Deck 12: Information Technology Auditing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/65
Play
Full screen (f)
Deck 12: Information Technology Auditing
1
The main objective of information technology auditing is to evaluate the IT's role in achieving audit and control objectives.
True
2
If control procedures over a company's computerized financial accounting system are particularly strong,auditors will not need to perform any substantive testing.
False
3
Normal transactions rather than exception transactions are of most interest to auditors.
False
4
The focus in an internal audit should be primarily on business risk rather than on internal control.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
5
When the costs of protecting against a business risk exceed the cost of the risk multiplied by its probability,an auditor will generally recommend against installing the specific control.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
6
Many of the assurance services auditors offer today involve information technology.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
7
The greatest advantage of an integrated test facility is that it enables an auditor to examine both manual and computerized steps companies take to process business transactions.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
8
An ideal program change control process includes required documentation of every request for application program changes as well as the use of a test environment for development and implementation of program changes.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
9
Both the internal audit and the external audit have the same primary objective (i.e.,to verify that the financial records of the company have been prepared according to generally accepted accounting principles).
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
10
An auditing around the computer approach pays little or no attention to the control procedures within an IT environment.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
11
Embedded audit modules or audit hooks are examples of continuous auditing techniques.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
12
One problem with internal auditing is that it is akin to self-regulation (i.e.,the auditor cannot be impartial because both the auditor and the subsystem being audited work for the same company).
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
13
In auditing through the computer,auditors will want to review systems software documentation.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
14
An information systems risk assessment is as concerned with errors and accidents as it is with fraud.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
15
Public companies are required to adopt the Control Objectives for Information and Related Technology framework under SOX.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
16
The Electronic Systems Assurance and Control model provides a framework for evaluating controls over email systems.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
17
Computer assisted audit techniques are used primarily when auditing around the computer.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
18
Use of test data is not recommended when evaluating integrated online systems.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
19
Certified Information System Auditors must have an accounting degree.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
20
A career in information technology auditing requires both specialized skills and a broad-based set of technical knowledge.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is not one of the groups of SOX compliance requirements?
A)Requirements to use an IT auditor to evaluate controls
B)Regulations governing executive reporting and conduct
C)Rules about financial statement reporting
D)Audit committee/corporate governance requirements
A)Requirements to use an IT auditor to evaluate controls
B)Regulations governing executive reporting and conduct
C)Rules about financial statement reporting
D)Audit committee/corporate governance requirements
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
22
Section 404 of SOX requires that the information technology auditor "sign off" that the financial statements are reliable.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
23
Computer assisted audit techniques:
A)Are never used in compliance testing
B)May be used for substantive and compliance testing
C)Are used primarily when auditing around the computer
D)Are good tools for auditors who are lacking in technical computer skills
A)Are never used in compliance testing
B)May be used for substantive and compliance testing
C)Are used primarily when auditing around the computer
D)Are good tools for auditors who are lacking in technical computer skills
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
24
The best educational background for a Certified Information Systems Auditor is:
A)A degree in information systems or technology
B)A degree which combines the study of accounting with the study of information systems
C)No college degree,but work experience in information systems
D)An accounting degree
A)A degree in information systems or technology
B)A degree which combines the study of accounting with the study of information systems
C)No college degree,but work experience in information systems
D)An accounting degree
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
25
Information technology governance:
A)Is a component of IT auditing
B)Has one objective - to ensure that IT is used strategically to fulfill an organization's mission
C)Is intended to ensure both the strategic use of IT and control over IT resources
D)Is primarily intended to deter IT fraud
A)Is a component of IT auditing
B)Has one objective - to ensure that IT is used strategically to fulfill an organization's mission
C)Is intended to ensure both the strategic use of IT and control over IT resources
D)Is primarily intended to deter IT fraud
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
26
The three conditions for fraud in the fraud triangle include incentive/pressure,rationalization,and opportunity.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
27
A computerized AIS is harder to audit than a manual system for all of the following reasons except:
A)The file information is not human readable
B)The volume of transaction records and master file records is usually much larger in computerized systems than in manual systems
C)An audit trail does not exist in a computerized AIS
D)Computerized systems often use remote real-time data processing,thus complicating the tracing of transaction records to their sources
A)The file information is not human readable
B)The volume of transaction records and master file records is usually much larger in computerized systems than in manual systems
C)An audit trail does not exist in a computerized AIS
D)Computerized systems often use remote real-time data processing,thus complicating the tracing of transaction records to their sources
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
28
One purpose of generalized audit software packages is to enable an auditor to examine the contents of computer files of interest without having to write a computer program himself/herself.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
29
Auditors may use transaction tagging to verify how a system processes certain transactions.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
30
The primary purpose of an internal audit is:
A)To verify the accuracy of a firm's financial statements
B)To punish employees for inefficient performance
C)To meet the requirements of the accounting profession
D)To ascertain employee adherence to organizational policies and procedures
A)To verify the accuracy of a firm's financial statements
B)To punish employees for inefficient performance
C)To meet the requirements of the accounting profession
D)To ascertain employee adherence to organizational policies and procedures
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
31
It is relatively easy to prevent hackers from unauthorized access to data and programs.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
32
SAS No.99 - Consideration of Fraud in a Financial Statement Audit guides auditors in being more proactive in detecting fraud than did the predecessor standard,SAS No.82.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
33
Test of program length is one approach to detecting the existence of a Trojan Horse.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
34
Through-the-computer auditing uses all of the following except:
A)Confirmation sampling
B)Test data
C)Tests of program authorization
D)Embedded audit modules
A)Confirmation sampling
B)Test data
C)Tests of program authorization
D)Embedded audit modules
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
35
If an auditor were to audit a payroll application using around-the-computer auditing techniques,the individual would:
A)Use test data
B)Verify that the output from the computerized processing was correct for the input data used to generate it
C)Never use a surprise audit because of the amount of time and work involved
D)Prepare a profile of a computer file and check the processed data with the profile thus obtained
A)Use test data
B)Verify that the output from the computerized processing was correct for the input data used to generate it
C)Never use a surprise audit because of the amount of time and work involved
D)Prepare a profile of a computer file and check the processed data with the profile thus obtained
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is not true?
A)An internal audit is never performed by external auditors
B)The primary goals of an internal audit and an external audit are somewhat different
C)Both internal and external audits are similar in their insistence upon objectivity in the performance of the audit evaluation
D)Both the internal audit and the external audit rely heavily upon the audit trail of transactions in an accounting system
A)An internal audit is never performed by external auditors
B)The primary goals of an internal audit and an external audit are somewhat different
C)Both internal and external audits are similar in their insistence upon objectivity in the performance of the audit evaluation
D)Both the internal audit and the external audit rely heavily upon the audit trail of transactions in an accounting system
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
37
The most important skills needed by information technology auditors are people skills.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
38
The advantages of around-the-computer auditing include:
A)The emphasis which is placed on testing data processing exceptions
B)Use of live data
C)The minimal disturbance of a company's records
D)both b and c
A)The emphasis which is placed on testing data processing exceptions
B)Use of live data
C)The minimal disturbance of a company's records
D)both b and c
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
39
The AICPA has decided to drop its WebTrust services and replace SysTrust with a general Trust assurance service.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
40
Information Technology (IT)governance includes using IT responsibly and efficiently,but not necessarily strategically.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
41
Information Technology governance includes all of the following except:
A)A decentralized approach to IT acquisition
B)Using IT strategically to carry out the objectives of an organization
C)Ensuring effective management of an organization's IT resources
D)Control over IT-related risks
A)A decentralized approach to IT acquisition
B)Using IT strategically to carry out the objectives of an organization
C)Ensuring effective management of an organization's IT resources
D)Control over IT-related risks
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
42
The most important advantage of an integrated test facility is that it:
A)Allows auditors to evaluate transactions in an operational setting
B)Can test every exception transaction as opposed to test data which includes only a limited set of such transactions
C)Works best at evaluating input controls
D)Has no disadvantages
A)Allows auditors to evaluate transactions in an operational setting
B)Can test every exception transaction as opposed to test data which includes only a limited set of such transactions
C)Works best at evaluating input controls
D)Has no disadvantages
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is not typically checked by an auditor in a review of a responsibility system of computer program development and maintenance?
A)Documentation of all program changes on proper change-request forms
B)Proper costing of all program change requests
C)A review of each program change request by an internal auditor
D)Matches between program documentation and the production version of a computer program
A)Documentation of all program changes on proper change-request forms
B)Proper costing of all program change requests
C)A review of each program change request by an internal auditor
D)Matches between program documentation and the production version of a computer program
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
44
Which section of SOX requires CEOs and CFOs to "sign off" on their company's financial statements?
A)Section 404
B)Section 201
C)Section 103
D)Section 302
A)Section 404
B)Section 201
C)Section 103
D)Section 302
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
45
All of the following are true concerning embedded audit modules except:
A)They provide for continuous auditing of application processing
B)The auditor does not have to be involved in the development of these programs
C)Once implemented,the system can capture information that is useful to the auditor on an ongoing basis
D)With this approach,the application program incorporates subroutines for audit purposes
A)They provide for continuous auditing of application processing
B)The auditor does not have to be involved in the development of these programs
C)Once implemented,the system can capture information that is useful to the auditor on an ongoing basis
D)With this approach,the application program incorporates subroutines for audit purposes
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
46
The greatest drawback of an integrated test facility is that:
A)It requires the construction of a high volume of test data
B)It introduces artificial transactions into the transaction stream
C)It produces overkill in the audit function
D)It is not broad enough to cover the entire spectrum of activities involved in the AIS
A)It requires the construction of a high volume of test data
B)It introduces artificial transactions into the transaction stream
C)It produces overkill in the audit function
D)It is not broad enough to cover the entire spectrum of activities involved in the AIS
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
47
Three common techniques auditors use to test computer programs are:
A)Test data,integrated test facilities,and parallel simulation
B)Test data,edit checks,and integrated test facilities
C)Test data,program change control,and parallel simulation
D)Program change control,edit checks,and parallel simulation
A)Test data,integrated test facilities,and parallel simulation
B)Test data,edit checks,and integrated test facilities
C)Test data,program change control,and parallel simulation
D)Program change control,edit checks,and parallel simulation
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following audit techniques is likely to require the most technical expertise on the part of an auditor?
A)Test data
B)Integrated test facility
C)Evaluation of program change control
D)Parallel simulation
A)Test data
B)Integrated test facility
C)Evaluation of program change control
D)Parallel simulation
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following statements is not true regarding people skills for IT auditors?
A)People skills are more important than technical skills
B)An example of people skills would be the ability to work as a team
C)In the case of protecting against computer viruses,technical skills matter more than people skills
D)Many internal controls evaluated by auditors concern human behavior
A)People skills are more important than technical skills
B)An example of people skills would be the ability to work as a team
C)In the case of protecting against computer viruses,technical skills matter more than people skills
D)Many internal controls evaluated by auditors concern human behavior
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
50
When an auditor audits with the computer,the auditor:
A)Uses the computer to process transaction data under normal processing conditions
B)Uses the computer as a tool to assist in various other auditing tasks
C)Relies heavily upon test data to evaluate the presence or absence of specific computer controls
D)Must also use an integrated test facility
A)Uses the computer to process transaction data under normal processing conditions
B)Uses the computer as a tool to assist in various other auditing tasks
C)Relies heavily upon test data to evaluate the presence or absence of specific computer controls
D)Must also use an integrated test facility
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
51
All of the following are examples of parameters that might be used to set passwords except:
A)A minimum password length of six digits
B)Restriction of passwords to alphanumeric characters only
C)Required use of words that can be found in a dictionary
D)A requirement for a minimum interval (such as one day)before a password may be changed
A)A minimum password length of six digits
B)Restriction of passwords to alphanumeric characters only
C)Required use of words that can be found in a dictionary
D)A requirement for a minimum interval (such as one day)before a password may be changed
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
52
An integrated test facility is used to:
A)Test only the computer programs of an AIS
B)Test only the manual operations of an AIS
C)Test both the programs and the manual operations of an AIS in an operational setting
D)Test the computer programs,the manual operations,and the auditing procedures of a company using a computerized AIS
A)Test only the computer programs of an AIS
B)Test only the manual operations of an AIS
C)Test both the programs and the manual operations of an AIS in an operational setting
D)Test the computer programs,the manual operations,and the auditing procedures of a company using a computerized AIS
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is not a condition for fraud as identified in the fraud triangle?
A)Incentives or pressures
B)Greed
C)Opportunity
D)Rationalization
A)Incentives or pressures
B)Greed
C)Opportunity
D)Rationalization
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
54
SQL is:
A)An example of an integrated test facility
B)A generalized audit software program
C)A tool used for continuous auditing
D)A tool used by auditors to retrieve and manipulate data
A)An example of an integrated test facility
B)A generalized audit software program
C)A tool used for continuous auditing
D)A tool used by auditors to retrieve and manipulate data
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
55
Prewritten computer programs used for audit purposes are called:
A)Sequential access program systems
B)Positive confirmation audit systems
C)Embedded audit modules
D)Generalized audit software packages
A)Sequential access program systems
B)Positive confirmation audit systems
C)Embedded audit modules
D)Generalized audit software packages
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following services is not prevented by SOX for an auditor to perform for their own client?
A)Internal auditing outsourcing services
B)Expert services related to the audit
C)Actuarial services
D)Implementation of a financial information system
A)Internal auditing outsourcing services
B)Expert services related to the audit
C)Actuarial services
D)Implementation of a financial information system
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
57
The term "test data" is associated with:
A)Auditing through-the-computer
B)Auditing around-the-computer
C)Auditing of manual accounting systems
D)Non-auditing procedures performed by a firm's accounting subsystem employees
A)Auditing through-the-computer
B)Auditing around-the-computer
C)Auditing of manual accounting systems
D)Non-auditing procedures performed by a firm's accounting subsystem employees
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
58
Under which audit technique is the way transactions are processed examined?
A)Exception reporting technique
B)Transaction tagging technique
C)Snapshot technique
D)Parallel simulation technique
A)Exception reporting technique
B)Transaction tagging technique
C)Snapshot technique
D)Parallel simulation technique
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
59
The four approaches to through-the-computer auditing include all but which of the following:
A)Use of embedded audit modules
B)Testing of outputs to verify processing
C)Computer program testing
D)Validation of computer programs
A)Use of embedded audit modules
B)Testing of outputs to verify processing
C)Computer program testing
D)Validation of computer programs
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
60
The auditor's role in reviewing the system of computer program development:
A)Does not include checking to see that all program changes are properly documented
B)Does not include a check of librarian functions
C)Does not include checking to see that program change requests are properly costed
D)Includes a cross-check of program changes against in-use programs
A)Does not include checking to see that all program changes are properly documented
B)Does not include a check of librarian functions
C)Does not include checking to see that program change requests are properly costed
D)Includes a cross-check of program changes against in-use programs
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
61
Controls over access to IT systems are particularly important because:
A)Weak access controls prevent unauthorized use of systems
B)Access controls allow auditors to employ continuous auditing techniques
C)Access controls make test data more effective
D)Weak access controls can allow users to bypass many other controls
A)Weak access controls prevent unauthorized use of systems
B)Access controls allow auditors to employ continuous auditing techniques
C)Access controls make test data more effective
D)Weak access controls can allow users to bypass many other controls
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is not a principle of the AICPA's Trust Services?
A)Maintainability
B)Availability
C)Online privacy
D)Processing integrity
A)Maintainability
B)Availability
C)Online privacy
D)Processing integrity
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
63
All of the following are reasons why SOX was enacted,except:
A)Enron's CEO,Jeffrey Skilling,claimed he did not know about the company's financial shenanigans because he was not involved in their accounting
B)Public perception was that auditors were having conflicts of interest with respect to the auditing and consulting services they provided
C)The FASB has long been thought to be ineffective
D)Congress wanted to restore investor confidence in the wake of a rash of corporate scandals
A)Enron's CEO,Jeffrey Skilling,claimed he did not know about the company's financial shenanigans because he was not involved in their accounting
B)Public perception was that auditors were having conflicts of interest with respect to the auditing and consulting services they provided
C)The FASB has long been thought to be ineffective
D)Congress wanted to restore investor confidence in the wake of a rash of corporate scandals
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
64
Continuous audit techniques can improve the effectiveness of the audit by:
A)Focusing most of the audit effort near the year-end
B)Alerting auditors to potential problems when the problems occur
C)Protecting the privacy of the auditors
D)Facilitating parallel simulation
A)Focusing most of the audit effort near the year-end
B)Alerting auditors to potential problems when the problems occur
C)Protecting the privacy of the auditors
D)Facilitating parallel simulation
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
65
Risks of using an integrated test facility include:
A)Failure to remove fake transactions from the client's system
B)High costs of building the facility
C)Discovery of many control weaknesses
D)none of the above
A)Failure to remove fake transactions from the client's system
B)High costs of building the facility
C)Discovery of many control weaknesses
D)none of the above
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck