Deck 15: IT Controls : Sarbanes-Oxley and IT Governance

ملء الشاشة (f)
exit full mode
سؤال
The same internal control objectives apply to manual and computer-based information systems.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
External auditing is an independent appraisal function established within an organization to examine and evaluate its activities as a service to the organization.
سؤال
A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster.
سؤال
Tests of controls determine whether the database contents fairly reflect the organization's transactions.
سؤال
To fulfill the segregation of duties control objective,computer processing functions (like authorization of credit and billing)are separated.
سؤال
Some systems professionals have unrestricted access to the organization's programs and data.
سؤال
An IT auditor expresses an opinion on the fairness of the financial statements.
سؤال
IT auditing is a small part of most external and internal audits.
سؤال
To ensure sound internal control,program coding and program processing should be separated.
سؤال
Application controls apply to a wide range of exposures that threaten the integrity of all programs processed within the computer environment.
سؤال
Audit risk is the probability that the auditor will render an unqualified opinion on financial statements that are materially misstated.
سؤال
Assurance services is an emerging field that goes beyond the auditor's traditional attestation function.
سؤال
A strong internal control system will reduce the amount of substantive testing that must be performed.
سؤال
Corporate management (including the CEO)must certify monthly and annually their organization's internal controls over financial reporting.
سؤال
Substantive testing techniques provide information about the accuracy and completeness of an application's processes.
سؤال
A qualified opinion on management's assessment of internal controls over the financial reporting system necessitates a qualified opinion on the financial statements?
سؤال
External auditors can cooperate with and use evidence gathered by internal audit departments that are organizationally independent and that report to the Audit Committee of the Board of Directors.
سؤال
Both the SEC and the PCAOB require management to use the COBIT framework for assessing internal control adequacy.
سؤال
Both the SEC and the PCAOB require management to use the COSO framework for assessing internal control adequacy.
سؤال
The database administrator should be separated from systems development.
سؤال
Changing the Hours Worked field in an otherwise legitimate payroll transaction to increase the amount of the paycheck is an example of data collection fraud.
سؤال
Which of the following is NOT an implication of section 302 of the Sarbanes-Oxley Act?

A) Auditors must determine, whether changes in internal control has, or is likely to, materially affect internal control over financial reporting.
B) Auditors must interview management regarding significant changes in the design or operation of internal control that occurred since the last audit.
C) Corporate management (including the CEO) must certify monthly and annually their organization's internal controls over financial reporting.
D) Management must disclose any material changes in the company's internal controls that have occurred during the most recent fiscal quarter.
سؤال
Which of the following is NOT a requirement in management's report on the effectiveness of internal controls over financial reporting?

A) A statement of management's responsibility for establishing and maintaining adequate internal control user satisfaction.
B) A statement that the organization's internal auditors has issued an attestation report on management's assessment of the companies internal controls.
C) A statement identifying the framework used by management to conduct their assessment of internal controls.
D) An explicit written conclusion as to the effectiveness of internal control over financial reporting.
سؤال
Which organizational structure is most likely to result in good documentation procedures?

A) separate systems development from systems maintenance
B) separate systems analysis from application programming
C) separate systems development from data processing
D) separate database administrator from data processing
سؤال
Systems development is separated from data processing activities because failure to do so

A) weakens database access security
B) allows programmers access to make unauthorized changes to applications during execution
C) results in inadequate documentation
D) results in master files being inadvertently erased
سؤال
Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then steal the data.
سؤال
The least important item to store off-site in case of an emergency is

A) backups of systems software
B) backups of application software
C) documentation and blank forms
D) results of the latest test of the disaster recovery program
سؤال
An advantage of a recovery operations center is that

A) this is an inexpensive solution
B) the initial recovery period is very quick
C) the company has sole control over the administration of the center
D) none of the above are advantages of the recovery operations center
سؤال
All of the following are control risks associated with the distributed data processing structure except

A) lack of separation of duties
B) system incompatibilities
C) system interdependency
D) lack of documentation standards
سؤال
For most companies,which of the following is the least critical application for disaster recovery purposes?

A) month-end adjustments
B) accounts receivable
C) accounts payable
D) order entry/billing
سؤال
In a computer-based information system,which of the following duties needs to be separated?

A) program coding from program operations
B) program operations from program maintenance
C) program maintenance from program coding
D) all of the above duties should be separated
سؤال
Adequate backups will protect against all of the following except

A) natural disasters such as fires
B) unauthorized access
C) data corruption caused by program errors
D) system crashes
سؤال
Which of the following is not an essential feature of a disaster recovery plan?

A) off-site storage of backups
B) computer services function
C) second site backup
D) critical applications identified
سؤال
The major disadvantage of an empty shell solution as a second site backup is

A) the host site may be unwilling to disrupt its processing needs to process the critical applications of the disaster stricken company
B) intense competition for shell resources during a widespread disaster
C) maintenance of excess hardware capacity
D) the control of the shell site is an administrative drain on the company
سؤال
Which is the most critical segregation of duties in the centralized computer services function?

A) systems development from data processing
B) data operations from data librarian
C) data preparation from data control
D) data control from data librarian
سؤال
The most common access point for perpetrating computer fraud is at the data collection stage.
سؤال
Transaction cost economics (TCE)theory suggests that firms should outsource specific non−core IT assets
سؤال
Supervision in a computerized environment is more complex than in a manual environment for all of the following reasons except

A) rapid turnover of systems professionals complicates management's task of assessing the competence and honesty of prospective employees
B) many systems professionals have direct and unrestricted access to the organization's programs and data
C) rapid changes in technology make staffing the systems environment challenging
D) systems professionals and their supervisors work at the same physical location
سؤال
A cold site backup approach is also known as

A) internally provided backup
B) recovery operations center
C) empty shell
D) mutual aid pact
سؤال
Commodity IT assets easily acquired in the marketplace and should be outsourced under the core competency theory.
سؤال
All of the following are components of audit risk except

A) control risk
B) legal risk
C) detection risk
D) inherent risk
سؤال
Inherent risk

A) exists because all control structures are flawed in some ways.
B) is the likelihood that material misstatements exist in the financial statements of the firm.
C) is associated with the unique characteristics of the business or industry of the client.
D) is the likelihood that the auditor will not find material misstatements.
سؤال
Which statement is not correct?

A) Auditors gather evidence using tests of controls and substantive tests.
B) The most important element in determining the level of materiality is the mathematical formula.
C) Auditors express an opinion in their audit report.
D) Auditors compare evidence to established criteria.
سؤال
The fundamental difference between internal and external auditing is that

A) internal auditors represent the interests of the organization and external auditors represent outsiders
B) internal auditors perform IT audits and external auditors perform financial statement audits
C) internal auditors focus on financial statement audits and external auditors focus on operational audits and financial statement audits
D) external auditors assist internal auditors but internal auditors cannot assist external auditors
سؤال
Some companies separate systems analysis from programming/program maintenance.All of the following are control weaknesses that may occur with this organizational structure except

A) systems documentation is inadequate because of pressures to begin coding a new program before documenting the current program
B) illegal lines of code are hidden among legitimate code and a fraud is covered up for a long period of time
C) a new systems analyst has difficulty in understanding the logic of the program
D) inadequate systems documentation is prepared because this provides a sense of job security to the programmer
سؤال
Attestation services require all of the following except

A) written assertions and a practitioner's written report
B) the engagement is designed to conduct risk assessment of the client's systems to verify their degree of SOX compliance
C) the formal establishment of measurements criteria
D) the engagement is limited to examination, review, and application of agreed-upon procedures
سؤال
Which concept is not an integral part of an audit?

A) evaluating internal controls
B) preparing financial statements
C) expressing an opinion
D) analyzing financial data
سؤال
Which statement is not true?

A) Auditors must maintain independence.
B) IT auditors attest to the integrity of the computer system.
C) IT auditing is independent of the general financial audit.
D) IT auditing can be performed by both external and internal auditors.
سؤال
All of the following are steps in an IT audit except

A) substantive testing
B) tests of controls
C) post-audit testing
D) audit planning
سؤال
All of the following are recommended features of a fire protection system for a computer center except

A) clearly marked exits
B) an elaborate water sprinkler system
C) manual fire extinguishers in strategic locations
D) automatic and manual alarms in strategic locations
سؤال
Substantive tests include

A) examining the safety deposit box for stock certificates
B) reviewing systems documentation
C) completing questionnaires
D) observation
سؤال
When planning the audit,information is gathered by all of the following methods except

A) completing questionnaires
B) interviewing management
C) observing activities
D) confirming accounts receivable
سؤال
Internal auditors assist external auditors with financial audits to

A) reduce audit fees
B) ensure independence
C) represent the interests of management
D) the statement is not true; internal auditors are not permitted to assist external auditors with financial audits
سؤال
Which of the following is true?

A) In the CBIS environment, auditors gather evidence relating only to the contents of databases, not the reliability of the computer system.
B) Conducting an audit is a systematic and logical process that applies to all forms of information systems.
C) Substantive tests establish whether internal controls are functioning properly.
D) IT auditors prepare the audit report if the system is computerized.
سؤال
The financial statements of an organization reflect a set of management assertions about the financial health of the business.All of the following describe types of assertions except

A) that all of the assets and equities on the balance sheet exist
B) that all employees are properly trained to carry out their assigned duties
C) that all transactions on the income statement actually occurred
D) that all allocated amounts such as depreciation are calculated on a systematic and rational basis
سؤال
All of the following tests of controls will provide evidence about the physical security of the computer center except

A) review of fire marshal records
B) review of the test of the backup power supply
C) verification of the second site backup location
D) observation of procedures surrounding visitor access to the computer center
سؤال
Typically,internal auditors perform all of the following tasks except

A) IT audits
B) evaluation of operational efficiency
C) review of compliance with legal obligations
D) internal auditors perform all of the above tasks
سؤال
All of the following tests of controls will provide evidence about the adequacy of the disaster recovery plan except

A) inspection of the second site backup
B) analysis of the fire detection system at the primary site
C) review of the critical applications list
D) composition of the disaster recovery team
سؤال
Control risk is

A) the probability that the auditor will render an unqualified opinion on financial statements that are materially misstated
B) associated with the unique characteristics of the business or industry of the client
C) the likelihood that the control structure is flawed because controls are either absent or inadequate to prevent or detect errors in the accounts
D) the risk that auditors are willing to take that errors not detected or prevented by the control structure will also not be detected by the auditor
سؤال
Tests of controls include

A) confirming accounts receivable
B) counting inventory
C) completing questionnaires
D) counting cash
سؤال
Which of the following is true?

A) Core competency theory argues that an organization should outsource specific core assets.
B) Core competency theory argues that an organization should focus exclusively on its core business competencies
C) Core competency theory argues that an organization should not outsource specific commodity assets.
D) Core competency theory argues that an organization should retain certain specific non−core assets in-house.
سؤال
Computer fraud can take on many forms,including each of the following except

A) theft or illegal use of computer-readable information
B) theft, misuse, or misappropriation of computer equipment
C) theft, misuse, or misappropriation of assets by altering computer-readable records and files
D) theft, misuse, or misappropriation of printer supplies
سؤال
The following are examples of commodity assets except

A) network management
B) systems operations
C) systems development
D) server maintenance
سؤال
Segregation of duties in the computer-based information system includes

A) separating the programmer from the computer operator
B) preventing management override
C) separating the inventory process from the billing process
D) performing independent verifications by the computer operator
سؤال
List three pairs of system functions that should be separated in the centralized computer services organization.Describe a risk exposure if the functions are not separated.
List three pairs of system functions that should be separated in the centralized computer services organization.Describe a risk exposure if the functions are not separated.  <div style=padding-top: 35px>
سؤال
All of the following are issues of computer security except

A) releasing incorrect data to authorized individuals
B) permitting computer operators unlimited access to the computer room
C) permitting access to data by unauthorized individuals
D) providing correct data to unauthorized individuals
سؤال
What control framework is recommended by the PCAOB?
سؤال
COSO identifies two broad groupings of information system controls.What are they?
سؤال
Which of the following is not true?

A) When management outsources their organization's IT functions, they also outsource responsibility for internal control.
B) Once a client firm has outsourced specific IT assets, its performance becomes linked to the vendor's performance.
C) IT outsourcing may affect incongruence between a firm's IT strategic planning and its business planning functions.
D) The financial justification for IT outsourcing depends upon the vendor achieving economies of scale.
سؤال
The Sarbanes-Oxley Act contains many sections.Which sections are the focus of this chapter?
سؤال
Which of the following is not true?

A) Large-scale IT outsourcing involves transferring specific assets to a vendor
B) Specific assets, while valuable to the client, are of little value to the vendor
C) Once an organization outsources its specific assets, it may not be able to return to its pre-outsource state.
D) Specific assets are of value to vendors because, once acquired, vendors can achieve economies of scale by employing them with other clients
سؤال
What are the objectives of application controls?
سؤال
Define general controls.
سؤال
Operations fraud includes

A) altering program logic to cause the application to process data incorrectly
B) misusing the firm's computer resources
C) destroying or corrupting a program's logic using a computer virus
D) creating illegal programs that can access data files to alter, delete, or insert values
سؤال
For disaster recovery purposes,what criteria are used to identify an application or data as critical?
سؤال
What primary IT functions must be separated in a centralized firm?
سؤال
Which of the following is not true?

A) Management may outsource their organizations' IT functions, but they cannot outsource their management responsibilities for internal control.
B) section 404 requires the explicit testing of outsourced controls.
C) The SAS 70 report, which is prepared by the outsourcer's auditor, attests to the adequacy of the vendor's internal controls.
D) Auditors issue two types of SAS 70 reports: SAS 70 Type I report and SAS 70 Type II report.
سؤال
The following are examples of specific assets except

A) application maintenance
B) data warehousing
C) highly skilled employees
D) server maintenance
سؤال
Both the SEC and the PCAOB have expressed an opinion as which internal control framework an organization should use to comply with SOX legislation.Explain.
سؤال
Discuss the key features of Section 302 of the Sarbanes-Oxley Act.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/130
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: IT Controls : Sarbanes-Oxley and IT Governance
1
The same internal control objectives apply to manual and computer-based information systems.
True
2
External auditing is an independent appraisal function established within an organization to examine and evaluate its activities as a service to the organization.
False
3
A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster.
True
4
Tests of controls determine whether the database contents fairly reflect the organization's transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
5
To fulfill the segregation of duties control objective,computer processing functions (like authorization of credit and billing)are separated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
6
Some systems professionals have unrestricted access to the organization's programs and data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
7
An IT auditor expresses an opinion on the fairness of the financial statements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
8
IT auditing is a small part of most external and internal audits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
9
To ensure sound internal control,program coding and program processing should be separated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
10
Application controls apply to a wide range of exposures that threaten the integrity of all programs processed within the computer environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
11
Audit risk is the probability that the auditor will render an unqualified opinion on financial statements that are materially misstated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
12
Assurance services is an emerging field that goes beyond the auditor's traditional attestation function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
13
A strong internal control system will reduce the amount of substantive testing that must be performed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
14
Corporate management (including the CEO)must certify monthly and annually their organization's internal controls over financial reporting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
15
Substantive testing techniques provide information about the accuracy and completeness of an application's processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
16
A qualified opinion on management's assessment of internal controls over the financial reporting system necessitates a qualified opinion on the financial statements?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
17
External auditors can cooperate with and use evidence gathered by internal audit departments that are organizationally independent and that report to the Audit Committee of the Board of Directors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
18
Both the SEC and the PCAOB require management to use the COBIT framework for assessing internal control adequacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
19
Both the SEC and the PCAOB require management to use the COSO framework for assessing internal control adequacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
20
The database administrator should be separated from systems development.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
21
Changing the Hours Worked field in an otherwise legitimate payroll transaction to increase the amount of the paycheck is an example of data collection fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is NOT an implication of section 302 of the Sarbanes-Oxley Act?

A) Auditors must determine, whether changes in internal control has, or is likely to, materially affect internal control over financial reporting.
B) Auditors must interview management regarding significant changes in the design or operation of internal control that occurred since the last audit.
C) Corporate management (including the CEO) must certify monthly and annually their organization's internal controls over financial reporting.
D) Management must disclose any material changes in the company's internal controls that have occurred during the most recent fiscal quarter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is NOT a requirement in management's report on the effectiveness of internal controls over financial reporting?

A) A statement of management's responsibility for establishing and maintaining adequate internal control user satisfaction.
B) A statement that the organization's internal auditors has issued an attestation report on management's assessment of the companies internal controls.
C) A statement identifying the framework used by management to conduct their assessment of internal controls.
D) An explicit written conclusion as to the effectiveness of internal control over financial reporting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which organizational structure is most likely to result in good documentation procedures?

A) separate systems development from systems maintenance
B) separate systems analysis from application programming
C) separate systems development from data processing
D) separate database administrator from data processing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
25
Systems development is separated from data processing activities because failure to do so

A) weakens database access security
B) allows programmers access to make unauthorized changes to applications during execution
C) results in inadequate documentation
D) results in master files being inadvertently erased
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
26
Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then steal the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
27
The least important item to store off-site in case of an emergency is

A) backups of systems software
B) backups of application software
C) documentation and blank forms
D) results of the latest test of the disaster recovery program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
28
An advantage of a recovery operations center is that

A) this is an inexpensive solution
B) the initial recovery period is very quick
C) the company has sole control over the administration of the center
D) none of the above are advantages of the recovery operations center
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
29
All of the following are control risks associated with the distributed data processing structure except

A) lack of separation of duties
B) system incompatibilities
C) system interdependency
D) lack of documentation standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
30
For most companies,which of the following is the least critical application for disaster recovery purposes?

A) month-end adjustments
B) accounts receivable
C) accounts payable
D) order entry/billing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
31
In a computer-based information system,which of the following duties needs to be separated?

A) program coding from program operations
B) program operations from program maintenance
C) program maintenance from program coding
D) all of the above duties should be separated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
32
Adequate backups will protect against all of the following except

A) natural disasters such as fires
B) unauthorized access
C) data corruption caused by program errors
D) system crashes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is not an essential feature of a disaster recovery plan?

A) off-site storage of backups
B) computer services function
C) second site backup
D) critical applications identified
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
34
The major disadvantage of an empty shell solution as a second site backup is

A) the host site may be unwilling to disrupt its processing needs to process the critical applications of the disaster stricken company
B) intense competition for shell resources during a widespread disaster
C) maintenance of excess hardware capacity
D) the control of the shell site is an administrative drain on the company
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which is the most critical segregation of duties in the centralized computer services function?

A) systems development from data processing
B) data operations from data librarian
C) data preparation from data control
D) data control from data librarian
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
36
The most common access point for perpetrating computer fraud is at the data collection stage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
37
Transaction cost economics (TCE)theory suggests that firms should outsource specific non−core IT assets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
38
Supervision in a computerized environment is more complex than in a manual environment for all of the following reasons except

A) rapid turnover of systems professionals complicates management's task of assessing the competence and honesty of prospective employees
B) many systems professionals have direct and unrestricted access to the organization's programs and data
C) rapid changes in technology make staffing the systems environment challenging
D) systems professionals and their supervisors work at the same physical location
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
39
A cold site backup approach is also known as

A) internally provided backup
B) recovery operations center
C) empty shell
D) mutual aid pact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
40
Commodity IT assets easily acquired in the marketplace and should be outsourced under the core competency theory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
41
All of the following are components of audit risk except

A) control risk
B) legal risk
C) detection risk
D) inherent risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
42
Inherent risk

A) exists because all control structures are flawed in some ways.
B) is the likelihood that material misstatements exist in the financial statements of the firm.
C) is associated with the unique characteristics of the business or industry of the client.
D) is the likelihood that the auditor will not find material misstatements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which statement is not correct?

A) Auditors gather evidence using tests of controls and substantive tests.
B) The most important element in determining the level of materiality is the mathematical formula.
C) Auditors express an opinion in their audit report.
D) Auditors compare evidence to established criteria.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
44
The fundamental difference between internal and external auditing is that

A) internal auditors represent the interests of the organization and external auditors represent outsiders
B) internal auditors perform IT audits and external auditors perform financial statement audits
C) internal auditors focus on financial statement audits and external auditors focus on operational audits and financial statement audits
D) external auditors assist internal auditors but internal auditors cannot assist external auditors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
45
Some companies separate systems analysis from programming/program maintenance.All of the following are control weaknesses that may occur with this organizational structure except

A) systems documentation is inadequate because of pressures to begin coding a new program before documenting the current program
B) illegal lines of code are hidden among legitimate code and a fraud is covered up for a long period of time
C) a new systems analyst has difficulty in understanding the logic of the program
D) inadequate systems documentation is prepared because this provides a sense of job security to the programmer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
46
Attestation services require all of the following except

A) written assertions and a practitioner's written report
B) the engagement is designed to conduct risk assessment of the client's systems to verify their degree of SOX compliance
C) the formal establishment of measurements criteria
D) the engagement is limited to examination, review, and application of agreed-upon procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which concept is not an integral part of an audit?

A) evaluating internal controls
B) preparing financial statements
C) expressing an opinion
D) analyzing financial data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which statement is not true?

A) Auditors must maintain independence.
B) IT auditors attest to the integrity of the computer system.
C) IT auditing is independent of the general financial audit.
D) IT auditing can be performed by both external and internal auditors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
49
All of the following are steps in an IT audit except

A) substantive testing
B) tests of controls
C) post-audit testing
D) audit planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
50
All of the following are recommended features of a fire protection system for a computer center except

A) clearly marked exits
B) an elaborate water sprinkler system
C) manual fire extinguishers in strategic locations
D) automatic and manual alarms in strategic locations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
51
Substantive tests include

A) examining the safety deposit box for stock certificates
B) reviewing systems documentation
C) completing questionnaires
D) observation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
52
When planning the audit,information is gathered by all of the following methods except

A) completing questionnaires
B) interviewing management
C) observing activities
D) confirming accounts receivable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
53
Internal auditors assist external auditors with financial audits to

A) reduce audit fees
B) ensure independence
C) represent the interests of management
D) the statement is not true; internal auditors are not permitted to assist external auditors with financial audits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is true?

A) In the CBIS environment, auditors gather evidence relating only to the contents of databases, not the reliability of the computer system.
B) Conducting an audit is a systematic and logical process that applies to all forms of information systems.
C) Substantive tests establish whether internal controls are functioning properly.
D) IT auditors prepare the audit report if the system is computerized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
55
The financial statements of an organization reflect a set of management assertions about the financial health of the business.All of the following describe types of assertions except

A) that all of the assets and equities on the balance sheet exist
B) that all employees are properly trained to carry out their assigned duties
C) that all transactions on the income statement actually occurred
D) that all allocated amounts such as depreciation are calculated on a systematic and rational basis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
56
All of the following tests of controls will provide evidence about the physical security of the computer center except

A) review of fire marshal records
B) review of the test of the backup power supply
C) verification of the second site backup location
D) observation of procedures surrounding visitor access to the computer center
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
57
Typically,internal auditors perform all of the following tasks except

A) IT audits
B) evaluation of operational efficiency
C) review of compliance with legal obligations
D) internal auditors perform all of the above tasks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
58
All of the following tests of controls will provide evidence about the adequacy of the disaster recovery plan except

A) inspection of the second site backup
B) analysis of the fire detection system at the primary site
C) review of the critical applications list
D) composition of the disaster recovery team
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
59
Control risk is

A) the probability that the auditor will render an unqualified opinion on financial statements that are materially misstated
B) associated with the unique characteristics of the business or industry of the client
C) the likelihood that the control structure is flawed because controls are either absent or inadequate to prevent or detect errors in the accounts
D) the risk that auditors are willing to take that errors not detected or prevented by the control structure will also not be detected by the auditor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
60
Tests of controls include

A) confirming accounts receivable
B) counting inventory
C) completing questionnaires
D) counting cash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following is true?

A) Core competency theory argues that an organization should outsource specific core assets.
B) Core competency theory argues that an organization should focus exclusively on its core business competencies
C) Core competency theory argues that an organization should not outsource specific commodity assets.
D) Core competency theory argues that an organization should retain certain specific non−core assets in-house.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
62
Computer fraud can take on many forms,including each of the following except

A) theft or illegal use of computer-readable information
B) theft, misuse, or misappropriation of computer equipment
C) theft, misuse, or misappropriation of assets by altering computer-readable records and files
D) theft, misuse, or misappropriation of printer supplies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
63
The following are examples of commodity assets except

A) network management
B) systems operations
C) systems development
D) server maintenance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
64
Segregation of duties in the computer-based information system includes

A) separating the programmer from the computer operator
B) preventing management override
C) separating the inventory process from the billing process
D) performing independent verifications by the computer operator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
65
List three pairs of system functions that should be separated in the centralized computer services organization.Describe a risk exposure if the functions are not separated.
List three pairs of system functions that should be separated in the centralized computer services organization.Describe a risk exposure if the functions are not separated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
66
All of the following are issues of computer security except

A) releasing incorrect data to authorized individuals
B) permitting computer operators unlimited access to the computer room
C) permitting access to data by unauthorized individuals
D) providing correct data to unauthorized individuals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
67
What control framework is recommended by the PCAOB?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
68
COSO identifies two broad groupings of information system controls.What are they?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following is not true?

A) When management outsources their organization's IT functions, they also outsource responsibility for internal control.
B) Once a client firm has outsourced specific IT assets, its performance becomes linked to the vendor's performance.
C) IT outsourcing may affect incongruence between a firm's IT strategic planning and its business planning functions.
D) The financial justification for IT outsourcing depends upon the vendor achieving economies of scale.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
70
The Sarbanes-Oxley Act contains many sections.Which sections are the focus of this chapter?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which of the following is not true?

A) Large-scale IT outsourcing involves transferring specific assets to a vendor
B) Specific assets, while valuable to the client, are of little value to the vendor
C) Once an organization outsources its specific assets, it may not be able to return to its pre-outsource state.
D) Specific assets are of value to vendors because, once acquired, vendors can achieve economies of scale by employing them with other clients
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
72
What are the objectives of application controls?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
73
Define general controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
74
Operations fraud includes

A) altering program logic to cause the application to process data incorrectly
B) misusing the firm's computer resources
C) destroying or corrupting a program's logic using a computer virus
D) creating illegal programs that can access data files to alter, delete, or insert values
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
75
For disaster recovery purposes,what criteria are used to identify an application or data as critical?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
76
What primary IT functions must be separated in a centralized firm?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following is not true?

A) Management may outsource their organizations' IT functions, but they cannot outsource their management responsibilities for internal control.
B) section 404 requires the explicit testing of outsourced controls.
C) The SAS 70 report, which is prepared by the outsourcer's auditor, attests to the adequacy of the vendor's internal controls.
D) Auditors issue two types of SAS 70 reports: SAS 70 Type I report and SAS 70 Type II report.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
78
The following are examples of specific assets except

A) application maintenance
B) data warehousing
C) highly skilled employees
D) server maintenance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
79
Both the SEC and the PCAOB have expressed an opinion as which internal control framework an organization should use to comply with SOX legislation.Explain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
80
Discuss the key features of Section 302 of the Sarbanes-Oxley Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 130 في هذه المجموعة.