You are on page 1of 7

University of the Cordilleras

College of Accountancy
Second Term, AY 2018-2019

TEST QUESTIONS
Auditing in CIS Environment
Professor: Erwin L. Medina, CPA

INSTRUCTIONS: No examinees shall copy or refer to any solution, answer or work of


another or allow anyone to copy or refer to his work, nor in any manner help or ask the
help of any person or communicate with any person by means of words, signs gestures,
codes, and other similar acts which may enable him to exchange, impart or acquire
relevant information while the examination is in progress. Shade your corresponding
answers in the answer sheet, if your answer is not among the choices, shade letter E. Use
only PERMANENT PEN. No erasures. Do not detach any page of this questionnaire. (1 point
for each correct answer). 35 Items.

1. Which control is not associated with new systems development activities?


a. reconciling program version numbers
b. program testing
c. user involvement
d. internal audit participation

2. Which test of controls will provide evidence that the system as originally implemented
was free from material errors and free from fraud? Review of the documentation
indicates that
a. a cost-benefit analysis was conducted
b. the detailed design was an appropriate solution to the user's problem
c. tests were conducted at the individual module and total system levels prior
to implementation
d. problems detected during the conversion period were corrected in the
maintenance phase

3. Routine maintenance activities require all of the following controls except


a. documentation updates
b. testing
c. formal authorization
d. internal audit approval

4. Which statement is correct?


a. compiled programs are very susceptible to unauthorized modification
b. the source program library stores application programs in source code
form
c. modifications are made to programs in machine code language
d. the source program library management system increases operating
efficiency

5. Which control ensures that production files cannot be accessed without specific
permission?
a. Database Management System
b. Recovery Operations Function
c. Source Program Library Management System
d. Computer Services Function

6. Program testing
a. involves individual modules only, not the full system
b. requires creation of meaningful test data

Page 1 of 7
c. need not be repeated once the system is implemented
d. is primarily concerned with usability

7. Which statement is not true?


a. An audit objective for systems maintenance is to detect unauthorized
access to application databases.
b. An audit objective for systems maintenance is to ensure that applications
are free from errors.
c. An audit objective for systems maintenance is to verify that user requests
for maintenance reconcile to program version numbers.
d. An audit objective for systems maintenance is to ensure that the
production libraries are protected from unauthorized access.

8. When the auditor reconciles the program version numbers, which audit objective is
being tested?
a. protect applications from unauthorized changes
b. ensure applications are free from error
c. protect production libraries from unauthorized access
d. ensure incompatible functions have been identified and segregated

9. Which is not a level of a data flow diagram?


a. conceptual level
b. context level
c. intermediate level
d. elementary level

10. Which statement is not correct? The structured design approach


a. is a top-down approach
b. is documented by data flow diagrams and structure diagrams
c. assembles reusable modules rather than creating systems from scratch
d. starts with an abstract description of the system and redefines it to
produce a more detailed description of the system

11. An internal auditor noted the following points when conducting a preliminary
survey in connection with the audit of an EDP department. Which of the following
would be considered a safeguard in the control system on which the auditor might
rely?

a. Programmers and computer operators correct daily processing problems as they


arise.

b. The control group works with user organizations to correct rejected input.

c. New systems are documented as soon as possible after they begin processing live
data.

d. The average tenure of employees working in the EDP department is ten months.

12. An on-line access control that checks whether the user’s code number is
authorized to initiate a specific type of transaction or inquiry is referred to as

a. Password c. Compatibility test

Page 2 of 7
b. Limit check d. Reasonableness test

13. A control procedure that could be used in an on-line system to provide an


immediate check on whether an account number has been entered on a terminal
accurately is a

a. Compatibility test c. Record count

b. Hash total d. Self-checking digit

14. A control designed to catch errors at the point of data entry is

a. Batch total c. Self-checking digit

b. Record count d. Checkpoints

15. Program documentation is a control designed primarily to ensure that

a. Programmers have access to the tape library or information on disk files. b.


Programs do not make mathematical errors.

c. Programs are kept up to date and perform as intended. d. Data have been
entered and processed.

16. Some of the more important controls that relate to automated accounting
information systems are validity checks, limit checks, field checks, and sign tests. These
are classified as

a. Control total validation routines c. Output controls

b. Hash totaling d. Input validation routines

17. Most of today’s computer systems have hardware controls that are built in
by the computer manufacturer. Common hardware controls are

a. Duplicate circuitry, echo check, and internal header labels

b. Tape file protection, cryptographic protection, and limit checks

c. Duplicate circuitry, echo check, and dual reading

d. Duplicate circuitry, echo check, tape file protection, and internal header labels

18. Computer manufacturers are now installing software programs


permanently inside the computer as part of its main memory to provide
protection from erasure or loss if there is interrupted electrical power. This concept
is known as

Page 3 of 7
a. File integrity c. Random access memory (RAM)

b. Software control d. Firmware

19. Which one of the following represents a lack of internal control in a computer-
based information system?

a. The design and implementation is performed in accordance with


management’s specific authorization.

b. Any and all changes in application programs have the authorization and
approval of management.

c. Provisions exist to protect data files from unauthorized access, modification, or


destruction.

d. Both computer operators and programmers have unlimited access to the


programs and

data files.

20. In an automated payroll processing environment, a department manager


substituted the time card for a terminated employee with a time card for a
fictitious employee. The fictitious employee had the same pay rate and hours
worked as the terminated employee. The best control technique to detect this action
using employee identification numbers would be a

a. Batch total b. Hash total

c. Record count d. Subsequent check

21. An employee in the receiving department keyed in a shipment from a


remote terminal and inadvertently omitted the purchase order number. The best
systems control to detect this error would be

a. Batch total c. Sequence check

b. Completeness test d. Reasonableness test

22. The reporting of accounting information plays a central role in the regulation
of business operations. Preventive controls are an integral part of virtually all
accounting processing systems, and much of the information generated by the
accounting system is used for preventive control purposes. Which one of the
following is not an essential element of a sound preventive control system?

a. Separation of responsibilities for the recording, custodial, and authorization


functions.

b. Sound personnel policies.

c. Documentation of policies and procedures.

Page 4 of 7
d. Implementation of state-of-the-art software and hardware.

23. The most critical aspect regarding separation of duties within information systems is
between

a. Project leaders and programmers c. Programmers and systems analysts

b. Programmers and computer operators d. Data control and file librarians

24. Whether or not a real time program contains adequate controls is most effectively
determined by the use of

a. Audit software c. A tracing routine

b. An integrated test facility d. A traditional test deck

25. Compatibility tests are sometimes employed to determine whether an


acceptable user is allowed to proceed. In order to perform compatibility tests,
the system must maintain an access control matrix. The one item that is not part of
an access control matrix is a

a. List of all authorized user code numbers and passwords. b. List of all files
maintained on the system.

c. Record of the type of access to which each user is entitled.

d. Limit on the number of transaction inquiries that can be made by each user in a
specified time period.

26. Which one of the following input validation routines is not likely to be appropriate in
a real time operation?

a. Field check c. Sequence check

b. Sign check d. Redundant data check

27. Which of the following controls is a processing control designed to ensure the
reliability and accuracy of data processing?

Limit test Validity check test a. Yes Yes

b. No No c. No Yes d. Yes No

28. Which of the following characteristics distinguishes computer processing


from manual processing?

Page 5 of 7
a. Computer processing virtually eliminates the occurrence of computational
error normally associated with manual processing.

b. Errors or irregularities in computer processing will be detected soon after their


occurrences. c. The potential for systematic error is ordinarily greater in manual
processing than in

computerized processing.

d. Most computer systems are designed so that transaction trails useful for audit do not
exist.

29. Which of the following most likely represents a significant deficiency in the
internal control structure?

a. The systems analyst review applications of data processing and maintains


systems documentation.

b. The systems programmer designs systems for computerized applications and


maintains output controls.

c. The control clerk establishes control over data received by the EDP
department and reconciles control totals after processing

d. The accounts payable clerk prepares data for computer processing and enters the
data into

the computer.

30. Which of the following activities would most likely be performed in the EDP
Department?

a. Initiation of changes to master records.

b. Conversion of information to machine-readable form.

c. Correction of transactional errors.

d. Initiation of changes to existing applications.

31. For control purposes, which of the following should be organizationally


segregated from the computer operations function?

a. Data conversion c. Systems development

b. Surveillance of CRT messages d. Minor maintenance according to a


schedule

32. Which of the following is not a major reason for maintaining an audit trail for
a computer system?

Page 6 of 7
a. Deterrent to irregularities c. Analytical procedures b. Monitoring
purposes d. Query answering

33. In an automated payroll system, all employees in the finishing department were
paid the rate of P75 per hour when the authorized rate was P70 per hour. Which
of the following controls would have been most effective in preventing such an error?

a. Access controls which would restrict the personnel department’s access to


the payroll master file data.

b. A review of all authorized pay rate changes by the personnel department.

c. The use of batch control totals by department.

d. A limit test that compares the pay rates per department with the maximum
rate for all employees.

34. Which of the following errors would be detected by batch controls?

a. A fictitious employee as added to the processing of the weekly time cards by the
computer operator.

b. An employee who worked only 5 hours in the week was paid for 50 hours.

c. The time card for one employee was not processed because it was lost in transit
between the payroll department and the data entry function.

d. All of the above.

35. The use of a header label in conjunction with magnetic tape is most likely to prevent
errors by the

a. Computer operator c. Computer programmer

b. Keypunch operator d. Maintenance technician

Page 7 of 7

You might also like