3.1 Online Auditing Techniques (Doshi) Flashcards

1
Q

Online Audit Techniques

A

(1) Integrated Test Facility
(2) System Control Audit Review File (SCARF)
(3) Snapshot Technique
(4) Audit Hook
(5) Continuous and Intermittent Simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrated Test Facility (ITF)

A

(1) A fictitious entity is created in a live environment .
(2) The auditor can enter dummy or test transactions to verify the processing and results of these transactions for correctness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System Control Audit Review File (SCARF)

A

An embedded (inbuilt) audit module is used to continuously monitor transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCARF files

A

Records only transactions which are of special audit significance which have related specified limits or transactions related to deviation/exception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Snapshot Technique

A

In this technique, snaps (pictures) are taken of the transactions as transaction moves through various stages in the application system

In this technique, three important considerations are (i) location where snaps to be taken (ii )time of capturing snaps and (iii) reporting of snapshot data captured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Audit Hook

A

These are audit software that captures suspicious transactions. Criteria for suspicious transactions are designed by auditors as per their requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is audit hook useful?

A

Audit hook is useful when early detection of error or fraud is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Continuous and Intermittent Simulation (CIS)

A

(1) This technique can be used whenever the application system uses the database management system (DBMS)
(2) DBMS reads the transaction which is passed to CIS. If the transaction is as per selected criteria, then CIS examines the transaction for correctness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When audit trail is required answer has to be

A

SNAPSHOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When early detection of error or irregularities is required- answer has to be

A

AUDIT HOOK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Best technique to identify transactions as per pre-defined criteria-answer has to be CIS.

A

CIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When fictitious entity is created in live production-answer has to be

A

ITF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purpose of System Control Audit Review File SCARF

A

The technique is used to collect data for special audit purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When is SCARF useful?

A

when regular processing cannot be interrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly