Professional Documents
Culture Documents
AUD CIS QUIZ 2 Answer Key
AUD CIS QUIZ 2 Answer Key
Quiz 2
Auditing in a Computerized Environment
2nd Semester, A.Y. 2023-2024
PLEASE USE THE ANSWER SHEET PROVIDED AT THE LAST PAGE OF THIS EXAM
1. A type of computer system whereby individual transactions are entered online and are added to a transaction file that contains other
transactions entered during the period. Later, this transaction file, on a periodic basis updates the master file.
a. Online, batch system.
b. Online, memo update system
c. Online, real time system.
d. Online, shadow update system
2. Which of the following methods of testing application controls utilizes a generalized audit software package prepared by the
auditors?
a. Parallel test data
b. Parallel simulation
c. Integrated testing facility approach
d. Controlled reprocessing
3. It is a type of system characterized by data that are assembled from more than one location and records that are updated
immediately?
a. Microcomputer system
b. Batch processing system
c. Minicomputer system
d. On-line, real-time system
4. Errors in data entry/input in a batch computer system caused by incorrect programs or data may not
be detected instantly because.
a. Errors in some transactions may cause rejection of other transactions in the batch.
b. The error identification in input data typically is not a part of the program.
c. The processing of transactions in a batch system is inconsistent.
d. There are time delays in processing transactions in a batch system.
5. End-user computing is most likely to occur on which of the following types of computers?
a. Mainframe
b. Personal computers
c. Minicomputers
d. Personal reference assistants
6. During the test of control phase. The auditor wants to gain a thorough understanding of the client’s program which was created by
the in-house programmer, which of the following CAAT is the best for this scenario:
a. Test Data
b. Audit Modules
c. Operating Systems Logs
d. Comparison Programs
7. At the beginning of the audit year, the auditor was tasked to audit the inventory of a client. Given this case, what would be the best
CAAT during the test of control phase.
a. Parallel Simulation
b. Audit Hooks
c. Library Management Software
d. Code review
8. Aside from considering the client’s program in processing transactions, it is also of equal importance to consider those systems from
other user departments, an example of this system is
a. Transaction tagging
b. Controlled Reprocessing
c. Security Software
d. Snapshots
9. The auditor wants to determine the number of occurrences where the input controls were lifted to process isolated valid transactions.
What audit module he would use in this scenario.
a. Access control and security software
b. Transaction Tagging
c. SCARF
d. Snapshot
10. The auditor tests client’s software by processing auditor-prepared test data that includes both valid and invalid conditions.
a. Integrated test facility
b. Test Data
c. Controlled Reprocessing
d. Parallel simulation
11. The auditor would want to assess the internal control of a client by processing the client’s data using a copy of the computer
software. In this case, the auditor used which of the following.
a. Program testing
b. Program analysis
c. Review of operating system and other system’s software
d. Testing of operating system and other software
13. Out of the different CAAT under the program analysis category, which of the following is the best tool for multimillion companies
under the banking industry.
a. Blackbox approach
b. Controlled reprocessing
c. Operating systems logs
d. Code Review
14.A type of CAAT that provides assurance that the software tested is used to prepare financial reports.
a. Integrated test facility
b. Test data
c. Parallel Simulation
d. Integrated Simulation
19. Personal computers are susceptible to theft, physical damage, unauthorized access, or misuse of equipment. Which of the following
is least likely a physical security to restrict access to personal computers when not in use?
a. Using door locks or other security protection during non-business hours.
b. Fastening the personal computer to a table using security cables.
c. Locking the personal computer in a protective cabinet or shell.
d. Using anti-virus software programs.
20. It refers to plans made by the entity to obtain access to comparable hardware, software, and data in the event of their failure, loss,
or destruction.
a. Back-up
b. Encryption
c. Anti-virus
d. Wide Area Network (WAN)
21. Computer systems that enable users to access data and programs directly through workstations are referred to as
a. On-line computer systems
b. Database management systems (DBMS)
c. Personal computer systems
d. Database systems
22. It refers to plans made by the entity to obtain access to comparable hardware, software, and data in the event of their failure, loss,
or destruction.
a. Back-up or data recovery control
b. Encryption
c. Anti-virus
d. Wide Area Network (WAN)
23. Online systems allow users to initiate various functions directly. Such functions include:
I. Entering transactions.
II. Making inquiries.
III. Requesting reports.
IV. Updating master logs.
a. I, II, III and IV
b. I, II and III
c. I and II
d. I and IV
24. Types of workstations include General Purpose Terminals and Special Purpose Terminals. Special Purpose Terminals included.
a. Basic keyboard and monitor
b. Intelligent terminal
c. Point of sale devices
d. Personal computers
26.A terminal used to initiate, validate, record, transmit and complete various banking transactions.
a. Automated teller machines
b. Point of sale devices
c. Intelligent terminal
d. Personal computers
29. It is a communication system that enables computer users to share computer equipment, application software, data and voice and
video transmissions.
a. Network
b. File server
c. Host
d. Client
30. A type of network used by companies’ network that interconnects users with computer resources in a geographic area or region
larger than that covered by even a large local area network (LAN)
a. Local Area Network (LAN)
b. Wide Area Network (WAN)
c. Metropolitan Area Network (MAN)
d. World Wide Web (WWW)
31. A collection of data that is shared and used by several different users for different purposes.
a. Database
b. Information file
c. Master file
d. Transaction file
32. System characteristics that may result from the nature of CIS processing include, except
a. Absence of input documents.
b. Lack of visible transaction trail.
c. Lack of visible output.
d. Difficulty of access to data and computer programs.
33. The applications of auditing procedures using the computer as an audit tool refer to
a. Integrated test facility
b. Data-based management system
c. Auditing through the computer
d. Computer assisted audit techniques.
36. Which of the following statements is not true to the test data approach when testing a computerized accounting system?
a. The test needs consist of only those valid and invalid conditions which interest the auditor.
b. Only one transaction of each type of need be tested.
c. The test data must consist of all possible valid and invalid conditions.
d. Test data are processed by the client's computer programs under the auditor's control.
37. An auditor would most likely be concerned with which of the following controls in a distributed data processing system?
a. Hardware controls
b. Systems documentation controls
c. Access controls
d. Disaster recovery controls
38. This is a network that exists over a large-scale geographical area. This ensures that computers and users in one location can
communicate with computers and users in other locations.
a. Local Area Network (LAN)
b. Wide Area Network (WAN)
c. Metropolitan Area Network (MAN)
d. World Wide Web (WWW)
39. This is a dedicated computer containing all the infrastructure, technology, and program access needed to provide centralized
management.
a. Network
b. File server
c. Host
d. Client
40. GAS or Generalized audit software packages do all the tasks below except
a. precomputations data fields
b. compares files and identify differences.
c. stratifies statistical samples.
d. analyzes results and form opinions.
41. A type of embedded audit software where its data are being audited on a real time basis or as it is being processed in the system by
doing recalculation
a. Audit Module
b. Audit Hooks
c. Test Data
d. Transaction tagging
42. A continuous audit technique where a transaction record is "tagged" and then traced through critical points in the information
system.
a. Audit Modules
b. Systems control audit review files (SCARFs)
c. Audit Hooks
d. Transaction tagging
43. It is a special file or folder created by embedded audit software. This is where all application system errors, and system exceptions
are written or collected.
a. Audit Module
b. Scarf master file
c. Verification check master file
d. Tagged transactions folder.
44. A auditor wants to collect data all sales invoices above P50,000 for his immediate review. This technique is called.
a. Snapshot
b. SCARF
c. Audit Hooks
d. Audit Modules
45. A CAAT technique inserted in the systems and to produce a flowchart based on the logic of the program and is compared to the
flow chart of the CIS department.
a. Code Review
b. Program Tracing and Mapping
c. Flowcharting software
d. Snapshot
46. Consider this scenario: An auditor has an investment in a mutual fund that has an investment in an audit client. Which of the
following is/are true?
Statement I: The auditor has a direct financial interest in the audit client.
Statement II: The auditor has an indirect financial interest in the mutual fund.
a. Only Statement I is correct.
b. Only Statement II is correct.
c. Both Statements I and II are correct.
d. Both Statements I and II are incorrect.
47. Consider this scenario: An auditor has an investment in a mutual fund that has an investment in an audit client. Which of the
following statements is/are false?
Statement I: The auditor can have an immaterial indirect financial interest in the audit client.
Statement II: The auditor cannot have a material direct financial interest in the mutual fund. Nevertheless, the auditor can have an
immaterial direct financial interest in the mutual fund.
a. I only
b. II only
c. Both I and II
d. Neither I nor II
48. Which of the following is needed during the performance of assurance engagements?
Statement I: Independence in fact
Statement II: Independence in appearance
a. I only
b. II only
c. Both I and II
d. Neither I nor II
49. Which of the following circumstances may disclosure of confidential information is allowed?
Circumstance I: Required by legal proceedings.
Circumstance II: Client data were transferred to the acquirer of the public firm’s practice.
a. I only
b. II only
c. Both I and II
d. Neither I nor II
50. Which of the following data is/are covered by the confidentiality requirement?
Data I: Information obtained when understanding the business of a prospective client.
Data II: Information obtained while performing audit procedures in an audit client.
a. I only
b. II only
c. Both I and II
d. Neither I nor II
53. Performance of non-assurance services to an assurance client may create all the following threats, except for
a. Self-interest threat
b. Advocacy threat
c. Intimidation threat
d. Self-review threat
54. In the Philippine setting, after how many years should an audit engagement be rotated to another engagement partner?
a. 8
b. 7
c. 6
d. 5
57. A member of the audit team has recently acted as a director of the audit client. Which of the following threats will be least likely
created?
a. Intimidation threat
b. Self-interest
c. Self-review threat
d. Familiarity threat
59. Which of the following terms and conditions in setting the amount professional fees is/are acceptable?
Term I: The audit fee is based on the level of auditor’s effort in performing the audit procedures.
Term II: The audit fee is based on the amount of audited client’s profit.
a. I only
b. II only
c. Both I and II
d. Neither I nor II
60. Which of the following scenarios is/are violative of fundamental ethical principle of professional competence and due care?
Scenario I: In promoting its professional services, ABC Auditing Firm boasted that it is the “best auditing firm in the world”.
Scenario II: DEF Auditing Firm merely quantifies the number of listed companies which are currently audited by the firm out of the total
number of listed companies.
a. I only
b. II only
c. Both I and II
d. Neither I nor II
62. If a member of the assurance team, or their immediate family member receives, by way of, for example, an inheritance, gift or,
because of a merger, a direct financial interest or a material indirect financial interest in the assurance client, a self-interest threat would
be created. The following safeguards should be applied to eliminate the threat or reduce it to acceptable level:
Safeguard I: Disposing of the financial interest at the earliest practical date.
Safeguard II: Removing the member of the assurance team from the assurance engagement.
a. I only
b. II only
c. Both I and II
d. Neither I nor II
63. When a member of the assurance team knows that his or her close family member has a direct financial interest or a material
indirect financial interest in the assurance client, a self-interest threat may be created. Safeguards least likely include:
a. The close family member disposing of all or a sufficient portion of the financial interest at the earliest practical date.
b. Discussing the matter with those charged with governance, such as the audit committee.
c. Involving a professional accountant who took part in the assurance engagement to review the work done by the member of the
assurance team with the close family relationship or otherwise advice, as necessary.
d. Removing the individual from the assurance engagement.
64. According to the Code of Ethics, a member who has a financial interest in a trust fund that invests in a potential client is considered
to have:
a. An indirect financial interest in the client.
b. A direct financial interest in the client.
c. No financial interest in the client.
d. A partial financial interest in the client
65. In which of the following instances would the independence of the CPA not be impaired? The CPA has been retained as the
auditor of a brokerage firm.
a. Which owes the CPA audit fees for more than one year.
b. In which the CPA has a large active margin account.
c. In which the CPA's brother is the controller.
d. Which owes the CPA audit fees for services in the current year and has just filed a petition for bankruptcy.
Answer Sheet
Name:
Section:
1 36
2 37
3 38
4 39
5 40
6 41
7 42
8 43
9 44
10 45
11 46
12 47
13 48
14 49
15 50
16 51
17 52
18 53
19 54
20 55
21 56
22 57
23 58
24 59
25 60
26
27
28
29
30
31
32
33
34
35