Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings

Homework answers / question archive / 1) Which statement is incorrect when auditing in a CIS environment? A CIS environment exists when a computer of any type or size is involved in the processing by the entity of financial information of significance to the audit, whether that computer is operated by the entity or by a third party

1) Which statement is incorrect when auditing in a CIS environment? A CIS environment exists when a computer of any type or size is involved in the processing by the entity of financial information of significance to the audit, whether that computer is operated by the entity or by a third party


1) Which statement is incorrect when auditing in a CIS environment?

    1. A CIS environment exists when a computer of any type or size is involved in the processing by the entity of financial information of significance to the audit, whether that computer is operated by the entity or by a third party.
    2.  The auditor should consider how a CIS environment affects the audit.
    3. The use of a computer changes the processing, storage and communication of financial information and may affect the accounting and internal control systems employed by the entity.
    4. A CIS environment changes the overall objective and scope of an audit.


  1. Which of the following standards or group of standards is mostly affected by a computerized information system environment?
    1.  General standards
    2. Reporting standards
    3. Second standard of field work
    4. Standards of fieldwork


  1. Which of the following is least considered if the auditor has to determine whether specialized CIS skills are needed in an audit?
    1. The auditor needs to obtain a sufficient understanding of the accounting and internal control system affected by the CIS environment.
    2.  The auditor needs to determine the effect of the CIS environment on the assessment of overall risk and of risk at the account balance and class of transactions level.
    3. Design and perform appropriate tests of controls and substantive procedures.
    4. The need of the auditor to make analytical procedures during the completion stage of audit.


  1. It relates to materiality of the financial statement assertions affected by the computer processing.
    1. Threshold
    2. Relevance
    3. Complexity
    4. Significance


  1.  Which of the following least likely indicates a complexity of computer processing?
    1. Transactions are exchanged electronically with other organizations without manual review of their propriety.
    2. The volume of the transactions is such that users would find it difficult to identify and correct errors in processing.
    3. The computer automatically generates material transactions or entries directly to another applications.
    4.  The system generates a daily exception report



  1. Which of the following is the least likely characteristic of personal computers?
    1. They are small enough to be transportable.
    2. They are relatively expensive.
    3. They can be placed in operation quickly.
    4. The operating system software is less comprehensive than that found in larger computer environments.


  1. Which of the following is an inherent characteristic of software package?
    1. They are typically used without modifications of the programs.
    2. The programs are tailored-made according to the specific needs of the user.
    3. They are developed by software manufacturer according to a particular user’s specifications.
    4.  It takes a longer time of implementation.
  2. Which of the following is not normally a removable storage media?
    1. Compact disk
    2. Tapes
    3. Diskettes
    4. Hard disk


  1. It is a computer program (a block of executable code) that attaches itself to a legitimate program or data file and uses itself as a transport mechanism to reproduce itself without the knowledge of the user.
    1. Virus
    2. System management program
    3. Utility program
    4. Encryption


  1. Which statement is incorrect regarding internal control in personal computer environment?
    1. Generally, the CIS environment in which personal computers are used is less structured than a centrally-controlled CIS environment.
    2.  Controls over the system development process and operations may not be viewed by the developer, the user or management as being as important or cost-effective.
    3.  In almost all commercially available operating systems, the built-in security provided has gradually increased over the years.
    4. In a typical personal computer environment, the distinction between general CIS controls and CIS application controls is easily ascertained.


  1. Personal computers are susceptible to theft, physical damage, unauthorized access or misuse of equipment. Which of the following is least likely a physical security to restrict access to personal computers when not in use?
    1. Using door locks or other security protection during non-business hours.
    2. Fastening the personal computer to a table using security cables.
    3. Locking the personal computer in a protective cabinet or shell.
    4. Using anti-virus software programs.


  1. Which of the following is not likely a control over removable storage media to prevent misplacement, alteration without authorization or destruction?
    1. Using cryptography, which is the process of transforming programs and information into an unintelligible form.
    2. Placing responsibility for such media under personnel whose responsibilities include duties of software custodians or librarians.
    3. Using a program and data file check-in and check-out system and locking the designated storage locations.
    4.  Keeping current copies of diskettes, compact disks or back-up tapes and hard disks in a fireproof container, either on-site, off-site or both.


  1. 19. Which of the following least likely protects critical and sensitive information from unauthorized access in a personal computer environment?
    1. Using secret file names and hiding the files.
    2. Keeping of back up copies offsite.
    3. Employing passwords.
    4. Segregating data into files organized under separate file directories.


  1. It refers to plans made by the entity to obtain access to comparable hardware, software and data in the event of their failure, loss or destruction.
    1. Back-up
    2. Encryption
    3.  Anti-virus
    4. Wide Area Network (WAN)


  1. Many different types of workstations may be used in on-line computer systems. The functions performed by these workstations least likely depend on their
    1. Logic
    2. Transmission
    3.  Storage
    4. Cost


  1. Types of workstations include General Purpose Terminals and Special Purpose Terminals.  Special Purpose Terminals include
    1. Basic keyboard and monitor
    2. Point of sale devices
    3. Intelligent terminal
    4.  Personal computers


  1. Special Purpose Terminal used to initiate, validate, record, transmit and complete various banking transactions
    1. Automated teller machines
    2.  Intelligent terminal
    3. Point of sale devices
    4. Personal computers


  1. Which statement is incorrect regarding workstations?
    1. Workstations may be located either locally or at remote sites.
    2. Local workstations are connected directly to the computer through cables.
    3. Remote workstations require the use of telecommunications to link them to the computer.
    4. Workstations cannot be used by many users, for different purposes, in different locations all at the same time.
  2. On-line computer systems may be classified according to
    1. How information is entered into the system.
    2. How it is processed.
    3. When the results are available to the user.
    4. All of the above.
  3. In an on-line/real time processing system
    1. Individual transactions are entered at workstations, validated and used to update related computer files immediately.
    2. Individual transactions are entered at a workstation, subjected to certain validation checks and added to a transaction file that contains other transactions entered during the period.
    3. Individual transactions immediately update a memo file containing information which has been extracted from the most recent version of the master file.
    4. The master files are updated by other systems.


  1. It combines on-line/real time processing and on-line/batch processing.
    1. On-Line/Memo Update (and Subsequent Processing)
    2. On-Line Downloading/Uploading Processing
    3. On-Line/Inquiry
    4. On-Line/Combined Processing


  1. It is a communication system that enables computer users to share computer equipment, application software, data and voice and video transmissions.
    1. Network
    2. File server
    3. Host
    4. Client


  1. A type of network that multiple buildings are close enough to create a campus, but the space between the buildings is not under the control of the company is
    1. Local Area Network (LAN)
    2.  Metropolitan Area Network (MAN)
    3. Wide Area Network (WAN)
    4. World Wide Web (WWW)


  1. Which of the following is least likely a characteristic of Wide Area Network (WAN)?
    1. Created to connect two or more geographically separated LANs.
    2. Typically involves one or more long-distance providers, such as a telephone company to provide the connections.
    3.  WAN connections tend to be faster than LAN.
    4. Usually more expensive than LAN.


  1. Gateway is
    1. A hardware and software solution that enables communications between two dissimilar networking systems or protocols.
    2.  A device that forwards frames based on destination addresses.
    3.  A device that connects and passes packets between two network segments that use the same communication protocol.
    4.  A device that regenerates and retransmits the signal on a network.


  1. A device that works to control the flow of data between two or more network segments
    1. Bridge
    2. Router
    3. Repeater
    4. Switch


  1. The undesirable characteristics of on-line computer systems least likely include
    1. Data are usually subjected to immediate validation checks.
    2. Unlimited access of users to all of the functions in a particular application.
    3. Possible lack of visible transaction trail.
    4. Potential programmer access to the system.





  1. Certain general CIS controls that are particularly important to on-line processing least likely include
    1. Access controls.
    2. System development and maintenance controls.
    3. Edit, reasonableness and other validation tests.
    4. Use of anti-virus software program.


  1. Certain CIS application controls that are particularly important to on-line processing least likely include
    1. Pre-processing authorization.
    2. Transaction logs.
    3. Cut-off procedures.
    4. Balancing.


  1. Risk of fraud or error in on-line systems may be reduced in the following circumstances, except
    1. If on-line data entry is performed at or near the point where transactions originate, there is less risk that the transactions will not be recorded.
    2.  If invalid transactions are corrected and re-entered immediately, there is less risk that such transactions will not be corrected and re-submitted on a timely basis.
    3. If data entry is performed on-line by individuals who understand the nature of the transactions involved, the data entry process may be less prone to errors than when it is performed by individuals unfamiliar with the nature of the transactions.
    4. On-line access to data and programs through telecommunications may provide greater opportunity for access to data and programs by unauthorized persons.


  1. Risk of fraud or error in on-line computer systems may be increased for the following reasons, except
    1. If workstations are located throughout the entity, the opportunity for unauthorized use of a workstation and the entry of unauthorized transactions may increase.
    2. Workstations may provide the opportunity for unauthorized uses such as modification of previously entered transactions or balances.
    3.  If on-line processing is interrupted for any reason, for example, due to faulty telecommunications, there may be a greater chance that transactions or files may be lost and that the recovery may not be accurate and complete.
    4. If transactions are processed immediately on-line, there is less risk that they will be processed in the wrong accounting period.


  1. 42. The following matters are of particular importance to the auditor in an on-line computer system, except
    1. Authorization, completeness and accuracy of on-line transactions.
    2. Integrity of records and processing, due to on-line access to the system by many users and programmers.
    3.  Changes in the performance of audit procedures including the use of CAAT's.
    4.  Cost-benefit ratio of installing on-line computer system.


  1. A collection of data that is shared and used by a number of different users for different purposes.
    1. Database
    2. Information file
    3. Master file
    4. Transaction file



  1. Which of the following is least likely a characteristic of a database system?
    1. Individual applications share the data in the database for different purposes.
    2. Separate data files are maintained for each application and similar data used by several applications may be repeated on several different files.
    3. A software facility is required to keep track of the location of the data in the database.
    4. Coordination is usually performed by a group of individuals whose responsibility is typically referred to as "database administration."


  1. Database administration tasks typically include
      1. Defining the database structure.
      2. Maintaining data integrity, security and completeness.
      3. Coordinating computer operations related to the database.
      4. Monitoring system performance.
      5. Providing administrative support.
  1. All of the above
  2. All except I
  3. II and V only
  4. II, III and V only


  1. Due to data sharing, data independence and other characteristics of database systems
    1. General CIS controls normally have a greater influence than CIS application controls on database systems.
    2. CIS application controls normally have a greater influence than general CIS controls on database systems.
    3. General CIS controls normally have an equal influence with CIS application controls on database systems.
    4. CIS application controls normally have no influence on database systems.


  1. Which statement is incorrect regarding the general CIS controls of particular importance in a database environment?
    1. Since data are shared by many users, control may be enhanced when a standard approach is used for developing each new application program and for application program modification.
    2. Several data owners should be assigned responsibility for defining access and security rules, such as who can use the data (access) and what functions they can perform (security).
    3.  User access to the database can be restricted through the use of passwords.
    4. Responsibilities for performing the various activities required to design, implement and operate a database are divided among technical, design, administrative and user personnel.


  1. These require a database administrator to assign security attributes to data that cannot be changed by database users.
    1. Discretionary access controls
    2.  Name-dependent restrictions
    3. Mandatory access controls
    4. Content-dependent restrictions.


  1. A discretionary access control wherein users are permitted or denied access to data resource depending on the time series of accesses to and actions they have undertaken on data resources.
    1. Name-dependent restrictions
    2. Context-dependent restriction
    3. Content-dependent restriction
    4. History-dependent restriction





  1. The effect of a database system on the accounting system and the associated risks will least likely depend on:
    1. The extent to which databases are being used by accounting applications.
    2. The type and significance of financial transactions being processed.
    3. The nature of the database, the DBMS, the database administration tasks and the applications.
    4. The CIS application controls.


Option 1

Low Cost Option
Download this past answer in few clicks

7.87 USD


Already member?

Option 2

Custom new solution created by our subject matter experts