0% found this document useful (0 votes)
127 views1 page

Cis 4

An auditor would test online access controls by creating checkpoints after data processing to test for unauthorized system use and examining transaction logs for errors. The auditor would introduce invalid test data like incorrect employee IDs into a payroll system to test controls related to proper authorization of overtime. When using microcomputers in auditing, documenting supervisory review may require assistance and supervisors may not understand capabilities and limitations of the technology. Auditors can use generalized audit software packages to access client data files while having limited understanding of the client's systems. This allows reducing required tests of controls.

Uploaded by

Shane Nuss Red
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views1 page

Cis 4

An auditor would test online access controls by creating checkpoints after data processing to test for unauthorized system use and examining transaction logs for errors. The auditor would introduce invalid test data like incorrect employee IDs into a payroll system to test controls related to proper authorization of overtime. When using microcomputers in auditing, documenting supervisory review may require assistance and supervisors may not understand capabilities and limitations of the technology. Auditors can use generalized audit software packages to access client data files while having limited understanding of the client's systems. This allows reducing required tests of controls.

Uploaded by

Shane Nuss Red
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

1.

To obtain evidence that online access controls are

properly functioning, an auditor most likely would a. Create checkpoints at periodic intervals after live data processing to test for unauthorized use of the system. b. Examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction. c. Enter invalid identification numbers or passwords to ascertain whether the system rejects them. d. Vouch a random sample of processed transactions 10 assure proper authorization.
An auditor most likely would introduce test data into a computerized payroll system to test controls related to the a. Existence of unclaimed payroll checks held by supervisors. b. Early cashing of payroll checks by employees. c. Discovery of invalid employee LD. numbers. d. Proper approval of overtime by supervisors.

c. General ledger information such as account numbers prior year account balances. and current year unadjusted information. d. Adjusting entry information such as deferrals and accruals, and reclassification journal entries.

2.

7. Using microcomputers in auditing may affect the methods used to review the work of staff assistants because a. The audit fieldwork standards for supervision may differ. b. Documenting. the supervisory reviewmay require assistance of consulting services personnel. c. Supervisory personnel may not have an understanding of the capabilities and limitations of microcomputers. d. Working paper documentation may not contain readily observable detail Is of calculations. 8. An auditor would least likely use computer software to

Which of the following is not among the errors that an auditor might include in the test data when auditing a client's computer system? a. Numeric characters in aIphanumeric fields. b. Authorized code. c. Differences in description of units of measure. d. Illogical entries in fields whose logic is tested by programmed consistency checks.

3.

a. Access client data files. b. Prepare spreadsheets. c. Assess computer control risk. d. Construct parallel simulations. A primary advantage of using generalized audit software packages to audit the financial statements of a client that uses a computer system is that the auditor may a. Access information stored on computer files while having a limited understanding of the client's hardware and software features. b. Consider increasing the use of substantive tests of transactions in place of analytical procedures. c. Substantiate the accuracy of data through self checking digits and hash totals. d. Reduce the level of required tests of controls 10 a relatively small amount. Auditors often make use of computer programs that perform routine processing functions such as sorting and merging. These programs are made available by electronic data processing companies and others and are specifically referred to as a. Compiler programs. b. Supervisory programs. c. Utility programs. d. User programs.

9.

4. Which of the following computer-assisted auditing techniques allows fictitious and real transactions to be processed together without cJient operating personnel being aware of the testing process? a. Integrated test facility. b. Input controls matrix. c. Parallel simulation. d. Data entry monitor.
Which of the following methods of testing application controls utilizes a generalized audit software package prepared by the auditors'? a. Parallel simulation. b. Integrated testing facility approach. c. Test data approach. d. Exception report tests.

10.

5.

6. In creating lead schedules for an audit engagement, a CPA often uses automated workpaper software. What client information is needed to begin this process? a. Interim financial information such as third quarter sales, net income, and inventory and receivables balances. b. Specialized journal information such as the invoice and purchase order numbers of the last few sales and purchases of the year.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy