Auditing Information Systems Solved Exam Questions - 1122 Verified Questions

Page 1


Auditing Information Systems

Solved Exam Questions

Course Introduction

Auditing Information Systems explores the principles, practices, and standards involved in assessing and ensuring the integrity, confidentiality, and availability of information systems within organizations. The course covers audit processes, risk assessment methodologies, internal control frameworks, and regulatory compliance in IT environments. Students will learn techniques for evaluating information system security, identifying vulnerabilities, and recommending improvements. Real-world case studies and hands-on exercises provide experience in planning, executing, and reporting on IT audits, preparing students for roles in IT governance, risk management, and assurance services.

Recommended Textbook

Information Technology Auditing 4th Edition by James Hall

Available Study Resources on Quizplus

12 Chapters

1122 Verified Questions

1122 Flashcards

Source URL: https://quizplus.com/study-set/1104

Page 2

Chapter 1: Auditing and Internal Control

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/21726

Sample Questions

Q1) Which of the following is the best reason to separate duties in a manual system?

A) to avoid collusion between the programmer and the computer operator

B) to ensure that supervision is not required

C) to prevent the record keeper from authorizing transactions

D) to enable the firm to function more efficiently

Answer: C

Q2) Which of the following indicates a strong internal control environment?

A) the internal audit group reports to the audit committee of the board of directors

B) there is no segregation of duties between organization functions

C) there are questions about the integrity of management

D) adverse business conditions exist in the industry

Answer: A

Q3) Not permitting the computer programmer to enter the computer room is an example of _______________________________.

Answer: segregation of duties

Q4) Using cameras to monitor the activities of cashiers is an example of

Answer: supervision

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: Auditing IT Governance Controls

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/21727

Sample Questions

Q1) What is an auditor looking for when testing computer center controls?

Answer: When testing computer center controls, the auditor is trying to determine that the physical security controls are adequate to protect the organization from physical exposures, that insurance coverage on equipment is adequate, that operator documentation is adequate to deal with operations and failures, and that the disaster recovery plan is adequate and feasible.

Q2) Which organizational structure is most likely to result in good documentation procedures?

A) separate systems development from systems maintenance

B) separate systems analysis from application programming

C) separate systems development from data processing

D) separate database administrator from data processing

Answer: A

Q3) Certain duties that are deemed incompatible in a manual system may be combined in a computer-based information system environment.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Auditing Operating Systems and Networks

Available Study Resources on Quizplus for this Chatper

105 Verified Questions

105 Flashcards

Source URL: https://quizplus.com/quiz/21728

Sample Questions

Q1) The audit trail for electronic data interchange transactions is stored on magnetic media.

A)True

B)False

Answer: True

Q2) In an electronic data interchange environment, customers routinely

A) access the vendor's accounts receivable file with read/write authority

B) access the vendor's price list file with read/write authority

C) access the vendor's inventory file with read-only authority

D) access the vendor's open purchase order file with read-only authority

Answer: C

Q3) An IP Address:

A) defines the path to a facility or file on the web.

B) is the unique address that every computer node and host attached to the Internet must have.

C) is represented by a 64-bit data packet.

D) is the address of the protocol rules and standards that governing the design of internet hardware and software.

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Auditing Database Systems

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/21729

Sample Questions

Q1) Which of the following is not a test of access controls?

A) biometric controls

B) encryption controls

C) backup controls

D) inference controls

Q2) Which backup technique is most appropriate for sequential batch systems?

A) grandparent-parent-child approach

B) staggered backup approach

C) direct backup

D) remote site, intermittent backup

Q3) What is the flat-file model?

Q4) One purpose of a database system is the easy sharing of data. But this ease of sharing can also jeopardize security. Discuss at least three forms of access control designed to reduce this risk.

Q5) What is the partitioned database approach and what are its advantages?

Q6) Why are the hierarchical and network models called navigational databases?

Q7) In the relational model, a data element is called a relation.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Q8) The __________________________ authorizes access to the database.

Chapter 5: Systems Development and Program Change

Activities

Available Study Resources on Quizplus for this Chatper

94 Verified Questions

94 Flashcards

Source URL: https://quizplus.com/quiz/21730

Sample Questions

Q1) A cost-benefit analysis is a part of the detailed

A) operational feasibility study

B) schedule feasibility study

C) legal feasibility study

D) economic feasibility study

Q2) What are program version numbers and how are the used?

Q3) Examples of one-time costs include all of the following except

A) hardware acquisition

B) insurance

C) site preparation

D) programming

Q4) When the nature of the project and the needs of the user permit, most organizations will seek a pre-coded commercial software package rather than develop a system in-house.

A)True

B)False

Q5) Discuss the three groups that participate in systems development.

Q7) List four types of facts that should be gathered during an analysis of a system. Page 7

Q6) Why is the payback method often more useful than the net present value method for evaluating systems projects?

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 6: Transaction Processing and Financial Reporting

Systems Overview

Available Study Resources on Quizplus for this Chatper

98 Verified Questions

98 Flashcards

Source URL: https://quizplus.com/quiz/21731

Sample Questions

Q1) The general journal is used to record recurring transactions that are similar in nature. A)True

B)False

Q2) All of the following can provide evidence of an economic event except A) source document

B) turn-around document

C) master document

D) product document

Q3) Real time processing is used for routine transactions in large numbers.

A)True

B)False

Q4) The block code is the coding scheme most appropriate for a chart of accounts. A)True B)False

Q5) Explain the purpose and contents of the general ledger master file.

Q6) Document flowcharts are used to represent systems at different levels of detail. A)True B)False

Q7) Give an example of how cardinality relates to business policy.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Computer Assisted Audit Tools and Techniques

Available Study Resources on Quizplus for this Chatper

82 Verified Questions

82 Flashcards

Source URL: https://quizplus.com/quiz/21732

Sample Questions

Q1) Which test is not an example of a white box test?

A) determining the fair value of inventory

B) ensuring that passwords are valid

C) verifying that all pay rates are within a specified range

D) reconciling control totals

Q2) Tracing is a method used to verify the logical operations executed by a computer application.

A)True

B)False

Q3) Describe and contrast the test data method with the integrated test facility.

Q4) Explain the three methods used to correct errors in data entry.

Q5) A check digit is a method of detecting data coding errors.

A)True

B)False

Q6) Discuss the three categories of input of input controls.

Q7) Name three types of transcription errors.

Q8) A run-to-run control is an example of an output control.

A)True

B)False

Q9) Discuss what is involved in creating test data. Page 10

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 8: Data Structures and Caatts for Data Extraction

Available Study Resources on Quizplus for this Chatper

81 Verified Questions

81 Flashcards

Source URL: https://quizplus.com/quiz/21733

Sample Questions

Q1) View integration combines the data needs to all users into a single-entity wide schema.

A)True

B)False

Q2) The deletion anomaly is the least important of the problems affecting unnormalized databases.

A)True

B)False

Q3) Which characteristic is associated with the database approach to data management?

A) data sharing

B) multiple storage procedures

C) data redundancy

D) excessive storage costs

Q4) In the relational database model all of the following are true except A) data is presented to users as tables

B) data can be extracted from specified rows from specified tables

C) a new table can be built by joining two tables

D) only one-to-many relationships can be supported

Q5) What are the six phases of view modeling?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 9: Auditing the Revenue Cycle

Available Study Resources on Quizplus for this Chatper

97 Verified Questions

97 Flashcards

Source URL: https://quizplus.com/quiz/21734

Sample Questions

Q1) Warehouse stock records are the formal accounting records for inventory.

A)True

B)False

Q2) Customers should be billed for back-orders when

A) the customer purchase order is received

B) the backordered goods are shipped

C) the original goods are shipped

D) customers are not billed for backorders because a backorder is a lost sale

Q3) The shipping notice

A) is mailed to the customer

B) is a formal contract between the seller and the shipping company

C) is always prepared by the shipping clerk

D) informs the billing department of the quantities shipped

Q4) The clerk who opens the mail routinely steals remittances. Describe a specific internal control procedure that would prevent or detect this fraud.

Q5) What makes point-of-sale systems different from revenue cycles of manufacturing firms?

Q6) What specific internal control procedure would prevent an increase in sales returns since salesmen were placed on commission?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 10: Auditing the Expenditure Cycle

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/21735

Sample Questions

Q1) In a merchandising firm, authorization for the payment of inventory is the responsibility of

A) inventory control

B) purchasing

C) accounts payable

D) cash disbursements

Q2) The blind copy of the purchase order that goes to the receiving department contains no item descriptions.

A)True

B)False

Q3) Ideally, payroll checks are written on a special bank account used only for payroll.

A)True

B)False

Q4) The major risk exposures associated with the receiving department include all of the following except

A) goods are accepted without a physical count

B) there is no inspection for goods damaged in shipment

C) inventories are not secured on the receiving dock

D) the audit trail is destroyed

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 11: Enterprise Resource Planning Systems

Available Study Resources on Quizplus for this Chatper

90 Verified Questions

90 Flashcards

Source URL: https://quizplus.com/quiz/21736

Sample Questions

Q1) Internal efficiency is cited as one reason for separating the data warehouse from the operational database. Explain.

Q2) Extracting data for a data warehouse

A) cannot be done from flat files.

B) should only involve active files.

C) requires that the files be out of service. D) follows the cleansing of data.

Q3) The role model assigns specific access privileges directly to individuals.

A)True

B)False

Q4) The big-bang approach involves converting from old legacy systems to the new ERP in one implementation step.

A)True

B)False

Q5) Describe the two-tier client server model.

Q6) If a chosen ERP cannot handle a specific company process bolt-on software may be available.

A)True

B)False

Q7) What is the client-server model?

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 12: Business Ethics, Fraud, and Fraud Detection

Available Study Resources on Quizplus for this Chatper

84 Verified Questions

84 Flashcards

Source URL: https://quizplus.com/quiz/21737

Sample Questions

Q1) Give two examples of employee fraud and explain how the theft might occur.

Q2) Describe the factors that constitute the fraud triangle. Why is it important to auditors?

Q3) Which characteristic is not associated with software as intellectual property?

A) uniqueness of the product

B) possibility of exact replication

C) automated monitoring to detect intruders

D) ease of dissemination

Q4) What are some conclusions to be drawn from the ACFE fraud study regarding losses from fraud?

Q5) Name three types of program fraud.

Q6) Computer fraud can take on many forms, including each of the following except

A) theft or illegal use of computer-readable information

B) theft, misuse, or misappropriation of computer equipment

C) theft, misuse, or misappropriation of assets by altering computer-readable records and files

D) theft, misuse, or misappropriation of printer supplies

Q7) Explain the problems associated with lack of auditor independence.

Q8) Explain the shell company fraud.

Q9) Contrast management fraud with employee fraud. Page 16

To view all questions and flashcards with answers, click on the resource link above.

Page 17

Turn static files into dynamic content formats.

Create a flipbook