Information Systems Auditing Review Questions - 1295 Verified Questions

Page 1


Information Systems Auditing Review Questions

Course Introduction

Information Systems Auditing focuses on the principles, practices, and methodologies involved in evaluating and ensuring the integrity, confidentiality, and availability of information systems within organizations. The course covers key topics such as audit planning, risk assessment, internal controls, compliance with legal and regulatory requirements, and the use of technology in auditing processes. Students will learn to assess information system vulnerabilities, evaluate the effectiveness of security measures, and provide recommendations for strengthening controls. Through case studies and real-world scenarios, participants gain practical skills in conducting audits, analyzing system risks, and preparing audit reports to support organizational governance and accountability.

Recommended Textbook

Information Technology Auditing 3rd Edition by James A. Hall

Available Study Resources on Quizplus 12 Chapters

1295 Verified Questions

1295 Flashcards

Source URL: https://quizplus.com/study-set/351

Page 2

Chapter 1: Auditing and Internal Control

Available Study Resources on Quizplus for this Chatper

103 Verified Questions

103 Flashcards

Source URL: https://quizplus.com/quiz/5812

Sample Questions

Q1) IT auditing is a small part of most external and internal audits.

A)True

B)False

Answer: False

Q2) Segregation of duties is an example of an internal control procedure.

A)True

B)False

Answer: True

Q3) An accounting system that maintains an adequate audit trail is implementing which internal control procedure?

A) access controls

B) segregation of functions

C) independent verification

D) accounting records

Answer: D

Q4) Not permitting the computer programmer to enter the computer room is an example of _______________________________.

Answer: segregation of duties

Q5) Locking petty cash in a safe is an example of __________________________. Answer: access controls

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Auditing IT Governance Controls

Available Study Resources on Quizplus for this Chatper

99 Verified Questions

99 Flashcards

Source URL: https://quizplus.com/quiz/5813

Sample Questions

Q1) An advantage of distributed data processing is that individual end user groups set specific IT standards without concern for the broader corporate needs.

A)True

B)False

Answer: False

Q2) Describe the components of a disaster recovery plan.

Answer: Every disaster recovery plan should: designate a second site backup identify critical applications perform backup and off-site storage procedures create a disaster recovery team test the disaster recovery plan

Q3) Briefly explain the core-competency theory.

Answer: Core competency theory argues that an organization should focus exclusively on its core business competencies,while allowing outsourcing vendors to efficiently manage the non-core areas such as the IT functions.

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Security Part I: Auditing Operating Systems and Networks

Available Study Resources on Quizplus for this Chatper

143 Verified Questions

143 Flashcards

Source URL: https://quizplus.com/quiz/5814

Sample Questions

Q1) The standard format for an e-mail address is DOMAIN NAME@USER NAME. A)True

B)False Answer: False

Q2) A smurf attack involves three participants: a zombie,an intermediary,and the victim.

A)True

B)False

Answer: False

Q3) IP spoofing is a form of masquerading to gain unauthorized access to a Web server.

A)True

B)False Answer: True

Q4) The message authentication code is calculated by the sender and the receiver of a data transmission.

A)True

B)False Answer: True

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: IT Security Part II: Auditing Database Systems

Available Study Resources on Quizplus for this Chatper

101 Verified Questions

101 Flashcards

Source URL: https://quizplus.com/quiz/5815

Sample Questions

Q1) _________________________ occurs when a specific file is reproduced for each user who needs access to the file.

Q2) How does the database approach solve the problem of data redundancy?

Q3) A recovery module suspends all data processing while the system reconciles its journal files against the database.

A)True

B)False

Q4) Ownership of data in traditional legacy systems often leads to data redundancy.This in turn leads to several data management problems.What are they? How does the database approach solve them?

Q5) What are the four primary elements of the database approach?

Q6) Which procedure will prevent two end users from accessing the same data element at the same time?

A) data redundancy

B) data replication

C) data lockout

D) none of the above

Q7) Describe an environment in which a firm should use a partitioned database.

Q8) What is DML?

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Systems Development and Program Change

Activities

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/5816

Sample Questions

Q1) Evaluators of the detailed feasibility study should not include

A) the internal auditor

B) the project manager

C) a user representative

D) the system designer

Q2) Explain the five stages of the systems development life cycle?

Q3) Routine maintenance activities require all of the following controls except

A) documentation updates

B) testing

C) formal authorization

D) internal audit approval

Q4) One-time costs include operating and maintenance costs.

A)True

B)False

Q5) A tangible benefit

A) can be measured and expressed in financial terms

B) might increase revenues

C) might decrease costs

D) all of the above

Q6) Outline the six controllable activities that relate to new systems development Page 7

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 6: Overview of Transaction Processing and Financial Reporting Systems

Available Study Resources on Quizplus for this Chatper

143 Verified Questions

143 Flashcards

Source URL: https://quizplus.com/quiz/5817

Sample Questions

Q1) Operational inefficiencies occur because

A) accounts both common and unique to many concurrent transactions need to be updated in real time.

B) accounts common to many concurrent transactions need to be updated in real time.

C) accounts unique to many concurrent transactions need to be updated in real time.

D) None of the above are true statements

Q2) . Explain two types of coding schemes and give examples of their use.

Q3) The type of transaction most suitable for batch processing is

A) airline reservations

B) credit authorization

C) payroll processing

D) adjustments to perpetual inventory

Q4) All of the following can provide evidence of an economic event except A) source document

B) turn-around document

C) master document

D) product document

Q5) How are computer system flowcharts and program flowcharts related?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Computer-Assisted Audit Tools and Techniques

Available Study Resources on Quizplus for this Chatper

83 Verified Questions

83 Flashcards

Source URL: https://quizplus.com/quiz/5818

Sample Questions

Q1) What control issue is related to reentering corrected error records into a batch processing system? What are the two methods for doing this?

Q2) The results of a parallel simulation are compared to the results of a production run in order to judge the quality of the application processes and controls.

A)True

B)False

Q3) The black box approach to testing computer applications require a detailed knowledge of the the program logic being tested.

A)True

B)False

Q4) The white box tests of program controls are also known as auditing through the computer.

A)True

B)False

Q5) In a computerized environment,all input controls are implemented after data is input.

A)True B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Data Structures and CAATTs for Data Extraction

Available Study Resources on Quizplus for this Chatper

89 Verified Questions

89 Flashcards

Source URL: https://quizplus.com/quiz/5819

Sample Questions

Q1) The two fundamental components of data structures are organization and access method.

A)True

B)False

Q2) A table is in third normal form when it is A) free of repeating group data

B) free of transitive dependencies

C) free of partial dependencies

D) free of deletion anomalies

E) none of the above.

Q3) When is a table in third normal form (3NF)?

Q4) Explain the three types of anomalies associated with database tables that have not been normalized.

Q5) Outline some of the key advantages of GAS.

GAS allows auditors to access electronically coded data files of their clients,both simple and complex structures,and to perform various operations on their contents.GAS is popular for the following reasons:

Q6) A network model does not allow children files to have multiple parent files.

A)True

B)False

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Auditing the Revenue Cycle

Available Study Resources on Quizplus for this Chatper

105 Verified Questions

105 Flashcards

Source URL: https://quizplus.com/quiz/5820

Sample Questions

Q1) What are the key segregation of duties related to computer programs that process accounting transactions.

Q2) State two specific functions or jobs that should be segregated in the cash receipts system.

Q3) Which situation indicates a weak internal control structure?

A) the mailroom clerk authorizes credit memos

B) the record keeping clerk maintains both accounts receivable and accounts payable subsidiary ledgers

C) the warehouse clerk obtains a signature before releasing goods for shipment

D) the accounts receivable clerk prepares customer statements every month

Q4) Which document is included with a shipment sent to a customer?

A) sales invoice

B) stock release form

C) packing slip

D) shipping notice

Q5) A clerk embezzles customer payments on account and covers up the theft by making an adjustment to the accounts receivable ledger.Describe a specific internal control procedure that would prevent this fraud.

Q6) What is automation and why is it used?

12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Auditing the Expenditure Cycle

Available Study Resources on Quizplus for this Chatper

144 Verified Questions

144 Flashcards

Source URL: https://quizplus.com/quiz/5821

Sample Questions

Q1) Timekeeping is part of the personnel function.

A)True

B)False

Q2) Authorization for a cash disbursement occurs in the cash disbursement department upon receipt of the supplier's invoice.

A)True

B)False

Q3) Which of the following situations represents a serious control weakness?

A) Timekeeping is independent of the payroll department.

B) Paychecks are distributed by the employees immediate supervisor.

C) Time cards are reconciled with job tickets.

D) Personnel is responsible for updating employee records, including creation of records for new hires.

Q4) Permitting warehouse staff to maintain the only inventory records violates separation of duties.

A)True

B)False

Q5) What is a personnel action form?

Q6) Differentiate between a purchase requisition and a purchase order.

Q7) Outline the key steps taken in the purchasing system?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Business Ethics, Fraud, and Fraud Detection

Available Study Resources on Quizplus for this Chatper

85 Verified Questions

85 Flashcards

Source URL: https://quizplus.com/quiz/5822

Sample Questions

Q1) Defalcation is another word for financial fraud.

A)True

B)False

Q2) When certain customers made cash payments to reduce their accounts receivable,the bookkeeper embezzled the cash and wrote off the accounts as uncollectible.Which control procedure would most likely prevent this irregularity?

A) segregation of duties

B) accounting records

C) accounting system

D) access controls

Q3) According to common law,there are five conditions that must be present for an act to be deemed fraudulent.Name and explain each.

Q4) What fraud detection responsibilities (if any)are imposed on auditors by the Sarbanes-Oxley Act?

Q5) Explain the problems associated with inappropriate accounting practices.

Q6) What is scavenging?

Q7) Describe the factors that constitute the fraud triangle.Why is it important to auditors?

Q8) What is check tampering?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 11: Enterprise Resource Planning Systems

Available Study Resources on Quizplus for this Chatper

92 Verified Questions

92 Flashcards

Source URL: https://quizplus.com/quiz/5823

Sample Questions

Q1) If a chosen ERP cannot handle a specific company process bolt-on software may be available.

A)True

B)False

Q2) The primary goal of installing an ERP system is achieving business process reengineering to improve customer service,reduce production time,increase productivity,and improve decision-making.

A)True

B)False

Q3) What is the client-server model?

Q4) Why must an organization expect the implementation of an ERP to disrupt operations?

Q5) OLAP includes decision support,modeling,information retrieval,and what-if analysis. A)True B)False

Q6) What is the "Big-Bang" approach?

Q7) Why does the data warehouse need to be separate from the operational databases?

Q8) How are OLTP and OLAP different? Give examples of their use.

Q9) How can a firm acquire bolt-on software? What are the options? Page 15

To view all questions and flashcards with answers, click on the resource link above.

Page 16

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook