A) Grandfather-father-son file retention
B) Input and output validation routines
C) Systems documentation
D) Check digit verification
Correct Answer
verified
Multiple Choice
A) create checkpoints at periodic intervals after data processing to test for unauthorized use of the system.
B) examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction.
C) enter invalid identification numbers or passwords to ascertain whether the system rejects them.
D) vouch a random sample of processed transactions to assure proper authorization.
Correct Answer
verified
Multiple Choice
A) the audit team's test data are consistent with the client's normal transactions.
B) controls operate as described in responses to internal control questionnaire items and program flowcharts.
C) every possible error is prevented or detected by the client's computer controls.
D) all possible combinations of valid data are correctly processed.
Correct Answer
verified
Multiple Choice
A) check digits.
B) valid sign tests.
C) sequence tests.
D) limit and reasonableness tests.
Correct Answer
verified
Multiple Choice
A) These standards enable the organization to understand the programming logic underlying recently-developed programs.
B) These standards ensure that the program controls and documentation included in recently-developed programs is adequate.
C) The absence of these standards would constitute a material weakness in internal control.
D) These standards ensure the appropriate separation of duties of computer personnel.
Correct Answer
verified
Multiple Choice
A) ensure that appropriate files are used in computerized processing.
B) ensure restricted access to the computing environment.
C) ensure that files are appropriately secured and protected from loss.
D) ensure that files can be reconstructed from earlier versions of information used in processing.
Correct Answer
verified
Multiple Choice
A) Completeness and Accuracy
B) Occurrence and Rights and Obligations
C) Accuracy and Occurrence
D) Completeness and Occurrence
Correct Answer
verified
Multiple Choice
A) can be performed using only actual transactions because testing simulated transactions does not provide relevant evidence.
B) can be performed using actual transactions or simulated transactions.
C) is impractical because many procedures within the computerized processing system leave no visible evidence of having been performed.
D) is inadvisable because it may distort the evidence in real-time systems.
Correct Answer
verified
Multiple Choice
A) access client data files.
B) prepare spreadsheets.
C) assess control risk related to computerized processing systems.
D) construct and perform parallel simulations.
Correct Answer
verified
Multiple Choice
A) existence of unclaimed payroll checks held by supervisors.
B) early cashing of payroll checks by employees.
C) discovery of invalid employee identification numbers.
D) proper approval of overtime by supervisors.
Correct Answer
verified
Multiple Choice
A) Batch totals
B) Hash totals
C) Missing data tests
D) Sequence tests
Correct Answer
verified
Multiple Choice
A) The test data are created for a separate entity and are run simultaneously with the client's actual data.
B) Only one of each type of error transaction needs to be included in the test data.
C) The manual results of processing the test data are compared to the results of processing these data through the client's computerized processing system.
D) Audit teams consider potential errors and conditions of interest in generating the test data.
Correct Answer
verified
Multiple Choice
A) Access to programs and data
B) Computer operations
C) Data file controls
D) Program change controls
Correct Answer
verified
Multiple Choice
A) computer controls.
B) environment controls.
C) automated application controls.
D) general controls.
Correct Answer
verified
Multiple Choice
A) Ensuring that all software acquisition and program development efforts are consistent with the organization's needs and objectives
B) Testing and validating new programs and developing proper implementation plans
C) Requiring that all programming efforts take place under the control of the requesting user department
D) Ensuring that data are converted completely and accurately for use in the new systems
Correct Answer
verified
Multiple Choice
A) Hardware controls are built into the computer by the computer manufacturer.
B) Backup files are stored in a location separate from original copies.
C) Personnel who are independent of data input perform parallel simulations.
D) System flowcharts provide accurate descriptions of computer operations.
Correct Answer
verified
Multiple Choice
A) The objective of the audit examination focuses on detection of fraud and theft through the computer.
B) The type of substantive procedures performed by the audit team change because of the use of computerized processing.
C) The effectiveness of computer controls implemented by the client over its computerized processing may need to be evaluated by audit teams.
D) Different independence standards are introduced for audit teams when clients utilize computerized processing.
Correct Answer
verified
Multiple Choice
A) test data.
B) test deck.
C) generalized audit software.
D) parallel simulation.
Correct Answer
verified
Showing 21 - 38 of 38
Related Exams