General Controls Flashcards

1
Q

computer software is used to make spreadsheets, access client data files, and make simulations (not assess EDP risk)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EDI system (electronic data interchange)

A

standard format is adopted; mapping occurs; network and send recipients acknowledgements through the system

disadvantage is seg of duties; audit trail may be lacking
advantage is that computer process is uniform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mapping

A

occurs in an EDI system; process in which the elements in the clients computer system is related to the standard data elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how do you determine if internal controls are being operated as designed?

A

collect client records that document the use of EDP programs which helps determine the performance of tests of controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the disadvantage of preparing micro computer prepared data files vs manually prepared files?

A

easier for unauthorized person to gain access of the files bc microcomputer is in a single location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should an auditor be most concerned about when processing sales transactions on the internet?

A

potential computer disruptions; virus hacks; fluctuations; etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a general control that would most likely help an entity whose systems analyst left the entity in the middle of a major project?

A

systems documentation; includes narratives and flowcharts; would be prepared for each application system; document the work completed to date and allow an analyst to take over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What duties must be segregated in an internal control system?

A

systems analysis- designs the system
programming- develops the code to run the program
computer operations- actually runs the program
transaction authorization
library functions- keeps track of the program and data
data control-
security-safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a secure passwords?

A

1) 7 characters
2) special characters
3) uppercase and lowercase
4) unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are access controls a concern to auditors?

A

links minicomputers in remote locations with a centralized computer; its difficult to control access to minicomputers in remote locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Inherent Limitation in I/C

A

faulty judgment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should one maintain an audit trail for a computer system?

A

1) Provides a deterrent to irregularities
2) facilitates monitoring
3) enables queries to be answered (no analytic procedures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Source Code Comparison Program

A

A comparison of the compiled object program code with the original program would reveal unauthorized program changes.

-helps reveal unauthorized changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5 categories of general control (keyword: initially)

A

1) organization and operation- seg of duties
2) systems development and documentation (doc any changes and adequately; must be authorized)
3) hardware and software
4) access- should be limited to authorized personnel
5) data and procedures- physically protect files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware and Software

A

built in controls

parity check- how hardware parts interact; bit added to each character so loss may be detected

echo check-transmission; sent and received

diagnostic routines-affecting hardware; check internal operations of hardware components usually when booting up the system

boundary protection-for running multiple jobs concurrently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data and Procedures

A

file labels

file protection rings to protect magnetic tapes

file protection plans-protect data overtime; Duplicates or prior generations. “Grandfather” and “father” versions that can be used to recreate a current file by updating earlier files with current transaction data.

17
Q

Segregation of Duties

A

systems analysis- designs the system
programming- develops the code to run the program
computer operations- actually runs the program
transaction authorization
library functions- keeps track of the program and data
data control-
security-safeguards