Deck 15: IT Controls Part I: Sarbanes-Oxley and It Governance

ملء الشاشة (f)
exit full mode
سؤال
INTERNAL CONTROL
Gustave, CPA, during its preliminary review of the financial statements of Comet, Inc., found a lack of proper segregation of duties between the programming and operating functions. Comet owns its own computing facilities. Gustave diligently intensified the internal control study and assessment tasks relating to the computer facilities. Gustave concluded in its final report that sufficient compensating general controls provided reasonable assurance that the internal control objectives were being met.
Required
What compensating controls are most likely in place?
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
PHYSICAL SECURITY OF DATA CENTER
Big Apple Financials, Inc., is a financial services firm located in New York City. The company keeps client investment and account information on a server at its Brooklyn data center. This information includes the total value of the portfolio, type of investments made, the income structure of each client, and associated tax liabilities. The company has recently upgraded its Web site to allow clients to access their investment information.
The company's data center is in the basement of a rented building. Company management believes that the location is secure enough to protect their data from physical threats. The servers are housed in a room that has smoke detectors and associated sprinklers. It is enclosed, with no windows, and has temperature-controlled air conditioning. The company's auditors, however, have expressed concern that some of the measures at the current location are inadequate and that newer alternatives should be explored. Management has expressed counter concerns about the high cost of purchasing new equipment and relocating its data center.
Required
a. Why are Big Apple's auditors stressing the need to have a better physical environment for the server?
b. Describe six control features that contribute to the physical security of the computer center.
c. Big Apple management is concerned about the cost of relocating the data center. Discuss some options open to them that could reduce their operating costs and provide the security the auditors seek.
سؤال
Discuss the differences between the attest function and assurance services.
سؤال
What is fault tolerance?
سؤال
Explain the concept of materiality.
سؤال
Distinguish between inherent risk and control risk. How do internal controls affect inherent risk and control risk, if at all? What is the role of detection risk?
سؤال
At which stage of the general accounting model is it easiest to commit computer fraud?
سؤال
DISTRIBUTED DATA PROCESSING
Explain why an organization would choose to install a distributed instead of a centralized computer system.
سؤال
Explain the outsourcing risk of failure to perform.
سؤال
What tasks do auditors perform during audit planning, and what techniques are used?
سؤال
Discuss the key features of Section 302 of SOX.
سؤال
Prior to SOX, external auditors were required to be familiar with the client organization's internal controls, but not to test them. Explain why.
سؤال
Explain at least three forms of computer fraud.
سؤال
Differentiate between general and application controls. Give two examples of each.
سؤال
What is RAID?
سؤال
Distinguish between tests of controls and substantive testing.
سؤال
Which of the following is NOT a task performed in the audit planning phase?

A) Reviewing an organization's policies and practices
B) Planning substantive testing procedures
C) Reviewing general controls
D) Determining the degree of reliance on controls
سؤال
Which of the following disaster recovery techniques may be least optimal in the case of a widespread natural disaster?

A) Empty shell
B) Internally provided backup
C) ROC
D) They are all equally beneficial
سؤال
Which of the following is associated with the unique characteristics of an industry?

A) Inherent risk
B) Detection risk
C) Control risk
D) None of the above
سؤال
Define the management assertions of existence or occurrence, completeness, rights and obligations, valuation or allocation, and presentation and disclosure.
سؤال
Explain vendor exploitation.
سؤال
What is audit risk?
سؤال
SERVICE PROVIDER AUDIT
The Harvey Manufacturing Company is undergoing its annual financial statement audit. Last year the company purchased an SaaS application from Excel Systems (a cloud service provider) to run mission critical financial transactions. The SaaS application runs on an IaaS server, which Excel Systems outsourced to another service provider.
Required
Explain how the Harvey Manufacturing auditors will assess the relevant internal controls related to these mission critical transactions.
سؤال
DISASTER RECOVERY PLANNING CONTROVERSY
The relevance of a disaster recovery plan (DRP) to a financial statement audit is a matter of debate. Some argue that the existence of a DRP is irrelevant to the audit. Others argue that it is an important control that needs to be considered in the assessment of internal control.
Required
Address both sides of this debate.
a. Provide a logical argument why a DRP should not be considered in the audit.
b. Argue why a DRP is an important control and should be reviewed within the conduct of a financial audit.
سؤال
DISASTER RECOVERY PLAN
Hexagon is an online retailer of exotic foods including spices from around the world, canned sauces, and prepackaged breads such as tortillas and naan. The company does 100% of its business over the Internet to consumers and through private networks with retail trading partners. Recently, Hexagon moved its sales and business headquarters functions into a warehouse on the outskirts of San Francisco. Prior to the move, the company engaged the services of an architect to redesign the facility to be modern yet in keeping with the original character of the building. While remodeling the warehouse, the architects retained the wooden-shingled exterior and the exposed wooden beams throughout the interior. The data processing center, which contained the servers and networked terminals were situated in a large open area with high ceilings and skylights. The center was made accessible to the rest of the staff to be consistent with the firm's philosophy of removing barriers and encouraging a team approach to problem solving. Before occupying the new facility, city inspectors declared the building to be compliant with all relevant building codes.
In a recent compliance audit, Hexagon's auditors advised the company's management to develop a disaster recovery plan. Toward this end, the company entered into a mutual aid agreement with several other firms in the area that had similar technology systems. These firms all agreed verbally to provide emergency assistance to each other in the event of disasters or emergencies. In addition, Hexagon implemented a data backup system in which all files are copied daily to tapes and disks and each week the backup storage devices are taken to an offsite facility where they are secured.
The operator's manual with instructions on how to restore the system is stored in the main data processing area along with a list of names and phone numbers of key IT professionals to contact in case of an emergency.
Required
a. Describe the internal control weaknesses present at Hexagon.
b. List the components that should be included in a disaster recovery plan for a company like Hexagon.
c. What factors, other than those included in the plan itself, should a company consider when formulating a disaster recovery plan?
سؤال
What are the primary reasons for separating operational tasks?
سؤال
What is the purpose of an audit?
سؤال
Distinguish between errors and irregularities. Which do you think concerns auditors the most?
سؤال
SOX contains many sections. Which sections are the focus of this chapter?
سؤال
What is the relationship between tests of controls and substantive tests?
سؤال
How do automated authorization procedures differ from manual authorization procedures?
سؤال
An organization's internal audit department is usually considered an effective control mechanism for evaluating the organization's internal control structure. Birch Company's internal auditing function reports directly to the controller. Comment on the effectiveness of this organizational structure.
سؤال
Explain why reduced security is an outsourcing risk.
سؤال
List the four general control areas.
سؤال
Discuss the key features of Section 404 of SOX.
سؤال
Does a qualified opinion on internal controls over the financial reporting system necessitate a qualified opinion on the financial statements? Explain why or why not.
سؤال
A bank in California has 13 branches spread throughout northern California, each with its own minicomputer where its data are stored. Another bank has 10 branches spread throughout California, with the data being stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster?
سؤال
What problems may occur as a result of combining applications programming and maintenance tasks into one position?
سؤال
Discuss the concept of independence within the context of an audit.
سؤال
What types of documents would an auditor review in testing organizational structure controls? Why is it also important to observe actual behavior?
سؤال
2 Which of the following is the best example of an application control objective?

A) Ensure that the computer operating system functions efficiently.
B) Provide backup facilities in the event of a disaster.
C) Prevent unauthorized access to corporate databases.
D) Ensure the validity, completeness, and accuracy of sales transactions.
سؤال
Which of the following is NOT a potential threat to computer hardware and peripherals?

A) Low humidity
B) High humidity
C) Carbon dioxide fire extinguishers
D) Water sprinkler fire extinguishers
سؤال
Which of the following is not true about the SSAE 16 report?

A) It is a third-party attestation report.
B) It replaced Statement on Auditing Standards No. 70 (SAS 70).
C) The service provider prepares a separate SSAE 16 report tailored to the needs of each of its client firms, which the client auditors rely upon.
D) When using the carve-out method, service provider management would exclude the subservice organization's relevant controls.
E) All of the above are true.
سؤال
Discuss why any distinction between IT auditing and financial auditing is not meaningful.
سؤال
Explain how IT outsourcing can lead to loss of strategic advantage.
سؤال
What are some tests of physical security controls?
سؤال
INTERNAL CONTROL
During the past year, Howard Industries has experienced excessive employee turnover in their IT function. Exit interviews with employees revealed that they were dissatisfied with the working environment. Howard employed the services of a management consulting firm that had expertise in employee relationship management. The consulting firm made recommendation to restructure IT operations to create a greater sense of "ownership" among the IT staff. After three months, under the new operation a survey indicated a marked increase in the level of job satisfaction among the IT group.
During the conduct of the audit planning phase of the annual financial audit, the auditor observed the following practices: Individual IT professionals are assigned exclusively to support specific business functions such as sales processing, billing, customer account maintenance, etc. Each professional provides a range of IT services for their respective users including computer operations, program changes, and documenting the system through record layouts, system flowcharts, and program listings. They also reconcile computer output reports and logs of transactions errors.
Required
a. Identify and explain any control concerns you have with the new operations.
b. What potential computer fraud might this operational approach permit?
سؤال
SEPARATION OF DUTIES
Transferring people from job to job within the organization is the philosophy at Arcadia Plastics. Management believes that job rotation deters employees from feeling that they are stagnating in their jobs and promotes a better understanding of the company. The computer services personnel typically work for six months as an operator, one year as a systems developer, six months as a database administrator, and one year in systems maintenance. At that point, they are assigned to a permanent position.
Required
Discuss the importance of separation of duties within the information systems department. How can Arcadia Plastics have both job rotation and well-separated duties?
سؤال
INTERNAL CONTROL AND DISTRIBUTED SYSTEM
Until a year ago, Dagwood Printing Company had always operated in a centralized computer environment. Now, 75 percent of the office employees have a PC. Users have been able to choose their own software packages, and no documentation of end user- developed applications has been required. Next month, each PC will be linked into a local area network and to the company's mainframe.
Required
a. Outline a plan of action for Dagwood Printing Company to ensure that the proper controls over hardware, software, data, people, procedures, and documentation are in place.
b. Discuss any risks the company may face if the devised plan is not implemented.
سؤال
Why is poor-quality systems documentation a prevalent problem?
سؤال
What is the meaning of the term attest service?
سؤال
What are the often-cited benefits of IT outsourcing?
سؤال
Define audit risk.
سؤال
Define general controls.
سؤال
Explain why certain duties that are deemed incompatible in a manual system may be combined in a computer-based information system environment. Give an example.
سؤال
Discuss how the process of obtaining audit evidence in a IT environment is inherently different from obtaining it in a manual system.
سؤال
Explain the role of Statement on Standards for Attestation Engagements No. 16 (SSAE 16) report in the review of internal controls.
سؤال
Define commodity IT asset.
سؤال
404 requires management to make a statement identifying the control framework used to conduct the assessment of internal controls. Discuss the options in selecting a control framework.
سؤال
The PCAOB Standard No. 5 specifically requires auditors to understand transaction flows in designing their tests of controls. What steps does this entail?
سؤال
Compare and contrast the following disaster recovery options: empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as from most costly to least costly.
سؤال
What is the role of a corporate computer services department? How does this differ from other configurations?
سؤال
What are assurance services?
سؤال
Define specific asset.
سؤال
Which of the following statements is true?

A) Both the SEC and the PCAOB require the use of the COSO framework.
B) Any framework can be used that encompasses all of COSO's general themes.
C) The SEC recommends COBIT and the PCAOB recommends COSO.
D) Both the SEC and the PCAOB require the COBIT framework.
E) None of the above are true.
سؤال
Which of the following is NOT requirement of Section 302 of SOX?

A) Corporate management (including the CEO) must certify monthly and annually their organization's internal controls over financial reporting.
B) Auditors must interview management regarding significant changes in the design or operation of internal control that occurred since the last audit.
C) Auditors must determine whether changes in internal control have materially affected, or are likely to materially affect, internal control over financial reporting.
D) Management must disclose any material changes in the company's internal controls that have occurred during the most recent fiscal quarter.
E) All of the above are requirements.
سؤال
INTERNAL CONTROL RESPONSIBILITY FOR OUTSOURCED IT
Explain why managers who outsource their IT function may or may not also outsource responsibility for IT controls. What options are open to auditors regarding expressing an opinion on the adequacy of internal controls?
سؤال
Some internal controls can be tested objectively. Discuss some internal controls that you think are relatively more subjective to assess in terms of adequacy than others.
سؤال
How do SSAE 16 Type 1 and Type 2 differ?
سؤال
List five risks associated with IT outsourcing.
سؤال
DISTRIBUTED PROCESSING SYSTEM
The internal audit department of a manufacturing company conducted a routine examination of the company's distributed computer facilities. The auditor's report was critical of the lack of coordination in the purchase of PC systems and software that individual departments use. Several different hardware platforms, operating systems, spreadsheet packages, database systems, and networking applications were in use. In response to the internal audit report, and without consulting with department users regarding their current and future systems needs, Mr. Marten, the vice president of Information Services, issued a memorandum to all employees stating the following new policies:
1. The Micromanager Spreadsheet package has been selected to be the standard for the company, and all employees must switch to it within the month.
2. All future PC purchases must be Megasoft compatible.
3. All departments must convert to the Megasoft Entree database package.
4. The office of the vice president of Information Services must approve all new hardware and software purchases.
Several managers of other operating departments have complained about Marten's memorandum.
Required
a. Regarding setting systems standards in a distributed processing environment, discuss factors pertinent to:
1. Computer hardware and software considerations
2. Controls considerations
b. Discuss the benefits of having standardized hardware and software distributed across departments in the firm.
c. Discuss the concerns that the memorandum is likely to create for distributed users in the company.
سؤال
DISASTER RECOVERY SERVICE PROVIDERS
Visit SunGard's website, http://www.sungard.com, and research its recovery services offered for the following classes: High Availability, System Recovery, and End-User Recovery. Write a report of your findings.
سؤال
What are the three primary IT functions that must be separated?
سؤال
What are the five control implications of distributed data processing?
سؤال
What are the conceptual phases of an audit? How do they differ between general auditing and IT auditing?
سؤال
Distinguish between errors and irregularities.
سؤال
What is computer fraud, and what types of activities does it include?
سؤال
Who should determine and prioritize the critical applications? How is this done? How frequently is it done?
سؤال
Give a specific example, other than the one in the chapter, to illustrate the relationship between risk, control, audit objective, and tests of control.
سؤال
How are the carve-out and inclusive methods of reporting on subservice organizations different?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/90
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: IT Controls Part I: Sarbanes-Oxley and It Governance
1
INTERNAL CONTROL
Gustave, CPA, during its preliminary review of the financial statements of Comet, Inc., found a lack of proper segregation of duties between the programming and operating functions. Comet owns its own computing facilities. Gustave diligently intensified the internal control study and assessment tasks relating to the computer facilities. Gustave concluded in its final report that sufficient compensating general controls provided reasonable assurance that the internal control objectives were being met.
Required
What compensating controls are most likely in place?
Internal Controls:
• Internal controls are generally divided into two types of controls: application and general.
• Application controls deal with the completeness, accuracy and validity of financial transactions.
• General controls are related to the entire system. They include controls on IT governance, IT infrastructure, security of network and operating system, access on database, acquisition and development of applications and changes in program.
Following compensating general controls are most likely in place:
• Adequate documentation must be there.
• IT infrastructure deals with the physical security of the computer center that is the systems of room temperature, fire extinguishers and fault tolerance control must be there.
• There should be security provisions for networks and operating system. There must be policies for computer security.
• Database access must be limited and by authorized personnel only.
• Verification of user rights and access privileges must be done.
2
PHYSICAL SECURITY OF DATA CENTER
Big Apple Financials, Inc., is a financial services firm located in New York City. The company keeps client investment and account information on a server at its Brooklyn data center. This information includes the total value of the portfolio, type of investments made, the income structure of each client, and associated tax liabilities. The company has recently upgraded its Web site to allow clients to access their investment information.
The company's data center is in the basement of a rented building. Company management believes that the location is secure enough to protect their data from physical threats. The servers are housed in a room that has smoke detectors and associated sprinklers. It is enclosed, with no windows, and has temperature-controlled air conditioning. The company's auditors, however, have expressed concern that some of the measures at the current location are inadequate and that newer alternatives should be explored. Management has expressed counter concerns about the high cost of purchasing new equipment and relocating its data center.
Required
a. Why are Big Apple's auditors stressing the need to have a better physical environment for the server?
b. Describe six control features that contribute to the physical security of the computer center.
c. Big Apple management is concerned about the cost of relocating the data center. Discuss some options open to them that could reduce their operating costs and provide the security the auditors seek.
Physical Security:
The physical security of data center is very necessary because the client's data is very critical element for any business and to be secured. If it was leaked, the trust of the clients is lost and business suffers the problem of declination.
• Physical security concerns with the location of and equipment for security at the data center.
• AV Financials set up its data server at the place where the production plan was running and it allowed the free access also.
(a) Need of having a better physical environment for server:
Although the center is working on the specialized temperature secured from physical intruders and has detectors for smoking and sprinkles. There is need of better environment for the server because of following reasons:
• Access must be limited to the server operators and the employees, presently working there. Even, the analysts and the maintenance programmers, sometimes for detecting and correcting errors, must be allowed access by signing in and out. The record of outsiders' access must be maintained.
• Hidden cameras and the video recording system must be there.
• Any specialized type of fault tolerance controls. RAID (Redundant Array of Independent disks) or uninterrupted power supply backup must be installed.
AV has proper software controls there but it is not enough for securing the information because if the outsiders get the access anytime on that then they can change or damage the information.
(b) Six control features that contribute to the physical security:
The important control features which are responsible for contributing computer server environment are described below:
• Physical construction: The auditor must test the architectural overview and controls set for the physical security of the server room.
• Fire Detection System and Room Temperature: The auditor must test the controls set for detecting any type of sprinkles and specified room temperature because if any of the both is not there then the server could fail or corrupt anytime.
• Access Controls: outsiders must not be allowed for accessing the server without special grants.
(c) Some options that are open to B A Management that reduces their operating costs and provide security:
(1) Any specialized type of fault tolerance controls. RAID or uninterrupted power supply backup, must be installed.
(2) Controls over electronic information security through anti-viruses or other specialized programs.
(3) Controls on operator documentation that is run manual.
3
Discuss the differences between the attest function and assurance services.
Attest Functions and Assurance Services
The primary differences between attest function and assurance services are described below:
Attest Functions and Assurance Services The primary differences between attest function and assurance services are described below:
4
What is fault tolerance?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
5
Explain the concept of materiality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
6
Distinguish between inherent risk and control risk. How do internal controls affect inherent risk and control risk, if at all? What is the role of detection risk?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
7
At which stage of the general accounting model is it easiest to commit computer fraud?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
8
DISTRIBUTED DATA PROCESSING
Explain why an organization would choose to install a distributed instead of a centralized computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
9
Explain the outsourcing risk of failure to perform.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
10
What tasks do auditors perform during audit planning, and what techniques are used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
11
Discuss the key features of Section 302 of SOX.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
12
Prior to SOX, external auditors were required to be familiar with the client organization's internal controls, but not to test them. Explain why.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
13
Explain at least three forms of computer fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
14
Differentiate between general and application controls. Give two examples of each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is RAID?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
16
Distinguish between tests of controls and substantive testing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT a task performed in the audit planning phase?

A) Reviewing an organization's policies and practices
B) Planning substantive testing procedures
C) Reviewing general controls
D) Determining the degree of reliance on controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following disaster recovery techniques may be least optimal in the case of a widespread natural disaster?

A) Empty shell
B) Internally provided backup
C) ROC
D) They are all equally beneficial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is associated with the unique characteristics of an industry?

A) Inherent risk
B) Detection risk
C) Control risk
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
20
Define the management assertions of existence or occurrence, completeness, rights and obligations, valuation or allocation, and presentation and disclosure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
21
Explain vendor exploitation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
22
What is audit risk?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
23
SERVICE PROVIDER AUDIT
The Harvey Manufacturing Company is undergoing its annual financial statement audit. Last year the company purchased an SaaS application from Excel Systems (a cloud service provider) to run mission critical financial transactions. The SaaS application runs on an IaaS server, which Excel Systems outsourced to another service provider.
Required
Explain how the Harvey Manufacturing auditors will assess the relevant internal controls related to these mission critical transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
24
DISASTER RECOVERY PLANNING CONTROVERSY
The relevance of a disaster recovery plan (DRP) to a financial statement audit is a matter of debate. Some argue that the existence of a DRP is irrelevant to the audit. Others argue that it is an important control that needs to be considered in the assessment of internal control.
Required
Address both sides of this debate.
a. Provide a logical argument why a DRP should not be considered in the audit.
b. Argue why a DRP is an important control and should be reviewed within the conduct of a financial audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
25
DISASTER RECOVERY PLAN
Hexagon is an online retailer of exotic foods including spices from around the world, canned sauces, and prepackaged breads such as tortillas and naan. The company does 100% of its business over the Internet to consumers and through private networks with retail trading partners. Recently, Hexagon moved its sales and business headquarters functions into a warehouse on the outskirts of San Francisco. Prior to the move, the company engaged the services of an architect to redesign the facility to be modern yet in keeping with the original character of the building. While remodeling the warehouse, the architects retained the wooden-shingled exterior and the exposed wooden beams throughout the interior. The data processing center, which contained the servers and networked terminals were situated in a large open area with high ceilings and skylights. The center was made accessible to the rest of the staff to be consistent with the firm's philosophy of removing barriers and encouraging a team approach to problem solving. Before occupying the new facility, city inspectors declared the building to be compliant with all relevant building codes.
In a recent compliance audit, Hexagon's auditors advised the company's management to develop a disaster recovery plan. Toward this end, the company entered into a mutual aid agreement with several other firms in the area that had similar technology systems. These firms all agreed verbally to provide emergency assistance to each other in the event of disasters or emergencies. In addition, Hexagon implemented a data backup system in which all files are copied daily to tapes and disks and each week the backup storage devices are taken to an offsite facility where they are secured.
The operator's manual with instructions on how to restore the system is stored in the main data processing area along with a list of names and phone numbers of key IT professionals to contact in case of an emergency.
Required
a. Describe the internal control weaknesses present at Hexagon.
b. List the components that should be included in a disaster recovery plan for a company like Hexagon.
c. What factors, other than those included in the plan itself, should a company consider when formulating a disaster recovery plan?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are the primary reasons for separating operational tasks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
27
What is the purpose of an audit?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
28
Distinguish between errors and irregularities. Which do you think concerns auditors the most?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
29
SOX contains many sections. Which sections are the focus of this chapter?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is the relationship between tests of controls and substantive tests?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
31
How do automated authorization procedures differ from manual authorization procedures?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
32
An organization's internal audit department is usually considered an effective control mechanism for evaluating the organization's internal control structure. Birch Company's internal auditing function reports directly to the controller. Comment on the effectiveness of this organizational structure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
33
Explain why reduced security is an outsourcing risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
34
List the four general control areas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
35
Discuss the key features of Section 404 of SOX.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
36
Does a qualified opinion on internal controls over the financial reporting system necessitate a qualified opinion on the financial statements? Explain why or why not.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
37
A bank in California has 13 branches spread throughout northern California, each with its own minicomputer where its data are stored. Another bank has 10 branches spread throughout California, with the data being stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
38
What problems may occur as a result of combining applications programming and maintenance tasks into one position?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
39
Discuss the concept of independence within the context of an audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
40
What types of documents would an auditor review in testing organizational structure controls? Why is it also important to observe actual behavior?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
41
2 Which of the following is the best example of an application control objective?

A) Ensure that the computer operating system functions efficiently.
B) Provide backup facilities in the event of a disaster.
C) Prevent unauthorized access to corporate databases.
D) Ensure the validity, completeness, and accuracy of sales transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is NOT a potential threat to computer hardware and peripherals?

A) Low humidity
B) High humidity
C) Carbon dioxide fire extinguishers
D) Water sprinkler fire extinguishers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following is not true about the SSAE 16 report?

A) It is a third-party attestation report.
B) It replaced Statement on Auditing Standards No. 70 (SAS 70).
C) The service provider prepares a separate SSAE 16 report tailored to the needs of each of its client firms, which the client auditors rely upon.
D) When using the carve-out method, service provider management would exclude the subservice organization's relevant controls.
E) All of the above are true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
44
Discuss why any distinction between IT auditing and financial auditing is not meaningful.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
45
Explain how IT outsourcing can lead to loss of strategic advantage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are some tests of physical security controls?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
47
INTERNAL CONTROL
During the past year, Howard Industries has experienced excessive employee turnover in their IT function. Exit interviews with employees revealed that they were dissatisfied with the working environment. Howard employed the services of a management consulting firm that had expertise in employee relationship management. The consulting firm made recommendation to restructure IT operations to create a greater sense of "ownership" among the IT staff. After three months, under the new operation a survey indicated a marked increase in the level of job satisfaction among the IT group.
During the conduct of the audit planning phase of the annual financial audit, the auditor observed the following practices: Individual IT professionals are assigned exclusively to support specific business functions such as sales processing, billing, customer account maintenance, etc. Each professional provides a range of IT services for their respective users including computer operations, program changes, and documenting the system through record layouts, system flowcharts, and program listings. They also reconcile computer output reports and logs of transactions errors.
Required
a. Identify and explain any control concerns you have with the new operations.
b. What potential computer fraud might this operational approach permit?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
48
SEPARATION OF DUTIES
Transferring people from job to job within the organization is the philosophy at Arcadia Plastics. Management believes that job rotation deters employees from feeling that they are stagnating in their jobs and promotes a better understanding of the company. The computer services personnel typically work for six months as an operator, one year as a systems developer, six months as a database administrator, and one year in systems maintenance. At that point, they are assigned to a permanent position.
Required
Discuss the importance of separation of duties within the information systems department. How can Arcadia Plastics have both job rotation and well-separated duties?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
49
INTERNAL CONTROL AND DISTRIBUTED SYSTEM
Until a year ago, Dagwood Printing Company had always operated in a centralized computer environment. Now, 75 percent of the office employees have a PC. Users have been able to choose their own software packages, and no documentation of end user- developed applications has been required. Next month, each PC will be linked into a local area network and to the company's mainframe.
Required
a. Outline a plan of action for Dagwood Printing Company to ensure that the proper controls over hardware, software, data, people, procedures, and documentation are in place.
b. Discuss any risks the company may face if the devised plan is not implemented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
50
Why is poor-quality systems documentation a prevalent problem?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
51
What is the meaning of the term attest service?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
52
What are the often-cited benefits of IT outsourcing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
53
Define audit risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
54
Define general controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
55
Explain why certain duties that are deemed incompatible in a manual system may be combined in a computer-based information system environment. Give an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
56
Discuss how the process of obtaining audit evidence in a IT environment is inherently different from obtaining it in a manual system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
57
Explain the role of Statement on Standards for Attestation Engagements No. 16 (SSAE 16) report in the review of internal controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
58
Define commodity IT asset.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
59
404 requires management to make a statement identifying the control framework used to conduct the assessment of internal controls. Discuss the options in selecting a control framework.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
60
The PCAOB Standard No. 5 specifically requires auditors to understand transaction flows in designing their tests of controls. What steps does this entail?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
61
Compare and contrast the following disaster recovery options: empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as from most costly to least costly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
62
What is the role of a corporate computer services department? How does this differ from other configurations?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
63
What are assurance services?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
64
Define specific asset.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
65
Which of the following statements is true?

A) Both the SEC and the PCAOB require the use of the COSO framework.
B) Any framework can be used that encompasses all of COSO's general themes.
C) The SEC recommends COBIT and the PCAOB recommends COSO.
D) Both the SEC and the PCAOB require the COBIT framework.
E) None of the above are true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which of the following is NOT requirement of Section 302 of SOX?

A) Corporate management (including the CEO) must certify monthly and annually their organization's internal controls over financial reporting.
B) Auditors must interview management regarding significant changes in the design or operation of internal control that occurred since the last audit.
C) Auditors must determine whether changes in internal control have materially affected, or are likely to materially affect, internal control over financial reporting.
D) Management must disclose any material changes in the company's internal controls that have occurred during the most recent fiscal quarter.
E) All of the above are requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
67
INTERNAL CONTROL RESPONSIBILITY FOR OUTSOURCED IT
Explain why managers who outsource their IT function may or may not also outsource responsibility for IT controls. What options are open to auditors regarding expressing an opinion on the adequacy of internal controls?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
68
Some internal controls can be tested objectively. Discuss some internal controls that you think are relatively more subjective to assess in terms of adequacy than others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
69
How do SSAE 16 Type 1 and Type 2 differ?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
70
List five risks associated with IT outsourcing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
71
DISTRIBUTED PROCESSING SYSTEM
The internal audit department of a manufacturing company conducted a routine examination of the company's distributed computer facilities. The auditor's report was critical of the lack of coordination in the purchase of PC systems and software that individual departments use. Several different hardware platforms, operating systems, spreadsheet packages, database systems, and networking applications were in use. In response to the internal audit report, and without consulting with department users regarding their current and future systems needs, Mr. Marten, the vice president of Information Services, issued a memorandum to all employees stating the following new policies:
1. The Micromanager Spreadsheet package has been selected to be the standard for the company, and all employees must switch to it within the month.
2. All future PC purchases must be Megasoft compatible.
3. All departments must convert to the Megasoft Entree database package.
4. The office of the vice president of Information Services must approve all new hardware and software purchases.
Several managers of other operating departments have complained about Marten's memorandum.
Required
a. Regarding setting systems standards in a distributed processing environment, discuss factors pertinent to:
1. Computer hardware and software considerations
2. Controls considerations
b. Discuss the benefits of having standardized hardware and software distributed across departments in the firm.
c. Discuss the concerns that the memorandum is likely to create for distributed users in the company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
72
DISASTER RECOVERY SERVICE PROVIDERS
Visit SunGard's website, http://www.sungard.com, and research its recovery services offered for the following classes: High Availability, System Recovery, and End-User Recovery. Write a report of your findings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
73
What are the three primary IT functions that must be separated?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
74
What are the five control implications of distributed data processing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
75
What are the conceptual phases of an audit? How do they differ between general auditing and IT auditing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
76
Distinguish between errors and irregularities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
77
What is computer fraud, and what types of activities does it include?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
78
Who should determine and prioritize the critical applications? How is this done? How frequently is it done?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
79
Give a specific example, other than the one in the chapter, to illustrate the relationship between risk, control, audit objective, and tests of control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
80
How are the carve-out and inclusive methods of reporting on subservice organizations different?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.