Assessment Flashcards

1
Q

Testing that obtains audit evidence on the completeness, accuracy, or existence of activities or transactions during the audit period

A

Substantive Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Testing that gathers evidence for the purpose of testing an enterprises compliance with control procedures. This differs from substantive testing in which evidence is gathered to evaluate the integrity of individual transactions, data or other information.

A

Compliance/Control Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Testing that evaluates the relationship of two sets of data and discerns inconsistencies in the relationship.

A

Analytical Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The risk that a review will not detect or notice a material issue

A

Detection Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The risk that a material error could occur, if there are no related internal controls to prevent or detect the error.

A

Inherent Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The risk that a material error exists that would not be prevented or detected on a timely basis by the system of internal controls.

A

Control Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tools used for accessing data in an electronic form from diverse software environments, record formats etc.

A

Computer-Assisted Auditing Tools (CAATs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sampling method used when an IS auditor is trying to determine whether a type of event has occurred. Best suited to assess the risk of fraud and to identify whether a single occurrence has taken place.

A

Discovery Sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sampling method that helps limit the size of a sample and allows the test to be stopped at the earliest possible moment.

A

Stop-or-go Sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sampling method used to test compliance of transactions to controls.

A

Attribute Sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sampling method used in substantive testing situations and deals with population characteristics that vary, such as monetary values and weights.

A

Variable Sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internal controls that are intended to reduce the risk of an existing or potential control weakness that may arise when duties cannot be appropriately segregated.

A

Compensating Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Test technique that identifies specific program logic that has not been tested and analyzes programs during execution to indicate whether program statements have been executed.

A

Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Test technique that records the flow of designated transactions through logic paths within programs.

A

Snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Test technique that shows the trail of instructions executed during an application.

A

Trace & Tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Test technique that represents the activity of recording specific tasks for future review

A

Logging

17
Q

Testing used to test for the introduction of new errors in the system after changes have been applied.

A

Regression Testing

18
Q

Testing used to test the functionality of the system against detailed requirements to ensure that software construction is traceable to customer requirements

A

Validation Testing

19
Q

Testing used to see whether the system can operate in the target environment without adverse impacts on the existing systems.

A

Sociability Testing

20
Q

Testing that evaluates the performance of the software under normal and peak conditions.

A

Load Testing

21
Q

Testing that determines the capacity of the software to cope with an abnormal number of users or simultaneous operations.

A

Stress Testing

22
Q

Testing that evaluates the ability of a system to recover after a failure.

A

Recovery Testing

23
Q

Testing that evaluates the impact of incremental volume of records (not users) on a system.

A

Volume Testing

24
Q

After the full backup, only the files that have changed are backed up, thus minimizing media storage.

A

Incremental Backup

25
Q

A number of internet-connected devices, each of which is running one or more bots used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection.

A

Botnet

26
Q

Programs designed to destroy or modify data at a specific event or time in the future.

A

Logic Bombs

27
Q

An attack, normally via email, pretending to be an authorized person or organization requesting information.

A

Phishing

28
Q

A program that picks up information from PC drives by making copies of their contents.

A

Spyware