Auditing (Ch. 12) Flashcards

1
Q

Automated work paper

A

allows internal and external auditors to automate and standardize specific audit tests and audit documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Auditing around the computer

A

audit approach whereby an auditor follows a company’s audit trail up to the point at which accounting data enter the computer and then picks these data up again when they reappear in processed form as computer output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Auditing through the computer

A

audit approach whereby and auditor follows a company’s audit trail through the internal computer operations phase of automated data processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Auditing with the computer

A

audit approach whereby the auditor uses the computer to aid in performing various auditing procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compliance testing

A

procedures performed by auditors to ensure the general and application controls are in place and working as prescribed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer-assisted audit techniques (CAAT)

A

use of computer processes or specialized software to perform audit functions, such as sorting data to detect duplicate accounts payable invoice numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Continuous Auditing

A

the use of tools that allow auditing to occur even when an auditor is not present. XBRL can support this concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fraud triangle

A

includes three elements indicating potential for fraud; Motive, Opportunity, and Rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Generalized audit software (GAS)

A

computer packages that enable auditors to review computer files without continually rewriting processing programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

General-use software

A

used by auditors as productivity tools for improving their work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information systems risk assessment

A

method used by an auditor to evaluate the desirability of IT-related controls for a particular aspect of business risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information technology (IT) governance

A

ensuring that information technology risks are controlled and also that IT in an organization is deployed strategically to meet objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrated test facility (ITF)

A

used by auditors to test a company’s computer programs. A more comprehensive test technique that is used to audit an AIS in an operational setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Parallel simulation

A

a control testing method used by auditors to create a second system that duplicates a portion of the clients system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Program change control

A

a set of internal control procedures developed to ensure against unauthorized program changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk based audit

A

an approach that provides auditors with a good understanding of the errors and irregularities that can occur in a company’s AIS environment and the related risks and exposures

17
Q

Test data

A

a set of transactions that examine the range of exception situations that might occur under normal processing conditions

18
Q

Third party assurance services

A

audit and assessment services offered by independent third parties to provide business users and individual consumers with some level of comfort over Internet transactions. Specialized audits of Internet systems and websites

19
Q

CA web trust

A

is a third party assurance seal that promotes data, privacy and security. in addition to reliable business, business practices and integrity in processing transactions

20
Q

trust services

A

include both; web trust and systrust. Assurance services that evaluate the reliability of information systems with respect to their availability, security, integrity and maintainability

21
Q

automated working paper software

A

These programs can help auditors create common size income statements and balance sheets that show account balances as percentages

22
Q

Certified Information Systems Auditor (CISA)

A

a certification given by the Informations Systems Audit and Control Association

23
Q

COBIT

A

Provides auditors and businesses with guidance in managing and controlling for business risk associated with IT environments

24
Q

Information Technology (IT) auditing

A

Involves evaluating the computers role in achieving audit and control objectives

25
Q

Parallel simulation

A

The auditor uses live input data, rather than test data, in a program actually written or controlled by the auditor

26
Q

Sarbanes-Oxley Act

A

An important feature of this legislation is commonly referred to as section 404 reviews

27
Q

4 steps performed in a “risk-based” audit approach

A
  1. Determine the risk- impact and probability
  2. Evaluate controls present-has to be operational
  3. Evaluate weaknesses
  4. Identify control procedures to minimize each threat or lack of control
28
Q

5 principles of trust services

A
  1. Security (unauthorized access)
  2. Availability
  3. Processing
  4. Online Privacy - personal info
  5. Protection of confidential info
29
Q

5 approaches to continuous auditing

A
  • continuous simulation
  • exception reporting
  • audit hooks
  • snapshot
  • tranaction tagging