Question
1.All the following documents can be used for payroll audit trail except: Select one: a.Job tickets b.Imprest account c.Personnel action forms d.Timecards 2.All the following
1.All the following documents can be used for payroll audit trail except:
Select one:
a.Job tickets
b.Imprest account
c.Personnel action forms
d.Timecards
2.All the following are examples of problems that may occur as a result of combining applications programming and maintenance tasks into one position, except:
Select one:
a.Job security issues
b.Increased potential for program fraud
c.Inadequate documentation
d.Maintenance irregularities
3.When processing records, the system sequences records according to the primary key and possibly the secondary key. What is this processing called?
Select one:
a.Edit run
b.Delete run
c.Sort run
d.Update run
4.In a database environment, individual users may be granted summary and statistical query access to confidential data to which they normally are denied direct access. Based on that, users may be able to determine the specific value of a data item. Which kind of database compromise is this?
Select one:
a.Approximate compromise
b.Positive compromise
c.Negative compromise
d.Statistical compromise
5.All the following can determine the level of control used for an information system except:
Select one:
a.Substantive test
b.Cost/benefit analysis
c.Sensitivity of data
d.Importance of information asset
6.An auditor intends to use random sampling on data for the purpose of statistical analysis. She realizes that records in the data file are fairly evenly distributed across strata. Which sampling method should she use?
Select one:
a.MUS
b.Record sampling
c.Module sampling
d.Field sampling
7.All the following are examples of detective controls except:
Select one:
a.Log of users
b.Audit trails
c.Comparison between computer totals and batch totals
d.Passwords
8.A payroll batch system was prepared with the wrong tax and super figures. The operator who runs the system realizes this error, and is accordingly required to choose the most suitable error handling techniques. What should she choose?
Select one:
a.Creat an error file
b.Correct immediately
c.Create test transactions with correct tax and super figures
d.Reject the batch
9.An auditor is doing some reconciliation of subsidiary accounts with control accounts. Which of the broad classes of control activities defined by COSO does the auditor's activity belong to?
Select one:
a.Accounting records
b.Transaction authorization
c.Segregation of duties
d.Independent verification
10.During audit process, the company's management affirms that all transactions in the income statement actually happened. What kind of assertion is this?
Select one:
a.Valuation
b.Occurrence
c.Completeness
d.Rights and obligations
11.An information system that is accessed online by users from different parts of the world provides interfaces in one language. This may be considered an ethical issues related to:
Select one:
a.Ownership of property
b.Security
c.Equity in access
d.Privacy
12.All the following steps are related to Transaction Processing System (TPS) except:
Select one:
a.Journalize and post the closing entries
b.Capture the transaction
c.Post to the subsidiary ledger
d.Record transaction in special journal
13.All the following are elements of a database environment except:
Select one:
a.Administrator
b.Users
c.DBMS
d.Master file
14.In a typical revenue cycle, the sales department should have stewardship of all the following items, except:
Select one:
a.Customer open order file
b.Sales history file
c.Sales journal
d.Credit memo file
15.As part of disaster recovery planning, the company has decided to invest in a fully equipped backup data center that will be shared with other interested companies. This is considered:
Select one:
a.Mutual aid pact
b.Internally provided backup
c.ROC
d.Cold site
16.What is the ACL feature that can be used to produce reports about due invoices based on the number of days since the respective invoices were received?
Select one:
a.Join
b.Export
c.Aging
d.Sample
17.What do we call the formal contract between the seller and the carrier to transport goods to the customer?
Select one:
a.Shipping notice
b.Sales order
c.Packing slip
d.Bill of lading
18.The company has decided to avail its Enterprise Resource Planning (ERP) system for the employees on the cloud. What kind of cloud service is this?
Select one:
a.PaaS
b.SaaS
c.FaaS
d.IaaS
19.All the following are examples of field interrogation techniques except:
Select one:
a.Ensuring that date of birth follows the format mm-dd-yyyy
b.Ensuring that the employee's pay rate does not exceed $20 per hour
c.Ensuring that a security guard has no more than 30 days per year as annual leave
d.Ensuring that an employee's record has address
20.Why do companies resort to outsourcing the IT function?
Select one:
a.To reduce cost
b.To lose strategic advantage
c.To manage vendors properly so we can focus on core business processes
d.To enjoy cloud services and virtualization
21.The marketing department detects a need to purchase material to be used in the coming marketing campaign. Accordingly, the marketing department completes a:
Select one:
a.Accounts payable order
b.Purchase order
c.Purchase file
d.Purchase requisition
22.During an audit, the auditor discovers that some unusual system malfunction has corrupted data. This is considered:
Select one:
a.Irregularity
b.Error
c.Mistake
d.Risk
23.You are the technical consultant of a big project to creat an online platform for the retail businesses. The platform will store data of customers to provide personalized services. As part of your responsibilities, you should come up with policies to govern the possibility of sharing data with third parties. Your work in this case is related to ethical issues regarding:
Select one:
a.Security
b.Equity in access
c.Privacy
d.Ownership of property
24.What is the name of the technology that is used to divide computer resources into more than one execution environment?
Select one:
a.Cloud
b.RAID
c.ROC
d.Virtualization
25.All the following are physical controls that can be used in the expenditure cycle except:
Select one:
a.Check register
b.Authorization
c.Reconciliation
d.Multilevel security
26.When auditors examine internal control systems, there are 4 modifying assumptions that should guide the design. Which of the following is not one of these principles?
Select one:
a.Management responsibility
b.Limitations
c.Reasonable assurance
d.Efficient operations
27.All the following are fraud-motivating forces except:
Select one:
a.Ethics
b.Opportunities
c.Situational pressure
d.Governance structure
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started