Steps 2 Flashcards

1
Q

Before an IS auditor can begin an audit of infrastructure or application systems,

A

the auditor must understand the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Automated controls include

A

validation and edit checks, programmed logic func- tions, and controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Manual controls are those that auditors or staff manually verify, such as

A

the review of reconciliation reports, and exception reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The purpose of both automated and manual controls is to verify the following:

A

. The validity of data processed is ensured.
. The accuracy of data processed is ensured.
. The data is stored so that controls maintain the security of the data so that accuracy, validity, confidentiality, and integrity of the data is maintained.
. Processed data is valid and meets expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Auditors can perform control checks by doing the following:

A

. Discovering and identifying application components so that transaction flow can be analyzed.
. Determining the appropriate audit procedures to perform tests to evaluate strengths and weaknesses of the application.
. Analyzing test results.
. Validating the results and reporting on the application’s effectiveness and efficiency. The results should also be measured against good programming standards and com- pared against management’s objectives for the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Setting the Scope of the Review

A

The audit engagement letter should set out clearly the types of matters that will be reviewed during the audit and the scope of such review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Before controls can be examined, an auditor must

A

understand the business strategy and the business process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To understand business objectives and strategy, start with

A

the company’s busi- ness plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Next, review

A

the long- and short-term goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Finally, review

A

the organization’s goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After reviewing this background information,

A

examine process flow charts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Next, review

A

application controls, data integrity controls, and controls for busi- ness systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When reviewing input controls, the auditor must

A

ensure that all transactions have been entered correctly. Whatever controls are used, they should be capable of checking that input is valid. This becomes important because in many automated systems, the output of one sys- tem is the input of another. In such situations, data should be checked to verify the informa- tion from both the sending and receiving applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

types of authorization controls include these:

A

. Signatures on forms or documents approving a change.
. Password controls that are required to process a change.
. Client identification controls that allow only certain clients to authorize the change. As an example, the clerk at the local market cannot authorize a price override, yet the manager can by using their access login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A batch control is a second type of input control. Batch controls combine

A

transactions into a group. This group then has a value assigned. The total of this transaction can be based on dol- lar amounts, total counts, total document numbers, or hash totals. This number should match the count in the receivables system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Total dollar amounts verify

A

that each item totals up to the correct batched total amount.

17
Q

Total item counts verify

A

the total counts match.

18
Q

Total document numbers verify that the total number of .

A

documents in the batch equals the total number of documents processed. Documents could be invoices generated, orders, or any document count that is used to track accuracy

19
Q

Hash totals are generated by

A

choosing a selected number of fields in a series of transactions. These values are computed again later to see if the numbers match. An incorrect value indicates that some- thing has been lost, entered incorrectly, or corrupted somehow.

20
Q

Hash Totals

A

The use of hash totals is similar to how cryptographic hashing algrothims such as MD5 or SHA1 are used to verify integrity.

21
Q

Batch Controls Be aware that the CISA exam might ask questions about what is considered a valid batch control.

A

Test candidates should understand each type and know that batch controls are used to detect loss, duplication, or corruption of data.