IAAUDCIS CHAPTER 7: COMPUTER ASSISTED AUDIT TOOLS & TECHNIQUES Flashcards

(68 cards)

1
Q

Systems that uses physical source document in initiating transactions

A

Source Document Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Coding controls that checks the integrity of data codes used in processing

A

Data coding controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control digit added to the code when it is originally assigned that allows the integrity of the code to be established during subsequent processing

A

Check Digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an effective method of managing high volumes of transaction data through a system.
reconciles output produced by the system with the input originally entered into the system.

A

Batch Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intended to detect errors in transaction data before the data are processed.

A

Validation Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involves programmed procedures that examine the characteristics of the data in the field.

A

Field Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

used to examine the contents of a field for the presence of blank spaces

A

Missing Data Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

determine whether the correct form of data is in the field

A

Numeric-Alphabetic Data Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

used to verify that certain fields are filled with zeros

A

Zero-Value Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Determine if the value on the field exceeds an authorized limit

A

Limit Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assign upper and lower limits to acceptable data values

A

Range Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compare actual values in a field against known acceptable values

A

Validity Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

identify keystroke errors in key fields by testing the internal validity of the code

A

Check Digit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Procedures validate the entire record by examining the interrelationship of its field

A

Record Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Determine if a value in one field, which has already passed a limit check and a range check is reasonable when considered along with other data fields in the record

A

Reasonable Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tests to see if the sign of a field is correct for the type of record being processed.

A

Sign Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Determine if a record is out of order

A

Sequence Order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Purpose is to ensure that the correct file is being processed by the system

A

File Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Verify that the file processed is the one the program by the system (file name and serial number is a match)

A

Internal Label Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Verify that the version of the file processed is correct

A

Version Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

prevents a file from being deleted before it expires

A

Expiration Date Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When errors are detected in a batch, they must be corrected and the records resubmitted for reprocessing. This must be a controlled process to ensure that errors are dealt with completely and correctly.

A

Input Error Correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When a keystroke error is detected or an illogical relationship, the system should halt the data entry procedure until the user corrects the errors

A

Immediate Correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The records flagged as errors are removed from the batch and placed in a temporary error holding file until the errors can be investigated.

A

Create an Error File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cease processing and return the entire batch to data control to evaluate, correct and resubmit.
Reject the entire batch
26
Centralized procedures to manage the data input for all of the organization's transaction processing systems. Eliminates the need to recreate redundant routines for each new application
Generalized Data Input Systems (GDIS)
27
5 major components of GDIS
Generalized Validation Module (GVM) Validated Data File Error File Error Reports Transaction Log
28
performs standard validation routines that are common to many different applications
Generalized Validation Module (GVM)
29
where input data that are validated by the GVM are stored
Validated Data File
30
Error records detected during validation are stored in this file, corrected and then resubmitted to GVM
Error File
31
Standardized error reports are distributed to users to facilitate error correction
Error Reports
32
permanent record of all validated transactions
Transaction Log
33
Classes of Processing Controls
Run-to-run Controls Operator Intervention Audit Trail Controls
34
use batch figures to monitor the batch as it moves from one programmed procedure to another.
Run-to Run Controls
35
Run-to-Run Control Types
Recalculate Control Totals Transaction Codes Sequence Checks
36
Increases the potential for human error
Operation Intervention
37
Ways to preserve Audit Trails
Transaction Logs Log of Automatic Transactions Listing of Automatic Transactions Unique Transaction Identifiers Error Listing
38
Ensures that the system output is not lost, misdirected or corrupted and that the privacy is not violated.
Output Controls
39
print run program produces hard copy output from the output file complex systems that requires operator intervention
Print Programs
40
Two types of exposures that print programs deal with:
Production of unauthorized copies of output Employee browsing of sensitive data
41
When output reports are removed from the printer... primary control is "Supervision"
Bursting
42
Proper disposal of aborted copies and carbon copies removed during Bursting
Waste
43
Responsible for verifying the accuracy of compute output before it is distributed to the users
Data Control
44
It has primary risks that includes reports being lost, stolen or misdirected in transit to the user.
Report Distribution
45
2 Types of Exposure
Exposures from equipment failure Exposures from subversive acts where the output message is intercepted in transmit between the sender and receiver.
46
2 approaches of testing computer application controls
Black Box White Box
47
Control-testing techniques provide information about the accuracy and completeness of an application's processes.
Testing Computer Applications Controls
48
Testing AROUND the computer Do NOT rely on a detailed knowledge of the application's internal logic Seek to understand the functional characteristics of the application
Black Box
49
Testing THROUGH the computer Relies on an in-depth understanding of the internal logic of the application being tested.
White Box
50
White Box Test Methods
Authenticity Test Accuracy Test Completeness Tests Redundancy Tests Access Tests Audit Trail Tests Rounding Error Tests
51
verify that an individual, a programmed procedure, or a message attempting to access a system is authentic
Authenticity Test
52
ensure that the system process only data values that conform to specified procedures
Accuracy Test
53
identify missing data within a single record and entire records missing from a batch
Completeness Test
54
Determine that an application process each record only once
Redundancy Test
55
ensure that the application prevents authorized users from unauthorized access to data
Access Test
56
Ensure that the application creates an adequate audit trail Produces complete transaction listings, and generates error files and reports for all exceptions.
Audit Trail Test
57
Verify the correctness of rounding procedures
Rounding Error Tests
58
CAATTs
Computer Audit Tools and Techniques
59
Types of Computer Audit Tools and Techniques (CAATTs)
Test Data Method Creating Test Data Base Case System Evaluation Tracing Integrated Test Facility Parallel Simulation GAS
60
used to establish application integrity by processing specially prepared sets of input data through production applications that are under review.
Test Data Method
61
Auditors must prepare a complete set of both valid and invalid transactions
Creatin Test Data
62
When the set of test data in use is comprehensive
Base Case System Evaluation (BCSE)
63
Performs an electronic walk-through of the application's internal logic Requires a detailed understanding of the applications internal logic
Tracing
64
Advantages of Test Data Techniques
Employed through computer testing Employed with only minimal disruption to the organization Requires only minimal computer expertise on the part of auditors
65
Disadvantages of Test Data Techniques
Must rely on computer services Audit evidence collected by independent means is more reliable than the one supplied by the client Provides a static picture of application integrity at a single point in time High cost of implementation, results in auditing enfficiency
66
Disadvantages of Test Data Techniques
Must rely on computer services Audit evidence collected by independent means is more reliable than the one supplied by the client Provides a static picture of application integrity at a single point in time High cost of implementation, results in auditing inefficiency
67
An automated technique that enables the auditor to test an application's logic and controls during its normal operation
Integrated Test Facility (ITF)
68
Auditors writes or obtain a copy of the program that stimulates key features or processes to be reviewed or tested
Parallel Simulation