Audit Tests 7
Audit Tests 7
4. In a computerized system, what increases the risk of unauthorized data manipulation?
A. Limited system access
B. Strong internal controls
C. Ease of access to data and programs
D. Lack of segregation of duties
5. A situational example: One employee is responsible for input, processing, and output
review. What risk does this pose?
A. Lack of segregation of duties
B. Overdocumentation
C. System crash
D. Duplicate reports
7. In CIS, data and program storage media are considered vulnerable because:
A. They are heavy
B. They are too secure
C. Data can be easily lost or altered without trace
D. They are on paper
8. Which control procedure type ensures the accuracy of an entire information system?
A. Input control
B. General control
C. Output control
D. Application control
22.A situational example: An employee mistypes an SSS number. Which control will detect
it?
A. Limit check
B. Field check
C. Output validation
D. File access review
31.Why must the effectiveness of general controls be evaluated before application controls?
A. General controls are optional
B. Application controls depend on the effectiveness of general controls
C. General controls are part of payroll
D. To assess tax policies
34.A situational example: The auditor only reviews inputs and outputs without checking the
process. What audit method is used?
A. Auditing around the computer (black box approach)
B. CAATs
C. Analytical review
D. Data simulation
36.What method involves directly testing the client's system with fictitious transactions?
A. Parallel simulation
B. Test data technique
C. Analytical review
D. File recovery method
37.A situational example: The auditor inputs test transactions and compares the output to
expected results. What technique is this?
A. Audit around the computer
B. Test data
C. System evaluation
D. Output control
38.What is the key limitation of the test data method?
A. Too expensive
B. Program tested might not be the one used throughout the period
C. Too complex
D. Lacks documentation
39.What technique addresses the limitation of test data by integrating testing into the actual
system?
A. Black box testing
B. Integrated test facility (ITF)
C. Analytical procedure
D. External observation
50.A situational example: The auditor observes that a client's CIS has no audit trail. What
should be used?
A. Audit around the computer
B. CAATs like snapshot or SCARF
C. Internal memo
D. Fieldwork checklist