IT (Computer) Auditing Flashcards

1
Q

List the types of physical safeguards used to protect the data files.

A
  1. File labels
  2. File protection rings
  3. File protection plans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List some controls that can be put in place/built in hardware and systems software.

A
  1. Parity check
  2. Echo check
  3. Diagnostic routines
  4. Boundary protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the IT duties that should be segregated (in connection with “organization and operation”).

A
  1. Systems analyst
  2. Programmer
  3. Operator
  4. Librarian
  5. Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the five categories of general controls.

A
  1. Organization and operation
  2. Systems development and documentation
  3. Hardware and systems software
  4. Access
  5. Data and procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define “general controls.”

A

Controls that have pervasive effects on all the specific computer processing applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List some internal control implications associated with an IT environment.

A
  1. Segregation of duties may be undermined (a disadvantage)
  2. Audit trail may be lacking (a disadvantage)
  3. Computer processing is uniform (an advantage)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of output application controls?

A

To ensure the output data (and the distribution of any related reports) is accurate and as authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define “application controls.”

A

Information processing controls that apply to the processing of specific computer applications (controls around input, processing, and output).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the objective of input application controls?

A

To ensure that the input of data is accurate and as authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the three types of control totals.

A
  1. Batch totals
  2. Hash totals
  3. Record count
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define “batch totals.”

A

The sum of a particular field in a collection of items used as a control total to ensure that all data has been entered into a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define “hash totals.”

A

An arbitrary total that has no meaningful interpretation outside the context in which it was created. It is used only to validate the integrity of that data that is being examined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “record count.”

A

A counting mechanism in an IT system that keeps track of the number of records processed to determine that the appropriate number was accounted for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List some examples of logic checks.

A
  1. Limit tests
  2. Validity checks
  3. Missing data checks
  4. Check digits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of limit tests?

A

To determine whether the data under review are all within some predetermined range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of validity checks?

A

To determine whether the data under review are recognized as legitimate possibilities.

17
Q

What is the purpose of missing data checks?

A

To determine whether there are any omissions from fields in which data should have been present.

18
Q

Define “check digit.”

A

An arithmetic manipulation of a numeric field that captures the information content of that field and then gets “tacked” onto the end of that numeric field.

19
Q

What is the purpose of processing application controls?

A

To ensure the processing of data is accurate and as authorized.

20
Q

Define “generalized audit software.”

A

Audit software designed to access and test data files of many audit clients. Such audit software is not unique to a specific audit client.The cost is usually expensive to develop, but that cost can be spread over many audit clients. The cost per client may justify that large initial cost of development.

21
Q

Define “customized audit software.”

A

Programs specifically written to access the files of a particular client. The cost might be modest, but the benefits are limited to the specific client for whom the software was written.

22
Q

What is the purpose of test data procedures?

A

To process known errors to see if the client’s system catches them. The auditor only needs to include those errors that are important to the auditor (that is, the auditor need not include every possible type of error). There may be a danger of contaminating the client’s database with the test data.

23
Q

Define “Integrated Test Facility (ITF).”

A

A fictitious division or department within the client created for the purpose of processing the “dummy” (test) data along with the client’s “live” data.

24
Q

Define “parallel simulation.”

A

The processing of the client’s actual data using the auditor’s software and then comparing the auditor’s output to the client’s output for agreement.

25
Q

Define “tagging transactions.”

A

The process of adding an electronic tagging to specific client transactions and tracing them through the client’s system.

26
Q

What is Data Mining Software?

A

Commercially available software (such as ACL or Idea) used to access a client’s electronic data and perform a broad range of audit tasks (such as performing analytical procedures and sampling for confirmation work, etc.).

27
Q

Define “Electronic Data Interchange (EDI).”

A

Direct computer-to-computer communication between a buyer and seller designed to achieve greater efficiency and less paperwork (a paper audit trail may not even exist).

28
Q

Define “Value Added Network (VAN).”

A

A network maintained by an independent company that facilitates Electronic Data Interchange (EDI) transactions between the buying and selling companies.

29
Q

Define “local area network (LAN).”

A

A network of hardware and software interconnected throughout a building or campus.

30
Q

Define “On-line Processing.”

A

The processing of data whereby the user is in direct communication with the computer’s central processing unit.

31
Q

Define “Real Time Processing.”

A

The processing of data whereby the data files are immediately updated.

32
Q

Define “database system.”

A

A set of interconnected files that eliminates the redundancy associated with maintaining separate files for different subsets of the organization.

33
Q

Define “Service Organization.”

A

Independent organizations to whom an entity may outsource the processing of its transactional data.

34
Q

Define “Distributed Systems.”

A

A network of remote computers connected to the main system, allowing simple processing functions to be delegated to the employees at the remote sites.