Cis 4
Cis 4
properly functioning, an auditor most likely would a. Create checkpoints at periodic intervals after live data processing to test for unauthorized use of the system. b. Examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction. c. Enter invalid identification numbers or passwords to ascertain whether the system rejects them. d. Vouch a random sample of processed transactions 10 assure proper authorization.
An auditor most likely would introduce test data into a computerized payroll system to test controls related to the a. Existence of unclaimed payroll checks held by supervisors. b. Early cashing of payroll checks by employees. c. Discovery of invalid employee LD. numbers. d. Proper approval of overtime by supervisors.
c. General ledger information such as account numbers prior year account balances. and current year unadjusted information. d. Adjusting entry information such as deferrals and accruals, and reclassification journal entries.
2.
7. Using microcomputers in auditing may affect the methods used to review the work of staff assistants because a. The audit fieldwork standards for supervision may differ. b. Documenting. the supervisory reviewmay require assistance of consulting services personnel. c. Supervisory personnel may not have an understanding of the capabilities and limitations of microcomputers. d. Working paper documentation may not contain readily observable detail Is of calculations. 8. An auditor would least likely use computer software to
Which of the following is not among the errors that an auditor might include in the test data when auditing a client's computer system? a. Numeric characters in aIphanumeric fields. b. Authorized code. c. Differences in description of units of measure. d. Illogical entries in fields whose logic is tested by programmed consistency checks.
3.
a. Access client data files. b. Prepare spreadsheets. c. Assess computer control risk. d. Construct parallel simulations. A primary advantage of using generalized audit software packages to audit the financial statements of a client that uses a computer system is that the auditor may a. Access information stored on computer files while having a limited understanding of the client's hardware and software features. b. Consider increasing the use of substantive tests of transactions in place of analytical procedures. c. Substantiate the accuracy of data through self checking digits and hash totals. d. Reduce the level of required tests of controls 10 a relatively small amount. Auditors often make use of computer programs that perform routine processing functions such as sorting and merging. These programs are made available by electronic data processing companies and others and are specifically referred to as a. Compiler programs. b. Supervisory programs. c. Utility programs. d. User programs.
9.
4. Which of the following computer-assisted auditing techniques allows fictitious and real transactions to be processed together without cJient operating personnel being aware of the testing process? a. Integrated test facility. b. Input controls matrix. c. Parallel simulation. d. Data entry monitor.
Which of the following methods of testing application controls utilizes a generalized audit software package prepared by the auditors'? a. Parallel simulation. b. Integrated testing facility approach. c. Test data approach. d. Exception report tests.
10.
5.
6. In creating lead schedules for an audit engagement, a CPA often uses automated workpaper software. What client information is needed to begin this process? a. Interim financial information such as third quarter sales, net income, and inventory and receivables balances. b. Specialized journal information such as the invoice and purchase order numbers of the last few sales and purchases of the year.