Podcast
Questions and Answers
Which statement is incorrect when auditing in a CIS environment?
Which statement is incorrect when auditing in a CIS environment?
- A CIS environment changes the overall objective and scope of an audit. (correct)
- The auditor should consider how a CIS environment affects the audit.
- A CIS environment exists whether a computer of any type or size is involved.
- The use of a computer may affect the accounting and internal control systems.
Which of the following standards is mostly affected by a computerized information system?
Which of the following standards is mostly affected by a computerized information system?
- Standards of fieldwork (correct)
- Reporting standards
- General standards
- Second standard of field work
Which factor is least considered when an auditor needs to determine if specialized CIS Skills are needed?
Which factor is least considered when an auditor needs to determine if specialized CIS Skills are needed?
- Auditor's need to make analytical procedures during completion stage of audit. (correct)
- Design and perform appropriate tests of controls and substantive procedures.
- Sufficient understanding of the accounting and internal control system.
- Determine the effect of the CIS environment on the assessment of overall risk.
What relates to the materiality of financial statement assertions affected by computer processing?
What relates to the materiality of financial statement assertions affected by computer processing?
Which of the following least likely indicates complexity of computer processing?
Which of the following least likely indicates complexity of computer processing?
The nature of risks in a CIS environment that auditors are concerned with include all except:
The nature of risks in a CIS environment that auditors are concerned with include all except:
Which is least likely a risk characteristic associated with CIS environment?
Which is least likely a risk characteristic associated with CIS environment?
Which of the following significance of CIS activities would an auditor least understand?
Which of the following significance of CIS activities would an auditor least understand?
Which statement is correct regarding personal computer systems?
Which statement is correct regarding personal computer systems?
A personal computer can be used in various configurations, including:
A personal computer can be used in various configurations, including:
Which statement is incorrect regarding personal computer configurations?
Which statement is incorrect regarding personal computer configurations?
Which is the least likely characteristic of personal computers?
Which is the least likely characteristic of personal computers?
Which of the following is an inherent characteristic of a software package?
Which of the following is an inherent characteristic of a software package?
Which of the following is not normally a removable storage media?
Which of the following is not normally a removable storage media?
It is a computer program that attaches itself legitimate program to reproduce itself without user knowledge.
It is a computer program that attaches itself legitimate program to reproduce itself without user knowledge.
Which statement is incorrect in personal computer environments?
Which statement is incorrect in personal computer environments?
What is least likely a security measure to restrict access to personal computers when not in use?
What is least likely a security measure to restrict access to personal computers when not in use?
Which is not likely a control over removable storage prevent alteration without authorization?
Which is not likely a control over removable storage prevent alteration without authorization?
Which of the following least likely protects critical and sensitive information from unauthorized access?
Which of the following least likely protects critical and sensitive information from unauthorized access?
What refers to plans made by the entity to obtain access to hardware and software after failure?
What refers to plans made by the entity to obtain access to hardware and software after failure?
The effect of personal computers on the accounting system will least likely depend on...
The effect of personal computers on the accounting system will least likely depend on...
If control risk is high in personal computer systems, it may not be cost-effective for to implement controls.
If control risk is high in personal computer systems, it may not be cost-effective for to implement controls.
Computer systems that enable users to access data directly through workstations are:
Computer systems that enable users to access data directly through workstations are:
On-line systems allow users to directly initiate any, or all, functions. What is an example of such a function?
On-line systems allow users to directly initiate any, or all, functions. What is an example of such a function?
The functions performed by workstations depend all except which factor?
The functions performed by workstations depend all except which factor?
What is an example of Special Purpose Terminals?
What is an example of Special Purpose Terminals?
Special Purpose Terminals are used to initiate various banking transaction. Example of a Special Purpose Terminal is:
Special Purpose Terminals are used to initiate various banking transaction. Example of a Special Purpose Terminal is:
Which statement is incorrect regarding workstations?
Which statement is incorrect regarding workstations?
On-line computer systems may be classified according to:
On-line computer systems may be classified according to:
In an on-line/real time processing system:
In an on-line/real time processing system:
Flashcards
Incorrect Audit Statement?
Incorrect Audit Statement?
Overall objective and scope doesn't change
Biggest risks in CIS?
Biggest risks in CIS?
Lacks segregation of functions or transaction trails
Least Correct?
Least Correct?
Using software packages instead of customized software
Incorrect Statement About PC?
Incorrect Statement About PC?
Signup and view all the flashcards
Incorrect Configuration Statement?
Incorrect Configuration Statement?
Signup and view all the flashcards
Least Likely Character?
Least Likely Character?
Signup and view all the flashcards
Inherent characteristic software package?
Inherent characteristic software package?
Signup and view all the flashcards
Not Removable?
Not Removable?
Signup and view all the flashcards
Computer program
Computer program
Signup and view all the flashcards
Incorrect Internal Control Statement?
Incorrect Internal Control Statement?
Signup and view all the flashcards
Least Likely
Least Likely
Signup and view all the flashcards
Not a Control?
Not a Control?
Signup and view all the flashcards
Least Protection?
Least Protection?
Signup and view all the flashcards
Least Depend on?
Least Depend on?
Signup and view all the flashcards
Least Likely entail
Least Likely entail
Signup and view all the flashcards
Collection data?
Collection data?
Signup and view all the flashcards
Systems Employ
Systems Employ
Signup and view all the flashcards
Allows fictitious together
Allows fictitious together
Signup and view all the flashcards
Smaller volumes ?
Smaller volumes ?
Signup and view all the flashcards
Works with user?
Works with user?
Signup and view all the flashcards
Terminal Accuracy?
Terminal Accuracy?
Signup and view all the flashcards
Computer manufacturer?
Computer manufacturer?
Signup and view all the flashcards
EDP Environment?
EDP Environment?
Signup and view all the flashcards
Performed well test?
Performed well test?
Signup and view all the flashcards
Data method
Data method
Signup and view all the flashcards
Unapproved?
Unapproved?
Signup and view all the flashcards
Hardware prevent and monitor?
Hardware prevent and monitor?
Signup and view all the flashcards
Compilers?
Compilers?
Signup and view all the flashcards
Study Notes
Auditing in a Computerized Information Systems (CIS) Environment
- A statement noting that a CIS environment changes the audit's overall scope and objectives is incorrect.
- Standards or groups of standards most affected by a computerized information system environment involves audit fieldwork.
- An auditor needs to determine specialized CIS skills during preliminary stages of audit instead of stages which involve analytical procedures.
- Relates to materiality of financial statement assertions, which are affected by computer processing, and significance.
- Complexity in computer processing does not involve system generation of daily exception reports.
Complexity of Computer Processing
- Transactions occur between organizations electronically without manual intervention.
- Users struggle identifying and correcting data errors.
- Computer systems generate material transactions for other applications.
Nature of Risks in CIS Environments
- Cost-benefit ratio is not a risk factor.
- Identifying potential unauthorized data access or alteration without visible evidence is fundamental.
- Having changes in the master file handled exclusively by select users is a key component.
- You should least understand the organizational structure of a client’s CIS activities.
Hardware and Software
- Use of software packages instead of customized software is a good decision
- Programs and data are stored on only non-removable storage media.
- Stand-alone workstations can be operated by a single user or a number of users.
- A stand-alone workstation does not refer to a distributed system.
- You CAN use workstations for many purposes, in different locations all at the same time
- Personal computers are not relatively expensive.
- Software packages are often used without program modifications.
- Hard disks aren't the removable storage media
- Virus is the malware described as transmitting through executable code by attaching itself to a system.
- It is not easy to find general CIS controls to easily ascertain application controls
- Anti-virus software programs do not provide physical security when the device is not in use
- Data cryptography, as well as physical record protection is key
Computer Systems and Security
- You should avoid using anti-virus software or programs
- The affect of costs and the associated risks will not impact the cost of personal computers.
- Analytical procedures are better than test details
- Online computer systems enable users to directly access data and programs via workstations.
- The cost does not impact the various stations within an online computer system.
Workstations
- Workstations may exist locally or at remote sites
- Local workstations often are connected to through cables
- Remote workstations require telecommunications links
- Some workstations include general or specialized capabilities.
- Specialized workstations include basic keyboards, point of sale devices or intelligent terminals.
Network Classification
- A network, a computer system, enables equipment users to exchange software and data.
- MAN (Metropolitan Area Network) is for multiple buildings
- Wide Area Networks (WAN) are usually more expensive than LAN (Local Area Networks).
- Gateway is the hardware system which supports networks
- Transmission, and storage are key for data.
- Switch works to direct data in network settings.
Online Systems
- Immediate validation checks are a valuable characteristic for online computer systems.
- Important CIS controls involve access, system development, and edit reasonableness.
- Pre-processing authorization, balance, and transaction logs are crucial CIS applications.
- Access to data online provides opportunities to access programs by unauthorized personnel.
- Potential of unauthorized use of a workstation and entry of unauthorized transactions may be risky but not necessarily
- Authorization, completeness, accuracy, and integrity of processes impacts security
- Online immediate processing of data increases the potential for risk in wrong processing periods
- A collection of data that is shared by a number of users is a Database
Database Systems
- There are several data owners who are assigned responsibility for defining access.
- Standard approaches to data for application program development and adjustments improves control.
- It is critical to segregate data in separate files
- Discretionary access controls mandate the ability to assign security attributes to data
- An important point is name dependent retractions
- The rate of financial transactions impacts database systems risk
- Auditing mainly impacted by accounting needs
CIS Environments and Operations
- General CIS controls is most important in database environments.
- System operations reduces persons involving data so manual steps reduce
- System characteristics affect lack of visible transaction trail
- CIS design and procedural characteristics should follow programmed control procedures and update databases.
- Internal controls need to include design of computer programs
- Controls over computer data files are useful
- Monitoring is an excellent control as well as input and output control
General and Application Controls
- Auditors should analyze general controls related to applications
- Its important for the system to be accurate
- Design of application controls before general is more efficient
- Manual procedures are effective
- Preclude is important for applications
Auditing Tools
- Computer assisted audit techniques are the applications of auditing under computer
- They are often efficient means of testing large amounts of data and controls
- The presence of the auditor is not necessary for PAPS 1009 in small entities
- Computer assisted software like generalized or packet software supports
- Manual working papers is not a good procedure because systems aren't efficient
- Using groups instead of programmers and operators is crucial for security
- Password compatibility testing
- Self-checking digit checks system
Program and Data Integrity
- Up-to-date maintained programs are important
- Self-checking digit is how computer programs have built in hardware
- Firware makes programs more reliable
- Operators and programmers need limited access
- Hash totals to monitor payroll
- Completeness test
- Firmware prevents security from computer access
- Validity test ascertain given characteristics
- Control systems are hardware based
EDP and Systems Analysis
- State of art software and hardware is key to implementation
- Project leaders and programers are not part of internal control structure
- Audit software is an effective key to program controls
- The use of integrated test facility
- Limits and numbers
- Audit is not part of matrix
- It should be for all users
- EDP processes include machine readable sources
- Analyst designs systems
- Departments have to review data and totals after processing
- It should be initiated or changed by managers
Tests and Errors
- It must be for all tests
- The ones who change it is the operator
- It must be updated for errors
- Microcompters are able to control
- The source code is important
- Parallel has to have reports as well as be equal
- The novice has to create control
- Segragation is more likely
- Software is important
- Passwords need an expert
- To get results code has to be correct.
Test Data Approach
- All tests should be valid
- Auditors need some checks because that's the rules
- All tests need checks and limits
- Files need checks and code
- Errors must be valid and true
- Computer data needs to be confidential
- Access needs check
- Security protocols must be high
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.