditing procedures.
139. Smith Corporation has numerous customers. A customer file is
kept on disk. Each customer file contains the name, address,
credit limit, and account balance. The auditor wishes to test
this file to determine whether credit limits are being exceeded.
The best procedure for the auditor to follow would be to
a. Develop test data that would cause some account
balances to exceed the credit limit and determine if
the system properly detects such situations.
b. Develop a program to compare credit limits with
account balances and print out the details of any
account with a balance exceeding its credit limit.
c. Request a printout of all account balances so they
can be manually checked against the credit limits.
d. Request a printout of a sample of account balances
so they can be individually checked against the credit
limits.
140. Which of the following methods of testing application controls
utilizes software prepared by the auditors and applied to the
client's data?
a. Parallel simulation.
b. Integrated test facility.
c. Test data.
d. Exception report tests.
141. The testdata method is used by auditors to test the
a. Accuracy of input data.
b. Validity of the output.
c. Procedures contained within the program.
d. Normalcy of distribution of test data.
b.
c.
d.
3)
4)
a.
b.
c.
d.
b.
c.
d.
Deterrent to fraud
Monitoring purposes
Analytical review
d.
b.
c.
d.
An output control
A processing control
A file management control
d.
Limit check.