General and Application Controls
General and Application Controls
General and Application Controls
1. Which of the following procedures would an entity most likely include in its disaster
recovery plan?
a. Convert all data from external formats to an internal company format.
b. Maintain a program to prevent illegal activity.
c. Develop an auxiliary power supply to provide uninterrupted electricity.
d. Store duplicate copies of files in a location away from the computer center.
2. Which of the following is least likely to be a general control over computer activities?
a. Procedures for developing new programs and systems
b. Requirements for system documentation
c. A change request log
d. A control total
4. When designing the physical layout of a data processing center, which of the following
would be least likely to be a necessary control that is considered?
a. Design of controls to restrict access
b. Adequate physical layout space for the operating system
c. Inclusions of an adequate power supply system with surge protection
d. Consideration of risks related to other uses of electricity in the area
6. Which of the following computer system risks would be increased by the installation of a
database system?
a. Programming errors
b. Data entry errors
c. Improper data access
d. Loss of power
8. Auditing by testing the input and output of a computer system instead of the computer
program itself will:
a. Not detect program errors which do not show up in the output sampled.
b. Detect all program errors, regardless of the nature of the output.
c. Provide the auditors with the same type of evidence.
d. Not provide the auditors with the confidence in the results of the auditing procedures.
9. If a control total were to be computed on each of the following data items, which would best
be identified as a hash total for a payroll computer application?
a. Net pay
b. Department numbers
c. Hours worked
d. Total debits and total credits
10. In their consideration of a client's IT controls, the auditors will encounter general controls
and application controls. Which of the following is an application control?
a. The operations manual
b. Hash total
c. Systems documentation
d. Control over program changes
11. When erroneous data are detected by computer program controls, such data may be excluded
from processing and printed on an exception report. The exception report should most
probably be reviewed and followed up on by the:
a. Supervisor of computer operations
b. Systems analyst
c. Data control group
d. Computer programmer
12. The purpose of using generalized computer programs is to test and analyze a client's
computer:
a. Systems.
b. Equipment.
c. Records.
d. Processing logic.
13. The completeness of computer-generated sales figures can be tested by comparing the
number of items listed on the daily sales report with the number of items billed on the actual
invoices. This process uses:
a. Self-checking numbers
b. Control totals
c. Validity tests
d. Process tracing data
15. Which of the following is likely to be of least importance to an auditor in considering the
internal control in a company with computer processing?
a. The segregation of duties within the computer center.
b. The control over source documents.
c. The documentation maintained for accounting applications.
d. The cost/benefit of data processing operations.
17. When conducting field work for a physical inventory, an auditor cannot perform which of the
following steps using a generalized audit software package?
a. Observing inventory
b. Selecting sample items of inventory
c. Analyzing data resulting from inventory
d. Recalculating balances in inventory reports
19. The capability for computers to communicate with physically remote terminals is an
important feature in the design of modern business information systems. Which of the
following risks associated with the use of telecommunications systems is minimized through
the use of a password control system?
a. Unauthorized access to system program and data files
b. Unauthorized physical availability of remote terminals
c. Physical destruction of system program and data files
d. Physical destruction of remote terminals
24. Typical controls developed for manual systems which are still important in IT systems
include:
a. Proper authorization of transactions
b. Competent and honest personnel
c. Careful and complete preparation of source documents
d. All of the above
25. Which of the following statements about general controls is not correct?
a. Disaster recovery plans should identify alternative hardware to process company data.
b. Successful IT development efforts require the involvement of IT and non-IT personnel.
c. The chief information officer should report to senior management and the board.
d. Programmers should have access to computer operations to aid users in resolving
problems.
26. Which one of the following control functions is not the responsibility of the input-output
control group of the data processing department?
a. Review of the efficiency and effectiveness of systems design
b. Scanning the console log
c. Review and distribution of computer output and resolution of control totals
d. Maintenance of an error log
28. Auditors usually obtain information about general and application controls through:
a. Interviews with IT personnel
b. Examination of systems documentation
c. Reading program change requests
d. All of the above methods
33. The bank reconciliation uncovered a transposition error in the books. This is an example of a
a. Preventive control
b. Detective control
c. Corrective control
d. None of the above
40. The reason that a blind copy of the purchase order is sent to receiving is to
a. Inform receiving when a shipment is due.
b. Force a count of the items delivered.
c. Inform receiving of the type, quantity, and price of items to be delivered.
d. Require that the goods delivered are inspected.
ANSWERS:
1. D 21. C
2. D 22. D
3. C 23. C
4. B 24. D
5. C 25. D
6. C 26. A
7. C 27. B
8. A 28. D
9. B 29. A
10. B 30. A
11. C 31. A
12. C 32. B
13. B 33. B
14. C 34. C
15. D 35. A
16. D 36. C
17. A 37. B
18. A 38. C
19. A 39. B
20. D 40. B