SIM Week 1-3 Flashcards

1
Q

a tool used by auditors to

determine irregularities from the given data.

A

CAATS or Computer-Assisted Audit Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the meaning of CAATs

A

Computer-Assisted Audit Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are tools used by auditors as part of
their audit procedures to process data of audit significance contained in an entity’s computer
systems.

A

Computer-Assisted Audit Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False:

Advantage of CAATS
a. Independently access the data stored on a computer system without dependence on
the client
b. Test the reliability of client software
c. Decrease the accuracy of audit tests
d. Perform audit tests less efficiently, which in the long-term will result in a more costeffective audit.

A

A. True
B. True
C. False
D. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False

Disadvantages of CAATS

CAATs can be expensive and time consuming to set up, the software must either be
purchased or designed (in which case specialist IT staff will be needed);

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False

Disadvantages of CAATS

Client permission and cooperation are very easy to obtain

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False

Disadvantages of CAATS

Potential compatibility with the client’s computer system

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False

Disadvantages of CAATS

The audit team may not have sufficient IT skills and knowledge to create the complex
data extracts and programming required

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False

Disadvantages of CAATS

The audit team may not have the knowledge or training needed to understand the
results of the CAATs

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False

Disadvantages of CAATS

Data may be corrupted or lost during the application of CAATs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three Classifications of CAATs

A
  1. Audit Software
  2. Test Data
  3. Other techniques
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

generic term used to describe computer programs designed to carry
out tests of control and/or substantive procedures

A

Audit Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

consist of pre-prepared generalized programs used by auditors and are not
‘client specific

A

Package Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These programs are usually ‘client specific’ and may be used to carry out tests of
control or substantive procedures

A

Purpose written programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Programs used in any event the audit firm’s audit plan should ensure that provision is made to ensure
that specified programs are appropriate for a client’s system and the needs of the
audit.

A

Purpose written programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
used to re-perform computerized control procedures or perhaps to carry out an aged analysis of 
trade receivable (debtor) balances.
A

Purpose written programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These programs are integral to the client’s accounting system; however, they may
be adapted for audit purposes

A

Enquiry programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

used to test the existence and effectiveness of controls built into an
application program used by an audit client. As such, dummy transactions are
processed through the client’s computerized system. The results of processing are
then compared to the auditor’s expected results to determine whether controls are
operating efficiently and systems’ objectiveness are being achieved.

A

Audit test data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

To avoid the risk of corrupting a client’s account system, by processing test data with
the client’s other ‘live’ data, auditors may instigate special ‘test data only’ processing
runs for audit test data. The major disadvantage of this is that the auditor does not
have total assurance that the test data is being processed in a similar fashion to the
client’s live data. To address this issue, the auditor may therefore seek permission
from the client to establish an _________

A

Integrated test facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Common CAATs Software

A

a. Spreadsheets (ActiveData for Excel)
b. Access
c. SAS
d. Generalized Audit Software (e.g. ACL, Arbutus, EAS)
e. Business Intelligence ( e.g. Crystal Reports and Business Objects)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Threats to Accounting Information Systems

A

a. Natural and Political Disasters
b. Software and Hardware Error
c. Unintentional Acts
d. Intentional Acts or Computer Crimes

22
Q

Fraud Triangle

A

IRO

Intentional
Rationalization
Opportunity

23
Q

Approaches to Computer Fraud

A
  1. Auditing around the computer (black-box approach)

2. Auditing through the computer (white-box approach

24
Q

the auditors test the reliability of the information generated by the
system. The auditors will calculate the expected result of such information give and
compared it to the output generated by the system. If the expected result of the auditor
is the same with the generated output of the system, the auditor will assume the
effectiveness of the system.

A

Auditing around the computer (black-box approach)

25
Q

The auditor does not need thorough knowledge of the system’s internal logic and the
systems are not interrupted for the purpose of auditing. This is only effective if the
company has a simple system application

A

Auditing around the computer (black-box approach)

26
Q

In this approach, the auditor will need thorough understanding of the system of the
company. Test cases may be created to test the effectiveness of system’s logic and
controls of the system.

A

Auditing through the computer (white-box approach)

27
Q

the auditor uses a set of input data, valid or invalid, to

validate the system.

A

Test data technique

28
Q

the auditor writes a computer program to reprocess the
past data of the firm and generate results. The result from simulation will be
compared to actual results of the company’s system to validate the system.

A

Parallel simulation

29
Q

the auditor will create fictitious situations through
the systems within the normal operations in order to test the reliability of the
system.

A

ITF or integrated test facility

30
Q

this is a programmed audit module added to
the company’s system that enables auditor to collect data over online
transactions. This requires computer programming skills to auditors.

A

EAM or embedded audit module

31
Q

Computer Fraud:

most simple and safe common types of computer abuses.
This is also termed as data diddling and often adopted by persons who are authorized
a certain data for specific purpose like entry, examination, encoding, or transmitting
data.

A

False data entry

32
Q

when a person get the password and identification
of the authorized user and use it to access computer systems and damage the security
of the information.

A

Impersonation

33
Q

his a program the create instructions to perform unauthorized act or
functions. This is one of the most difficult to identify the perpetrators.

A

Trojan horses

34
Q

unnoticed because of low value. The
rounding off of value downward is not noticed easily because per rounding off the
value involved is very low and manual computation for verification is quite
cumber-some. The fractions of rounding off are then automatically accumu-lated in
some other account that can be accessed by the abuser without hurdles.

A

Salami techniques

35
Q

where an unauthorized access of information
is obtained through with the exchange of information and authentication through the
server information.

A

Piggybacking

36
Q

It is a utility program generally to authorized emergency access due
to inaccessibility of the system to authorized users. Therefore, it acts as the
master key that bypasses the normal security routines.

A

Super-zapping

37
Q

It involves searching trash copies or carbon papers of computer listings.
Some software has temporary files that are overwritten that may copied by
unauthorized users

A

Scavenging

38
Q

During the development of software, programmers leave breaks in the
code as debugging aids that may remain inad-vertently or intentionally in the final
programs. These unexpected and incomplete instructions in program code and
unused param-eters in the code may be misused for Trojan Horses or for false data
entry.

A

Trapdoors

39
Q

It is set of instructions that are executed when a given condition is
satisfied. Sometimes, programmers include instructions in the code that would
perform unauthorized functions.

A

Logic bomb

40
Q

also called a wire spying – is also a threat to security of computer
networks.

A

Wiretapping

41
Q

a self-replicating program that runs and spreads by modifying other programs
or files.

A

Virus

42
Q

self-replicating, self-propagating, self-contained program that uses
networking mechanisms to spread itself.

A

Worm

43
Q

unauthorized copying of data files

A

Data leakage

44
Q

theft of storage media such as floppy disks, cartridge tapes,
USBs, CDs, etc.

A

Theft of storage media

45
Q

sending unsolicited information in bulk.

A

spam

46
Q

the prevention of authorized access to resources or

delaying the time-critical operations.

A

Denial-of-service (DoS)

47
Q

software secretly installed in the system to gather information of the
organization.

A

Spyware

48
Q

sending a network packet that appears to come from original source

A

Spoofing

49
Q

manipulating someone to take certain action that may not be in
that best person’s interest.

A

Social engineering

50
Q

a collection of software robots that overruns computers to act automatically
in response to the bot-herder’s control inputs through the Internet.

A

Botnet