Application Controls Multiple Choice 1
Application Controls Multiple Choice 1
3. Which of the following are not key features and benefits of application control?
a. Identify and control which applications are in your it environment and which to add to
the it environment.
b. Control the design, security, and use of computer programs and the security of data files
in general throughout the organization.
c. Automatically identify trusted software that has authorization to run.
d. Prevent all other, unauthorized applications from executing – they may be malicious,
untrusted, or simply unwanted.
11. Controls which are designed to assure that the information processed by the computer is
authorized, complete, and accurate are called:
a. Input controls
b. Processing controls
c. Output controls
d. General controls
13. Where computer processing is used in significant accounting applications, internal control
procedures may be defined by classifying control procedures in two types: general and
a. Administrative
b. Specific
c. Application
d. Authorization
14. Which of the following computer related employees should not be allowed access to program
listings of application programs?
a. The systems analyst
b. The programmer
c. The operator
d. The librarian
17. In their consideration of a client’s CIS controls, the auditors will encounter general controls
and application controls. Which of the following is an application control?
a. The operations manual
b. Hash total
c. Systems documentation
d. Control over programs changes
19. Which of the following controls would be correctly classified as an application control?
a. Honesty testing to hire only honest individuals.
b. Organizationally separating the data processing functions from the accounting functions.
c. A manually prepared control total to verify that all transactions are correctly processed
through the system.
d. Storing supplies in a locked room with only the supply clerk having a key to the room.
20. Auditors should evaluate the general controls before evaluating _______because of the
potential for pervasive effects.
a. System controls
b. Hardware controls
c. User controls
d. Application controls
21. Which of the following statements is correct?
a. Auditors should evaluate application controls before evaluating general controls.
b. Auditors should evaluate application controls and general controls simultaneously.
c. Auditors should evaluate general controls before evaluating application controls.
d. None of these statements is correct.
22. Output controls are not designed to assure that data generated by the computer are:
a. Accurate
b. Distributed only to authorized people
c. Complete
d. Used appropriately by employees in making decisions
23. Application controls vary across the IT system. To gain an understanding of internal control
for a private company, the auditor must evaluate the application controls for every:
a. Every audit area.
b. Every material audit area.
c. Every audit area in which the client uses the computer.
d. Every audit area where the auditor plans to reduce assessed control risk.
25. Controls which are designed to assure that data generated by the computer is valid, accurate,
complete, and distributed only to authorized people are called:
a. Input controls
b. Processing controls
c. Output controls
d. General controls
26. Controls focus on detecting errors after processing is completed rather than preventing errors
prior to processing are called:
a. System controls
b. Processing controls
c. Hardware controls
d. Output controls
28. _________ controls prevent and detect errors while transaction data are processed.
a. Software
b. Application
c. Processing
d. Transaction
31. Certain CIS application controls that are particularly important to on line processing least
likely include:
a. Pre-processing authorization
b. Transaction logs
c. Cut off procedures
d. Balancing
32. Which of the following methods of testing application controls utilizes a generalized audit
software package prepared by the auditors?
a. Parallel simulation
b. Test data approach
c. Integrated testing facility approach
d. Exception report tests
33. Which of the following controls ensures the integrity of specific systems such as sales order
processing, accounts payable, and payroll applications?
a. General controls
b. Information controls
c. Application controls
d. Internal control
34. Computer accounting control procedures are referred to as general or application controls.
The primary objectives of application controls in a computer environment is to
a. Ensure that the computer system operates efficiently.
b. Ensure the validity, completeness, and accuracy of financial transactions.
c. Provide controls over the electronic functioning of the hardware.
d. Plan for the protection of the facilities and backup for the systems.
35. Computer applications use routines for checking the validity and accuracy of transaction data
called:
a. Operating system
b. Edit programs
c. Compiler programs
d. Integrated test facilities
e. Compatibility test
1. A 21. C
2. D 22. D
3. B 23. D
4. D 24. B
5. C 25. C
6. D 26. D
7. D 27. D
8. A 28. C
9. D 29. D
10. D 30. D
11. A 31. B
12. C 32. A
13. C 33. C
14. C 34. B
15. A 35. B
16. D 36. D
17. B 37. C
18. D 38. D
19. C 39. C
20. D 40. C