IAAUDCIS CHAPTER 7: COMPUTER ASSISTED AUDIT TOOLS & TECHNIQUES Flashcards

1
Q

Systems that uses physical source document in initiating transactions

A

Source Document Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Coding controls that checks the integrity of data codes used in processing

A

Data coding controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control digit added to the code when it is originally assigned that allows the integrity of the code to be established during subsequent processing

A

Check Digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an effective method of managing high volumes of transaction data through a system.
reconciles output produced by the system with the input originally entered into the system.

A

Batch Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intended to detect errors in transaction data before the data are processed.

A

Validation Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involves programmed procedures that examine the characteristics of the data in the field.

A

Field Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

used to examine the contents of a field for the presence of blank spaces

A

Missing Data Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

determine whether the correct form of data is in the field

A

Numeric-Alphabetic Data Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

used to verify that certain fields are filled with zeros

A

Zero-Value Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Determine if the value on the field exceeds an authorized limit

A

Limit Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assign upper and lower limits to acceptable data values

A

Range Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compare actual values in a field against known acceptable values

A

Validity Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

identify keystroke errors in key fields by testing the internal validity of the code

A

Check Digit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Procedures validate the entire record by examining the interrelationship of its field

A

Record Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Determine if a value in one field, which has already passed a limit check and a range check is reasonable when considered along with other data fields in the record

A

Reasonable Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tests to see if the sign of a field is correct for the type of record being processed.

A

Sign Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Determine if a record is out of order

A

Sequence Order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Purpose is to ensure that the correct file is being processed by the system

A

File Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Verify that the file processed is the one the program by the system (file name and serial number is a match)

A

Internal Label Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Verify that the version of the file processed is correct

A

Version Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

prevents a file from being deleted before it expires

A

Expiration Date Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When errors are detected in a batch, they must be corrected and the records resubmitted for reprocessing. This must be a controlled process to ensure that errors are dealt with completely and correctly.

A

Input Error Correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When a keystroke error is detected or an illogical relationship, the system should halt the data entry procedure until the user corrects the errors

A

Immediate Correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The records flagged as errors are removed from the batch and placed in a temporary error holding file until the errors can be investigated.

A

Create an Error File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cease processing and return the entire batch to data control to evaluate, correct and resubmit.

A

Reject the entire batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Centralized procedures to manage the data input for all of the organization’s transaction processing systems.
Eliminates the need to recreate redundant routines for each new application

A

Generalized Data Input Systems (GDIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

5 major components of GDIS

A

Generalized Validation Module (GVM)
Validated Data File
Error File
Error Reports
Transaction Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

performs standard validation routines that are common to many different applications

A

Generalized Validation Module (GVM)

29
Q

where input data that are validated by the GVM are stored

A

Validated Data File

30
Q

Error records detected during validation are stored in this file, corrected and then resubmitted to GVM

A

Error File

31
Q

Standardized error reports are distributed to users to facilitate error correction

A

Error Reports

32
Q

permanent record of all validated transactions

A

Transaction Log

33
Q

Classes of Processing Controls

A

Run-to-run Controls
Operator Intervention
Audit Trail Controls

34
Q

use batch figures to monitor the batch as it moves from one programmed procedure to another.

A

Run-to Run Controls

35
Q

Run-to-Run Control Types

A

Recalculate Control Totals
Transaction Codes
Sequence Checks

36
Q

Increases the potential for human error

A

Operation Intervention

37
Q

Ways to preserve Audit Trails

A

Transaction Logs
Log of Automatic Transactions
Listing of Automatic Transactions
Unique Transaction Identifiers
Error Listing

38
Q

Ensures that the system output is not lost, misdirected or corrupted and that the privacy is not violated.

A

Output Controls

39
Q

print run program produces hard copy output from the output file
complex systems that requires operator intervention

A

Print Programs

40
Q

Two types of exposures that print programs deal with:

A

Production of unauthorized copies of output
Employee browsing of sensitive data

41
Q

When output reports are removed from the printer… primary control is “Supervision”

A

Bursting

42
Q

Proper disposal of aborted copies and carbon copies removed during Bursting

A

Waste

43
Q

Responsible for verifying the accuracy of compute output before it is distributed to the users

A

Data Control

44
Q

It has primary risks that includes reports being lost, stolen or misdirected in transit to the user.

A

Report Distribution

45
Q

2 Types of Exposure

A

Exposures from equipment failure
Exposures from subversive acts where the output message is intercepted in transmit between the sender and receiver.

46
Q

2 approaches of testing computer application controls

A

Black Box
White Box

47
Q

Control-testing techniques provide information about the accuracy and completeness of an application’s processes.

A

Testing Computer Applications Controls

48
Q

Testing AROUND the computer
Do NOT rely on a detailed knowledge of the application’s internal logic
Seek to understand the functional characteristics of the application

A

Black Box

49
Q

Testing THROUGH the computer
Relies on an in-depth understanding of the internal logic of the application being tested.

A

White Box

50
Q

White Box Test Methods

A

Authenticity Test
Accuracy Test
Completeness Tests
Redundancy Tests
Access Tests
Audit Trail Tests
Rounding Error Tests

51
Q

verify that an individual, a programmed procedure, or a message attempting to access a system is authentic

A

Authenticity Test

52
Q

ensure that the system process only data values that conform to specified procedures

A

Accuracy Test

53
Q

identify missing data within a single record and entire records missing from a batch

A

Completeness Test

54
Q

Determine that an application process each record only once

A

Redundancy Test

55
Q

ensure that the application prevents authorized users from unauthorized access to data

A

Access Test

56
Q

Ensure that the application creates an adequate audit trail
Produces complete transaction listings, and generates error files and reports for all exceptions.

A

Audit Trail Test

57
Q

Verify the correctness of rounding procedures

A

Rounding Error Tests

58
Q

CAATTs

A

Computer Audit Tools and Techniques

59
Q

Types of Computer Audit Tools and Techniques (CAATTs)

A

Test Data Method
Creating Test Data
Base Case System Evaluation
Tracing
Integrated Test Facility
Parallel Simulation
GAS

60
Q

used to establish application integrity by processing specially prepared sets of input data through production applications that are under review.

A

Test Data Method

61
Q

Auditors must prepare a complete set of both valid and invalid transactions

A

Creatin Test Data

62
Q

When the set of test data in use is comprehensive

A

Base Case System Evaluation (BCSE)

63
Q

Performs an electronic walk-through of the application’s internal logic
Requires a detailed understanding of the applications internal logic

A

Tracing

64
Q

Advantages of Test Data Techniques

A

Employed through computer testing
Employed with only minimal disruption to the organization
Requires only minimal computer expertise on the part of auditors

65
Q

Disadvantages of Test Data Techniques

A

Must rely on computer services
Audit evidence collected by independent means is more reliable than the one supplied by the client
Provides a static picture of application integrity at a single point in time
High cost of implementation, results in auditing enfficiency

66
Q

Disadvantages of Test Data Techniques

A

Must rely on computer services
Audit evidence collected by independent means is more reliable than the one supplied by the client
Provides a static picture of application integrity at a single point in time
High cost of implementation, results in auditing inefficiency

67
Q

An automated technique that enables the auditor to test an application’s logic and controls during its normal operation

A

Integrated Test Facility (ITF)

68
Q

Auditors writes or obtain a copy of the program that stimulates key features or processes to be reviewed or tested

A

Parallel Simulation