IT Theory

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

MODULE 6 AUDITING WITH TECHNOLOGY 205

MULTIPLE-CHOICE QUESTIONS (1-33) a. Complexity of client’s systems and IT controls.


b. Requirements to assess going concern status.
1. An advantage of using systems flowcharts to document c. Client’s use of emerging technologies.
information about internal control instead of using internal d. Extent of entity’s participation in electronic com-
control questionnaires is that systems flowcharts merce.
a. Identify internal control weaknesses more promi-
nently. 8. Which of the following strategies would a CPA most
b. Provide a visual depiction of clients’ activities. likely consider in auditing an entity that processes most of
c. Indicate whether control procedures are operating its financial data only in electronic form, such as a paperless
effectively. system?
d. Reduce the need to observe clients’ employees per- a. Continuous monitoring and analysis of transaction
forming routine tasks. processing with an embedded audit module.
b. Increased reliance on internal control activities that
2. A flowchart is most frequently used by an auditor in emphasize the segregation of duties.
connection with the c. Verification of encrypted digital certificates used
a. Preparation of generalized computer audit pro- to monitor the authorization of transactions.
grams. d. Extensive testing of firewall boundaries that re-
b. Review of the client’s internal control. strict the recording of outside network traffic.
c. Use of statistical sampling in performing an audit.
d. Performance of analytical procedures of account 9. Which of the following is not a major reason for main-
balances. taining an audit trail for a computer system?
a. Deterrent to fraud.
3. Matthews Corp. has changed from a system of re- b. Monitoring purposes.
cording time worked on clock cards to a computerized pay- c. Analytical procedures.
roll system in which employees record time in and out with d. Query answering.
magnetic cards. The computer system automatically updates
all payroll records. Because of this change 10. Computer systems are typically supported by a variety
a. A generalized computer audit program must be of utility software packages that are important to an auditor
used. because they
b. Part of the audit trail is altered. a. May enable unauthorized changes to data files if
c. The potential for payroll-related fraud is dimin- not properly controlled.
ished. b. Are very versatile programs that can be used on
d. Transactions must be processed in batches. hardware of many manufacturers.
c. May be significant components of a client’s appli-
4. Which of the following is correct concerning batch pro- cation programs.
cessing of transactions? d. Are written specifically to enable auditors to ex-
a. Transactions are processed in the order they occur, tract and sort data.
regardless of type.
b. It has largely been replaced by on-line real-time 11. An auditor would most likely be concerned with which
processing in all but legacy systems. of the following controls in a distributed data processing
c. It is more likely to result in an easy-to-follow audit system?
trail than is on-line transaction processing. a. Hardware controls.
d. It is used only in nondatabase applications. b. Systems documentation controls.
c. Access controls.
5. An auditor would be most likely to assess control risk at d. Disaster recovery controls.
the maximum level in an electronic environment with auto-
mated system-generated information when 12. Which of the following types of evidence would an
a. Sales orders are initiated using predetermined, auditor most likely examine to determine whether internal
automated decision rules. control is operating as designed?
b. Payables are based on many transactions and large a. Gross margin information regarding the client’s in-
in dollar amount. dustry.
c. Fixed asset transactions are few in number, but b. Confirmations of receivables verifying account
large in dollar amount. balances.
d. Accounts receivable records are based on many c. Client records documenting the use of computer
transactions and are large in dollar amount. programs.
d. Anticipated results documented in budgets or fore-
6. In a highly automated information processing system casts.
tests of control
a. Must be performed in all circumstances. 13. An auditor anticipates assessing control risk at a low
b. May be required in some circumstances. level in a computerized environment. Under these circum-
c. Are never required. stances, on which of the following activities would the
d. Are required in first year audits. auditor initially focus?
a. Programmed control activities.
7. Which of the following is least likely to be considered b. Application control activities.
by an auditor considering engagement of an information c. Output control activities.
technology (IT) specialist on an audit? d. General control activities.
206 MODULE 6 AUDITING WITH TECHNOLOGY

14. After the preliminary phase of the review of a client’s c. Enter invalid identification numbers or passwords
computer controls, an auditor may decide not to perform to ascertain whether the system rejects them.
tests of controls (compliance tests) related to the controls d. Vouch a random sample of processed transactions
within the computer portion of the client’s internal control. to assure proper authorization.
Which of the following would not be a valid reason for
choosing to omit such tests? 20. An auditor most likely would introduce test data into a
a. The controls duplicate operative controls existing computerized payroll system to test controls related to the
elsewhere in the structure. a. Existence of unclaimed payroll checks held by su-
b. There appear to be major weaknesses that would pervisors.
preclude reliance on the stated procedure. b. Early cashing of payroll checks by employees.
c. The time and dollar costs of testing exceed the time c. Discovery of invalid employee I.D. numbers.
and dollar savings in substantive testing if the tests d. Proper approval of overtime by supervisors.
of controls show the controls to be operative. 21. When an auditor tests a computerized accounting sys-
d. The controls appear adequate. tem, which of the following is true of the test data approach?
15. Auditing by testing the input and output of a computer a. Several transactions of each type must be tested.
system instead of the computer program itself will b. Test data are processed by the client’s computer
a. Not detect program errors which do not show up in programs under the auditor’s control.
the output sampled. c. Test data must consist of all possible valid and in-
b. Detect all program errors, regardless of the nature valid conditions.
of the output. d. The program tested is different from the program
c. Provide the auditor with the same type of evidence. used throughout the year by the client.
d. Not provide the auditor with confidence in the re- 22. Which of the following statements is not true of the test
sults of the auditing procedures. data approach when testing a computerized accounting sys-
16. Which of the following client electronic data processing tem?
(EDP) systems generally can be audited without examining a. The test need consist of only those valid and inva-
or directly testing the EDP computer programs of the sys- lid conditions which interest the auditor.
tem? b. Only one transaction of each type need be tested.
a. A system that performs relatively uncomplicated c. The test data must consist of all possible valid and
processes and produces detailed output. invalid conditions.
b. A system that affects a number of essential master d. Test data are processed by the client’s computer
files and produces a limited output. programs under the auditor’s control.
c. A system that updates a few essential master files 23. Which of the following is not among the errors that an
and produces no printed output other than final auditor might include in the test data when auditing a cli-
balances. ent’s computer system?
d. A system that performs relatively complicated pro- a. Numeric characters in alphanumeric fields.
cessing and produces very little detailed output. b. Authorized code.
17. An auditor who wishes to capture an entity’s data as c. Differences in description of units of measure.
transactions are processed and continuously test the entity’s d. Illogical entries in fields whose logic is tested by
computerized information system most likely would use programmed consistency checks.
which of the following techniques? 24. Which of the following computer-assisted auditing
a. Snapshot application. techniques allows fictitious and real transactions to be pro-
b. Embedded audit module. cessed together without client operating personnel being
c. Integrated data check. aware of the testing process?
d. Test data generator. a. Integrated test facility.
18. Which of the following computer-assisted auditing b. Input controls matrix.
techniques processes client input data on a controlled pro- c. Parallel simulation.
gram under the auditor’s control to test controls in the com- d. Data entry monitor.
puter system? 25. Which of the following methods of testing application
a. Test data. controls utilizes a generalized audit software package pre-
b. Review of program logic. pared by the auditors?
c. Integrated test facility. a. Parallel simulation.
d. Parallel simulation. b. Integrated testing facility approach.
19. To obtain evidence that on-line access controls are c. Test data approach.
properly functioning, an auditor most likely would d. Exception report tests.
a. Create checkpoints at periodic intervals after live 26. In creating lead schedules for an audit engagement, a
data processing to test for unauthorized use of the CPA often uses automated work paper software. What cli-
system. ent information is needed to begin this process?
b. Examine the transaction log to discover whether a. Interim financial information such as third quarter
any transactions were lost or entered twice due to a sales, net income, and inventory and receivables
system malfunction. balances.
MODULE 6 AUDITING WITH TECHNOLOGY 207

b. Specialized journal information such as the invoice d. Request a printout of a sample of account balances
and purchase order numbers of the last few sales so they can be individually checked against the
and purchases of the year. credit limits.
c. General ledger information such as account num-
bers, prior year account balances, and current year 32. An auditor most likely would test for the presence of
unadjusted information. unauthorized computer program changes by running a
d. Adjusting entry information such as deferrals and a. Program with test data.
accruals, and reclassification journal entries. b. Check digit verification program.
c. Source code comparison program.
27. Using microcomputers in auditing may affect the d. Program that computes control totals.
methods used to review the work of staff assistants because
a. The audit fieldwork standards for supervision may 33. An entity has the following invoices in a batch:
differ. Invoice # Product Quantity Unit price
b. Documenting the supervisory review may require 201 F10 150 $ 5.00
202 G15 200 $10.00
assistance of consulting services personnel.
203 H20 250 $25.00
c. Supervisory personnel may not have an under- 204 K35 300 $30.00
standing of the capabilities and limitations of mi-
crocomputers. Which of the following numbers represents the record
d. Working paper documentation may not contain count?
readily observable details of calculations. a. 1
b. 4
28. An auditor would least likely use computer software to c. 810
a. Access client data files. d. 900
b. Prepare spreadsheets.
c. Assess computer control risk.
d. Construct parallel simulations.
29. A primary advantage of using generalized audit soft-
ware packages to audit the financial statements of a client
that uses a computer system is that the auditor may
a. Access information stored on computer files while
having a limited understanding of the client’s
hardware and software features.
b. Consider increasing the use of substantive tests of
transactions in place of analytical procedures.
c. Substantiate the accuracy of data through self-
checking digits and hash totals.
d. Reduce the level of required tests of controls to a
relatively small amount.
30. Auditors often make use of computer programs that
perform routine processing functions such as sorting and
merging. These programs are made available by electronic
data processing companies and others and are specifically
referred to as
a. Compiler programs.
b. Supervisory programs.
c. Utility programs.
d. User programs.
31. Smith Corporation has numerous customers. A cus-
tomer file is kept on disk storage. Each customer file con-
tains name, address, credit limit, and account balance. The
auditor wishes to test this file to determine whether credit
limits are being exceeded. The best procedure for the audi-
tor to follow would be to
a. Develop test data that would cause some account
balances to exceed the credit limit and determine if
the system properly detects such situations.
b. Develop a program to compare credit limits with
account balances and print out the details of any
account with a balance exceeding its credit limit.
c. Request a printout of all account balances so they
can be manually checked against the credit limits.
208 MODULE 6 AUDITING WITH TECHNOLOGY

PROBLEMS procedures. Do not describe subsequent manual auditing


NOTE: These types of problems are no longer included on the procedures.
CPA Examination but they have been retained because they are Group the procedures by those using (a) the perpetual
useful in developing skills to complete simulations. inventory file and (b) the physical inventory and test count
files.
Problem 1 (15 to 25 minutes)
Microcomputer software has been developed to im-
prove the efficiency and effectiveness of the audit. Elec- Problem 3 (15 to 25 minutes)
tronic spreadsheets and other software packages are avail- When obtaining an understanding of internal control,
able to aid in the performance of audit procedures otherwise auditors may use a variety of computer assisted audit tech-
performed manually. niques (CAAT) for tests of controls. Those techniques may
be divided into the following categories:
Required:
A. Program analysis.
Describe the potential benefits to an auditor of using
B. Program testing.
microcomputer software in an audit as compared to per-
C. Continuous testing.
forming an audit without the use of a computer.
D. Review of operating systems and other systems.
Required:
Problem 2 (15 to 25 minutes)
For each of the above categories, present and briefly
Brown, CPA, is auditing the financial statements of describe two examples of CAAT that may be applied.
Big Z Wholesaling, Inc., a continuing audit client, for the
year ended January 31, 20X1. On January 5, 20X1, Brown
observed the tagging and counting of Big Z’s physical in-
ventory and made appropriate test counts. These test counts Problem 4 (15 to 25 minutes)
have been recorded on a computer file. As in prior years, Auditors have seen a rapid increase in the extent of
Big Z gave Brown two computer files. One file represents computer processing among clients and dramatic increases
the perpetual inventory (FIFO) records for the year ended in the power and level of sophistication of computer hard-
January 31, 20X1. The other file represents the January 5 ware and software. To such audit systems auditors can
physical inventory count. choose from a variety of computerized audit tools for the
Assume: planning, administration, performance and reporting of an
audit. For example, auditors may use electronic spread-
• Brown issued an unqualified opinion on the prior
sheets.
year’s financial statements.
• All inventory is purchased for resale and located in Required:
a single warehouse. Describe uses of electronic spreadsheets and present
• Brown has appropriate computerized audit soft- four other types of common computerized audit tools and
ware. describe their uses.
• The perpetual inventory file contains the following
information in item number sequence:
• Beginning balances at February 1, 20X0:
Item number, item description, total quantity, and
prices.
• For each item purchased during the year:
Date received, receiving report number, vendor, item
number, item description, quantity, and total dollar
amount.
• For each item sold during the year: Date
shipped, invoice number, item number, item descrip-
tion, quantity shipped, and dollar amount of the cost
removed from inventory.
• For each item adjusted for physical inventory
count differences: Date, item number, item description,
quantity, and dollar amount.
• The physical inventory file contains the following
information in item number sequence: Tag number, item
number, item description, and count quantity.
Required:
Describe the substantive auditing procedures Brown
may consider performing with computerized audit software
using Big Z’s two computer files and Brown’s computer file
of test counts. The substantive auditing procedures de-
scribed may indicate the reports to be printed out for
Brown’s follow-up by subsequent application of manual
MODULE 6 AUDITING WITH TECHNOLOGY 209

SIMULATION PROBLEM
Simulation Problem 1 (15 to 20 minutes)

Computer processing has become the primary means used to process financial accounting information in most businesses.
Consistent with this situation, CPAs must have knowledge of audit techniques using computers and of computer terminology.

Part a.
Select the type of audit technique being described in items 1 through 5. Computer audit techniques may be used once,
more than once, or not at all.
Computer audit technique
A. Auditing “around” the computer E. Processing output control
B. I/O audit approach F. Test data
C. Integrated test facility G. Write extract routine
D. Parallel simulation
Description (A) (B) (C) (D) (E) (F) (G)
1. Auditing by manually testing the input and output of a computer system. { { { { { { {
2. Dummy transactions developed by the auditor and processed by the client’s computer
{ { { { { { {
programs, generally for a batch processing system.
3. Fictitious and real transactions are processed together without the client’s operating
{ { { { { { {
personnel knowing of the testing process.
4. May include a simulated division or subsidiary into the accounting system with the
{ { { { { { {
purpose of running fictitious transactions through it.
5. Uses a generalized audit software package prepared by the auditors. { { { { { { {

Part b.
For items 6 through 10 select the type of computer control that is described in the definition that is presented. Each con-
trol may be used once, more than once, or not at all.
Control
H. Backup and recovery M. Hash total
I. Boundary protection N. Missing data check
J. Check digit O. Personal identification codes
K. Control digit P. Visitor entry logs
L. File protection ring
Description (H) (I) (J) (K) (L) (M) (N) (O) (P)
6. A control that will detect blanks existing in input data when they should not. { { { { { { { { {
7. A control to ensure that jobs run simultaneously in a multiprogramming { { { { { { { { {
environment cannot change the allocated memory of another job.
8. A digit added to an identification number to detect certain types of data { { { { { { { { {
transmission or transposition errors.
9. A terminal control to limit access to programs or files to authorized users. { { { { { { { { {
10. A total of one field for all the records of a batch where the total is { { { { { { { { {
meaningless for financial purposes.

Part c.
The use of sophisticated information technology may provide both benefits and risks relating to internal control. Find one
place in the Professional Standards that lists IT benefits and risks relating to internal control. You may simply paste the
appropriate material to your solution.
210 MODULE 6 AUDITING WITH TECHNOLOGY

MULTIPLE-CHOICE ANSWERS

1. b __ __ 7. b __ __ 13. d __ __ 19. c __ __ 25. a __ __ 31. b __ __


2. b __ __ 8. a __ __ 14. d __ __ 20. c __ __ 26. c __ __ 32. c __ __
3. b __ __ 9. c __ __ 15. a __ __ 21. b __ __ 27. d __ __ 33. b __ __
4. c __ __ 10. a __ __ 16. a __ __ 22. c __ __ 28. c __ __
5. c __ __ 11. c __ __ 17. b __ __ 23. a __ __ 29. a __ __ 1st: __/33 = __%
6. b __ __ 12. c __ __ 18. d __ __ 24. a __ __ 30. c __ __ 2nd: __/33 = __%

MULTIPLE-CHOICE ANSWER EXPLANATIONS

A. Auditor’s Consideration of Internal Control When a rect because batch processing may be used for database ap-
Computer Is Present plications.
1. (b) The requirement is to identify an advantage of 5. (c) The requirement is to determine when an auditor
using systems flowcharts to document information about would be most likely to assess control risk at the maximum
internal control instead of using internal control question- level in an electronic environment with automated system-
naires. Answer (b) is correct because flowcharts provide a generated information. Answer (c) is correct because the
visual depiction of clients’ activities which make it possible few transactions involved in fixed assets make it most likely
for auditors to quickly understand the design of the system. to be one in which a substantive approach of restricting de-
Answer (a) is incorrect because while the flow of operations tection risk is most likely to be effective and efficient. An-
is visually depicted, internal control weaknesses are not as swer (a) is incorrect because an auditor might be expected to
obvious. Answer (c) is incorrect because while a flowchart perform tests of controls to assess control risk below the
describes a system, the flowchart alone does not indicate maximum when automated decision rules are involved for
whether that system is operating effectively. Answer (d) is an account (sales) which ordinarily has many transactions.
incorrect because auditors still need to determine whether Answers (b) and (d) are incorrect because the numerous
the system has been placed in operation and therefore the transactions in payables and receivables make it likely that
need to observe employees performing routine tasks re- control risk will be assessed below the maximum.
mains.
6. (b) The requirement is to identify the most accurate
2. (b) The requirement is to determine when a flow- statement with respect to tests of controls of a highly auto-
chart is most frequently used by an auditor. Answer (b) is mated information processing system. Answer (b) is correct
correct because flowcharts are suggested as being appropri- because AU 319 states that in some such circumstances sub-
ate for documenting the auditor’s consideration of internal stantive tests alone will not be sufficient to restrict detection
control. Answer (a) is incorrect because auditors do not risk to an acceptable level. Answer (a) is incorrect because
frequently write their own generalized computer audit pro- tests of controls need not be performed in all such circum-
grams, the most likely time a flowchart would be used with stances. Answer (c) is incorrect because such tests are
respect to such software. Answers (c) and (d) are incorrect sometimes required. Answer (d) is incorrect because tests of
because statistical sampling and analytical procedures do not controls are not in such circumstances in all first year audits.
in general require the use of flowcharts.
7. (b) The requirement is to identify the least likely
3. (b) The requirement is to identify the correct state- circumstance in which an auditor would consider engage-
ment with respect to a computerized, automatically updating ments of an IT specialist on an audit. Answer (b) is correct
payroll system in which magnetic cards are used instead of a because the requirement to assess going concern status re-
manual payroll system with clock cards. Answer (b) is cor- mains the same on all audits, and thus does not directly af-
rect because the automatic updating of payroll records alters fect engagement of an IT specialist. Answers (a), (c), and
the audit trail which, in the past, included steps pertaining to (d) are all incorrect because complexity, the use of emerging
manual updating. Answer (a) is incorrect because although technologies, and participation in electronic commerce are
an auditor may choose to use a generalized computer audit all factors which AU 319 suggests make it more likely that
program, it is not required. Answer (c) is incorrect because an IT specialist will be engaged.
no information is presented that would necessarily indicate a
change in the likelihood of fraud. Answer (d) is incorrect 8. (a) The requirement is to identify a strategy that a
because given automatic updating, a large portion of the CPA most likely would consider in auditing an entity that
transactions are not processed in batches. processes most of its financial data only in electronic form.
Answer (a) is correct because continuous monitoring and
4. (c) The requirement is to identify the correct state- analysis of transaction processing with an embedded audit
ment concerning the batch processing of transactions. Batch module might provide an effective way of auditing these
processing involves processing transactions through the processes—although some question exists as to how many
system in groups of like transactions (batches). Answer (c) embedded audit modules CPAs have actually used in prac-
is correct because the similar nature of transactions involved tice. Answer (b) is incorrect because there may well be a
with batch processing ordinarily makes it relatively easy to decrease in reliance on internal control activities that empha-
follow the transactions throughout the system. Answer (a) is size this segregation of duties since so many controls are in
incorrect because transactions are processed by type, not in the hardware and software of the application. Answer (c) is
the order they occur regardless of type. Answer (b) is incor- incorrect because digital certificates deal with electronic
rect because many batch applications still exist and might be commerce between companies, a topic not directly ad-
expected to exist well into the future. Answer (d) is incor- dressed by this question, and because such certificates pro-

You might also like