Audit-IT(reviewer) Flashcards
What type of computer is used for extremely high-volume and complex processing?
A) Mainframe Computers
B) Minicomputers
C) Supercomputers
D) Microcomputers
C) Supercomputers
Which of the following is an example of an input device?
A) Magnetic Ink Character Reader (MICR)
B) Monitor
C) Printer
D) Plotter
A) Magnetic Ink Character Reader (MICR)
What is the main function of the Central Processing Unit (CPU)?
A) Store and retrieve data
B) Process instructions and manipulate data
C) Control input and output devices
D) Print and display output
B) Process instructions and manipulate data
Which storage device provides direct access to data?
A) Magnetic disks
B) Magnetic tapes
C) Cartridges
D) Optical disks
A) Magnetic disks
What is the main function of an operating system?
A) Monitor and control computer hardware and software operations
B) Perform specific tasks like payroll processing
C) Store data permanently
D) Manage a company’s database
A) Monitor and control computer hardware and software operations
What type of processing allows transactions to be processed as they occur?
A) Batch Processing
B) Database Processing
C) Real-Time Processing (OLRT)
D) Sequential Processing
C) Real-Time Processing (OLRT)
Which of the following is NOT an internal control in an IT environment?
A) Organizational controls
B) Profit Maximization Control
C) Access controls
D) Monitoring controls
B) Profit Maximization Control
What type of network spans a large geographical area?
A) Local Area Network (LAN)
B) Wide Area Network (WAN)
C) Personal Area Network (PAN)
D) Data Processing Network
B) Wide Area Network (WAN)
What role does a Chief Information Officer (CIO) play in an organization?
A) Develops programming languages
B) Supervises and manages IT operations
C) Manages employee benefits
D) Conducts external audits
B) Supervises and manages IT operations
What is an example of a general IT control?
A) Segregation of IT duties
B) Transaction validation
C) Data encryption
D) Data entry verification
A) Segregation of IT duties
What is the purpose of a database management system (DBMS)?
A) Store, access, and manage a database
B) Convert machine code into human language
C) Secure an organization’s IT infrastructure
D) Print and display processed data
A) Store, access, and manage a database
What is a white box approach in IT auditing?
A) Auditing with or through the computer
B) Auditing only around the computer
C) Ignoring data processing procedures
D) Conducting interviews with IT staff
A) Auditing with or through the computer
What is a common risk in an IT environment?
A) Increase in paper-based transactions
B) Unauthorized access to data
C) More reliance on manual calculations
D) Increased hardware storage capacity
B) Unauthorized access to data
What is the main objective of a test of controls in an IT audit?
A) Evaluate the effectiveness of controls
B) Review management policies
C) Identify key business competitors
D) Determine company profitability
A) Evaluate the effectiveness of controls
What is the primary purpose of a hash total in IT controls?
A) Store critical data
B) Ensure accuracy by checking the sum of non-financial data fields
C) Protect software against viruses
D) Track employee login times
B) Ensure accuracy by checking the sum of non-financial data fields
Which technique involves running an auditor’s test data through a company’s system to check for control failures?
A) Test Data Approach
B) Program Mapping
C) Flowcharting Software
D) Audit Trail Analysis
A) Test Data Approach
What is the purpose of transaction tagging in IT auditing?
A) Track a transaction through different processing stages
B) Replace manual transactions
C) Store encrypted financial information
D) Generate customer receipts
A) Track a transaction through different processing stages
Which IT audit method involves using a duplicate system to compare processing results?
A) Black Box Approach
B) Parallel Simulation
C) Code Review
D) Integrated Test Facility
B) Parallel Simulation
What is the main function of a firewall in an IT system?
A) Store confidential data
B) Prevent unauthorized access to a network
C) Increase processing speed
D) Manage employee payroll
B) Prevent unauthorized access to a network
What is a key characteristic of a Cold Site in IT disaster recovery?
A) Requires hardware installation before operation
B) Fully equipped with pre-installed hardware and software
C) Used for daily backup and storage
D) Provides cloud computing services
A) Requires hardware installation before operation
What is an example of a secondary storage device that provides sequential access to data?
A) Magnetic tape
B) Hard disk
C) Solid-state drive
D) Optical disk
A) Magnetic tape
What is the primary function of the Arithmetic and Logic Unit (ALU) in the CPU?
A) Store program instructions
B) Control input and output devices
C) Perform mathematical and logical operations
D) Manage file storage
C) Perform mathematical and logical operations
Which of the following is an example of an output device?
A) Plotter
B) Keyboard
C) Optical scanner
D) Magnetic tape reader
A) Plotter
What is the main advantage of a RAID (Redundant Array of Independent Disks) system?
A) Minimizes data loss by storing redundant copies of data
B) Speeds up data input
C) Reduces power consumption
D) Eliminates the need for external backups
A) Minimizes data loss by storing redundant copies of data