Chapter 12
Chapter 12
Chapter 12
Multiple-Choice Questions
1. IT has several significant effects on an organization. Which of the following would not be
easy important from an auditing perspective?
d a. Organizational changes.
b. The visibility of information.
c. The potential for material misstatement.
d. None of the above; i.e., they are all important.
2. The audit procedure which is least useful in gathering evidence on significant computer
easy processes is:
b a. documentation.
b. observation.
c. test decks.
d. generalized audit software.
4. One significant risk related to an automated environment is that auditors may ____ information
easy provided by an information system.
b a. not place enough reliance on
b. place too much reliance on
c. reveal
d. not understand
6. Which of the following is not an enhancement to internal control that will occur as a
easy consequence of increased reliance on IT?
d a. Computer controls replace manual controls.
b. Higher quality information is available.
c. Computer-based controls provide opportunities to enhance separation of duties.
d. Manual controls replace automated controls.
Arens/Elder/Beasley
c. Hardware controls.
d. Input controls.
9. Old and new systems operating simultaneously in all locations is a test approach known as:
easy a. pilot testing.
d b. horizontal testing.
c. integrative testing.
d. parallel testing.
10. When the client uses a computer but the auditor chooses to use only the non-IT segment of
easy internal control to assess control risk, it is referred to as auditing around the computer. Which
a one of the following conditions need not be present to audit around the computer?
a. Computer programs must be available in English.
b. The source documents must be available in a non-machine language.
c. The documents must be filed in a manner that makes it possible to locate them.
d. The output must be listed in sufficient detail to enable the auditor to trace individual
transactions.
14. Predesigned formats, such as those used for audit documentation, can be created and saved
easy using electronic spreadsheets and word processors. These are called:
b a. desktop publishing.
b. templates.
c. macros.
d. work files.
15. ______ involves implementing a new system in one part of the organization, while other
easy locations continue to use the current system.
c a. Parallel testing
b. Online testing
c. Pilot testing
d. Control testing
16. To determine that user ID and password controls are functioning, an auditor would most likely:
easy a. attempt to sign on to the system using invalid user identifications and passwords.
a b. write a computer program that simulates the logic of the client’s access control software.
c. extract a random sample of processed transactions and ensure that the transactions were
Arens/Elder/Beasley
appropriately authorized.
d. examine statements signed by employees stating that they have not divulged their user
identifications and passwords to any other person.
17. When IT programs or files can be accessed from terminals, users should be required to enter
easy a(n):
d a. echo check.
b. parity check.
c. self-diagnosis test.
d. authorized password.
18. An auditor’s flowchart of a client’s system is a graphical representation that depicts the
auditor’s:
easy a. program for tests of controls.
b b. understanding of the system.
c. understanding of the types of errors that are probable given the present system.
d. documentation of the study and evaluation of the system.
20. Typical controls developed for manual systems which are still important in IT systems include:
medium a. proper authorization of transactions.
d b. competent and honest personnel.
c. careful and complete preparation of source documents.
d. all of the above.
21. ______ controls prevent and detect errors while transaction data are processed.
medium a. Software
c b. Application
c. Processing
d. Transaction
23. Which of the following is not associated with converting from a manual to an IT system?
medium a. It usually centralizes data.
d b. It permits higher quality and more consistent controls over operations.
c. It may eliminate the control provided by division of duties of independent persons who
perform related functions and compare results.
d. It may take the recordkeeping function and the document preparation function away from
those who have custody of assets and put those functions into the IT center.
24. Which of the following statements about general controls is not correct?
medium a. Disaster recovery plans should identify alternative hardware to process company data.
d b. Successful IT development efforts require the involvement of IT and non-IT personnel.
c. The chief information officer should report to senior management and the board.
d. Programmers should have access to computer operations to aid users in resolving
Arens/Elder/Beasley
problems.
27. Auditors should evaluate the ________ before evaluating application controls because of the
medium potential for pervasive effects.
d a. input controls
b. control environment
c. processing controls
d. general controls
28. A control that relates to all parts of the IT system is called a(n):
medium a. general control.
a b. systems control.
c. universal control.
d. applications control.
29. Controls which apply to a specific element of the system are called:
medium a. user controls.
d b. general controls.
c. systems controls.
d. applications controls.
31. Which of the following is least likely to be used in obtaining an understanding of client general
medium controls?
c a. Examination of system documentation
b. Inquiry of client personnel (e.g., key users)
c. Observation of transaction processing
d. Reviews of questionnaires completed by client IT personnel
33. Controls which are built in by the manufacturer to detect equipment failure are called:
medium a. input controls.
c b. fail-safe controls.
c. hardware controls.
Arens/Elder/Beasley
d. manufacturer’s controls.
35. Controls which are designed to assure that the information processed by the computer is
medium authorized, complete, and accurate are called:
a a. input controls.
b. processing controls.
c. output controls.
d. general controls.
38. ______ tests determines that every field in a record has been completed.
medium a. Validation
c b. Sequence
c. Completeness
d. Programming
41. Output controls are not designed to assure that data generated by the computer are:
medium a. accurate.
d b. distributed only to authorized people.
c. complete.
d. used appropriately by employees in making decisions.
42. Auditors usually obtain information about general and application controls through:
medium a. interviews with IT personnel.
d b. examination of systems documentation.
c. reading program change requests.
d. all of the above methods.
Arens/Elder/Beasley
43. When auditors consider only non-IT controls in assessing control risk, it is known as:
medium a. the single-stage audit.
c b. the test deck approach.
c. auditing around the computer.
d. generalized audit software (GAS).
44. The auditor’s objective to determine whether the client’s computer programs can correctly
medium handle valid and invalid transactions as they arise is accomplished through the:
a a. test data approach.
b. generalized audit software approach.
c. microcomputer-aided auditing approach.
d. generally accepted auditing standards.
45. The audit approach in which the auditor runs his or her own program on a controlled basis to
medium verify the client’s data recorded in a machine language is:
c a. the test data approach.
b. called auditing around the computer.
c. the generalized audit software approach.
d. the microcomputer-aided auditing approach.
46. Which of the following is not one of the three categories of testing strategies when auditing
medium through the computer?
a a. Pilot simulation.
b. Test data approach.
c. Parallel simulation.
d. Embedded audit module.
50. Because general controls have a _____ effect on the operating effectiveness of application
medium controls, auditors must consider general controls.
b a. nominal
b. pervasive
c. mitigating
d. worsening
51. Errors in data processed in a batch computer system may not be detected immediately because:
Arens/Elder/Beasley
medium a. transaction trails in a batch system are available only for a limited period of time.
b b. there are time delays in processing transactions in a batch system.
c. errors in some transactions cause rejection of other transactions in the batch.
d. random errors are more likely in a batch system than in an online system.
53. Which of the following computer-assisted auditing techniques allows fictitious and real
medium transactions to be processed together without client operating personnel being aware of the
c testing process?
a. Parallel simulation.
b. Generalized audit software programming.
c. Integrated test facility.
d. Test data approach.
55. In an IT system, automated equipment controls or hardware controls are designed to:
medium a. correct errors in the computer programs.
c b. monitor and detect errors in source documents.
c. detect and control errors arising from the use of equipment.
d. arrange data in a logical sequential manner for processing purposes.
56. If a control total were to be computed on each of the following data items, which would best be
medium identified as a hash total for a payroll IT application?
b a. Gross wages earned.
b. Employee numbers.
c. Total hours worked.
d. Total debit amounts and total credit amounts.
57. What tools do companies use to limit access to sensitive company data?
medium
a Encryption techniques Digital signatures Firewall
a. Yes Yes Yes
b. Yes No No
c. No Yes Yes
d. Yes Yes No
58. Rather than maintain an internal IT center, many companies use ________ to perform many
medium basic functions such as payroll.
b a. external general service providers
b. external application service providers
c. internal control service providers
d. internal auditors
59. A company uses the account code 669 for maintenance expense. However, one of the company
medium clerks often codes maintenance expense as 996. The highest account code in the system is 750.
Arens/Elder/Beasley
d What internal control in the company’s computer program would detect this error?
a. Pre-data input check.
b. Valid-character test.
c. Sequence check.
d. Valid-code test.
61. It is common in IT systems to have certain types of transactions initiated automatically by the
challenging computer. Which of the following activities would not be an appropriate candidate for
d automatic computer initialization?
a. In a bank, periodic calculation of interest on customer accounts.
b. In a manufacturing facility ordering inventory at preset order levels.
c. In a hospital, the ordering of oxygen when pre-specified levels are achieved.
d. In an investment brokerage firm, the sale of pharmaceutical stocks when the Dow-Jones
Industrial Average falls below a certain level.
62. Application controls vary across the IT system. To gain an understanding of internal control for
challenging a private company, the auditor must evaluate the application controls for every:
d a. every audit area.
b. every material audit area.
c. every audit area in which the client uses the computer.
d. every audit area where the auditor plans to reduce assessed control risk.
63. Many clients have outsourced the IT functions. The difficulty the independent auditor faces
challenging when a computer service center is used is to:
c a. gain the permission of the service center to review their work.
b. find compatible programs that will analyze the service center’s programs.
c. determine the adequacy of the service center’s internal controls.
d. try to abide by the Code of Professional Conduct to maintain the security and
confidentiality of client’s data.
64. An auditor who is testing IT controls in a payroll system would most likely use test data that
challenging contain conditions such as:
a a. time tickets with invalid job numbers.
b. overtime not approved by supervisors.
c. deductions not authorized by employees.
d. payroll checks with unauthorized signatures.
66. In comparing (1) the adequacy of the hardware controls in the system with (2) the
challenging organization’s methods of handling the errors that the computer identifies, the independent
auditor is:
c a. unconcerned with both (1) and (2).
b. equally concerned with (1) and (2).
c. less concerned with (1) than with (2).
d. more concerned with (1) than with (2).
Arens/Elder/Beasley
Arens/Elder/Beasley
67. Service auditors do not issue which of the following types of reports?
challenging a. Report on implemented controls
b b. Report on controls that have been implemented and tested for design effectiveness
c. Report on controls that have been implemented and tested for operating effectiveness
d. Each of the above is issued.
Essay Questions
71. Discuss how the integration of IT into accounting systems enhances internal control.
medium
Answer:
Enhancements to internal control resulting from the integration of IT into accounting
systems include:
Computer controls replace manual controls. Replacing manual procedures with
programmed controls that apply checks and balances to each processed transaction
and that process information consistently can reduce human error that is likely to
occur in traditional manual environments.
Higher quality information is available. IT systems typically provide management
with more and higher quality information faster than most manual systems.
Arens/Elder/Beasley
72 Identify the three categories of application controls, and give one example of each.
medium
Answer:
Application controls fall into three categories:
Input controls. Key verification and check digits are examples of input controls.
Processing controls. One example is a reasonableness test for the unit selling price of
a sale.
Output controls. One example is post-processing review of sales transactions by the
sales department.
73. Discuss what is meant by the term “auditing around the computer.”
medium
Answer:
“Auditing around the computer” occurs when the auditor considers only the non-IT
controls when assessing control risk. Under this approach, the auditor obtains an
understanding of internal control and performs tests of controls, substantive tests of
transactions, and account balance verification procedures in the same manner as in manual
systems. However, there is no attempt to test, or rely on, the client’s IT controls.
74. Discuss the circumstances that must exist for the auditor to “audit around the computer.”
medium
Answer:
To “audit around the computer,” the following conditions must exist:
The source documents must be available in a form readable by a human.
The documents must be maintained in a manner that makes it possible to locate them
for auditing purposes.
The output must be listed in sufficient detail to enable the auditor to trace individual
transactions from the source documents to the output and vice versa.
If any of these conditions does not exist, the auditor will have to rely on computer-oriented
controls.
Arens/Elder/Beasley
76. What are the two software testing strategies that companies typically use? Which strategy is
medium more expensive?
Answer:
Companies may use pilot testing and parallel testing to test new software. Pilot testing
involves operating the new software at a limited number of facilities, while continuing to
operate the old software at all other locations. Parallel testing involves operating the new
and old software simultaneously. Parallel testing is more expensive than pilot testing.
77. Discuss the advantages and benefits of using generalized audit software.
medium
Answer:
Advantages and benefits of using generalized audit software include:
they are developed in such a manner that most of the audit staff can be trained to use
the program even if they have little formal IT education.
a single program can be applied to a wide range of tasks without having to incur the
cost or inconvenience of developing individualized programs.
generalize audit software can perform tests much faster and in more detail than using
traditional manual procedures.
78. Why do businesses use networks? Describe a local area network and a wide area network.
medium
Answer:
Networks are used to link equipment such as microcomputers,
midrange computers, mainframes, work stations, servers, and printers.
A local area network links equipment within a single or small cluster of
buildings and is used only within a company. A wide area network links
equipment in larger geographic regions, including global operations.
79. Discuss the four areas of responsibility under the IT function that should be segregated in large
medium companies.
Answer:
The responsibilities for IT management, systems development, operations, and data
control should be separated:
IT Management. Oversight of the IT function should be segregated from the systems
development, operations, and data control functions. Oversight of IT should be the
responsibility of the Chief Information Officer or IT manager.
Systems development. Systems analysts are responsible for the overall design of each
application system. Programmers develop, test, and document applications software.
Programmers and analysts should not have access to input data or computer
operations.
Operations. Computer operators are responsible for the day-to-day operations of the
computer.
Data control. Data control personnel independently verify the quality of input and the
reasonableness of output.
Arens/Elder/Beasley