Feedback General Feedback Ensuring That Changes Are Authorized, Tested, Documented, and Implemented Securely
Feedback General Feedback Ensuring That Changes Are Authorized, Tested, Documented, and Implemented Securely
What is the primary purpose of controlling program change activities within an IT system?
, Not Selected
, Not Selected
Correct answer:
Ensuring that changes are authorized, tested, documented, and implemented securely
, Not Selected
Feedback
General Feedback
Answer: The correct answer is Ensuring that changes are authorized, tested, documented, and
implemented securely.
Explanation: Controlling program change activities ensures that each modification to a system is
thoroughly reviewed, authorized, and documented to minimize risks associated with unauthorized
or poorly tested changes.
1 / 1 point
Why is documentation of program changes critical in maintaining the integrity of the Source
Program Library (SPL)?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Answer: The correct answer is It forms an audit trail that verifies approved modifications.
Explanation: Documentation in the SPL provides an audit trail that allows auditors to verify each
change and its approval, ensuring that only authorized changes were implemented.
1 / 1 point
In the worst-case scenario where no controls are in place in the SPL, what is a key risk?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
1 / 1 point
Which control feature in the SPL Management System (SPLMS) helps track the version history of
program modifications?
, Not Selected
Correct answer:
Program version numbers
, Not Selected
Time-based restrictions
, Not Selected
Feedback
General Feedback
1 / 1 point
What is the primary role of the Integrated Test Facility (ITF) in application control testing?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: The correct answer is Allowing auditors to test application controls during normal
system operations.
Explanation: The ITF is designed to test controls by integrating test transactions with live
transactions, enabling continuous auditing without disrupting daily operations.
6
1 / 1 point
In the black box approach to auditing, what is the auditor's primary focus?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
Answer: The correct answer is Evaluating outputs and comparing them with expected results.
Explanation: The black box approach involves analyzing system outputs to ensure they align with
expected results, without requiring direct access to the system’s internal code.
1 / 1 point
What is one advantage of using the Embedded Audit Module (EAM) in monitoring application
controls?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Answer: The correct answer is It captures significant transactions during regular operations for
later review.
Explanation: The EAM monitors applications by capturing and storing critical transactions in a
separate file, which auditors can review to check for compliance with control requirements.
1 / 1 point
Why is it important to perform a source code reconciliation as part of the audit procedures?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
Answer: The correct answer is It verifies that all program changes are authorized and
documented.
Explanation: Reconciling source code ensures that only authorized changes were made,
maintaining program integrity and providing an audit trail for review.
1 / 1 point
Correct answer:
To ensure maintenance changes align with system requirements and control standards
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: The correct answer is To ensure maintenance changes align with system requirements
and control standards.
Explanation: Detailed technical specifications provide a framework for maintaining control
standards during program modifications, helping ensure changes are appropriate and meet system
needs.
10
1 / 1 point
Which technique would be used to validate program functionality without accessing the
application’s internal logic?
Parallel simulation
, Not Selected
, Not Selected
Through-the-computer testing
, Not Selected
Correct answer:
Feedback
General Feedback
11
1 / 1 point
How does the separation of test libraries from production libraries help control changes in an SPL
environment?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: The correct answer is It prevents untested versions from accidentally being deployed
as production programs.
Explanation: Separate test libraries ensure that only thoroughly tested versions are moved to
production, reducing the risk of unintended program errors affecting live systems.
12
1 / 1 point
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: The correct answer is To limit access to only authorized individuals for program
security.
Explanation: Password controls restrict SPL access to authorized individuals, helping maintain the
security and integrity of the stored programs.
13
1 / 1 point
Which audit objective aims to ensure that program libraries are secure from unauthorized access?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Answer: The correct answer is Verifying that access controls effectively limit unauthorized
entry.
Explanation: This objective focuses on confirming that only authorized personnel can access
sensitive libraries, thereby protecting them from potential unauthorized changes or access.
14
1 / 1 point
, Not Selected
Correct answer:
Through-the-computer approach
General observations
, Not Selected
, Not Selected
Feedback
General Feedback
15
1 / 1 point
How does the Integrated Test Facility (ITF) differ from parallel simulation?
, Not Selected
, Not Selected
Correct answer:
ITF inserts test transactions into live data, while parallel simulation recreates processes
independently
ITF operates externally, whereas parallel simulation only uses historical data
, Not Selected
Feedback
General Feedback
Answer: The correct answer is ITF inserts test transactions into live data, while parallel
simulation recreates processes independently.
Explanation: ITF allows testing within the live environment by integrating test transactions with
production data, while parallel simulation is conducted independently to replicate system
processes.
16
1 / 1 point
What is the purpose of the audit trail in SPL management software?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
Answer: The correct answer is Tracking and verifying program changes over time.
Explanation: The audit trail in SPL management software allows tracking of every program change
made, which is essential for verifying the integrity and authorization of each modification.
17
1 / 1 point
In application control testing, which test verifies that the system processes data only within
acceptable parameters?
, Not Selected
Correct answer:
Validity tests
Redundancy tests
, Not Selected
Access tests
, Not Selected
Feedback
General Feedback
Answer: The correct answer is Validity tests.
Explanation: Validity tests ensure that the system processes only data values that fall within
acceptable ranges, preventing errors or unauthorized data from being processed.
18
1 / 1 point
Which type of test would best ensure that data values are calculated accurately and posted
correctly to each account?
Correct answer:
Accuracy tests
, Not Selected
Redundancy tests
, Not Selected
Completeness tests
, Not Selected
Feedback
General Feedback
19
1 / 1 point
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Answer: The correct answer is To independently replicate application functions and compare
results.
Explanation: Parallel simulation allows auditors to reprocess the same transactions independently,
which helps verify the accuracy of the application’s functions by comparing outcomes with original
processing results.
20
1 / 1 point
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: The correct answer is To verify system functionality without needing internal access.
Explanation: The black box approach involves analyzing inputs and outputs without accessing the
internal system logic, which is useful for confirming overall functionality without interrupting
normal operations.
21
1 / 1 point
Which test ensures that all records in a batch process are accounted for and not omitted?
Correct answer:
Completeness tests
, Not Selected
Validity tests
, Not Selected
Redundancy tests
, Not Selected
Feedback
General Feedback
22
1 / 1 point
In an SPL-controlled environment, what is the primary role of separating test libraries from
production libraries?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
Answer: The correct answer is To prevent untested versions from mistakenly entering the
production environment.
Explanation: By maintaining separate test libraries, companies ensure that only thoroughly tested
versions are transferred to the production environment, reducing the risk of errors.
23
1 / 1 point
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: The correct answer is It detects any attempts to alter or duplicate messages.
Explanation: Message sequence numbering ensures that all messages arrive in the correct order,
helping identify any deletions, duplications, or reordering attempts that may compromise data
integrity.
24
1 / 1 point
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
25
1 / 1 point
In terms of application control testing, which technique provides continuous auditing by capturing
transactions during processing?
, Not Selected
Correct answer:
Parallel simulation
, Not Selected
, Not Selected
Feedback
General Feedback
26
1 / 1 point
Which of the following controls helps prevent unauthorized access to a Source Program Library
(SPL)?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
27
1 / 1 point
Why is it important to have separate authorization for program maintenance actions in an SPL
environment?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: To ensure changes are approved and properly documented.
Explanation: Separate authorization ensures that all program changes are reviewed and
documented, preventing unauthorized modifications and enhancing control over the SPL.
28
1 / 1 point
Which of the following is NOT an advantage of using the test data method for application control
testing?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
29
1 / 1 point
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
30
1 / 1 point
In SPL management, how does using program version numbers support auditing?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
31
1 / 1 point
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
32
1 / 1 point
Which control technique prevents accidental use of test versions in a production environment?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
1 / 1 point
Which of the following is a primary benefit of using Generalized Audit Software (GAS) in an audit?
, Not Selected
, Not Selected
Correct answer:
The ability to access multiple data types and perform various operations
, Not Selected
Feedback
General Feedback
Answer: The ability to access multiple data types and perform various operations.
Explanation: GAS allows auditors to perform various operations on data files, enabling efficient
data extraction, analysis, and reporting without specialized programming knowledge.
34
1 / 1 point
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
35
1 / 1 point
Which approach allows auditors to assess application outputs without accessing internal logic?
Tracing
, Not Selected
Parallel simulation
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
36
1 / 1 point
Which type of test would an auditor use to confirm that each transaction is only processed once?
Completeness tests
, Not Selected
Correct answer:
Redundancy tests
Audit trail tests
, Not Selected
Validity tests
, Not Selected
Feedback
General Feedback
37
1 / 1 point
In the context of SPL management, what role does a program modification report serve?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
38
1 / 1 point
In network security, why is deep packet inspection (DPI) crucial in Intrusion Prevention Systems
(IPS)?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
39
1 / 1 point
What control would detect if a hacker re-ordered messages in a stream to alter a financial
transaction?
Transaction logging
, Not Selected
Correct answer:
, Not Selected
Access control
, Not Selected
Feedback
General Feedback
Answer: Message sequence numbering.
Explanation: Message sequence numbering assigns a unique identifier to each message in a
sequence, making it easy to detect if messages have been altered, duplicated, or deleted.
40
1 / 1 point
Why is maintaining accurate system documentation critical for the audit process?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
41
1 / 1 point
Which audit procedure helps verify the accuracy of system outputs by comparing test transactions
against known results?
Redundancy testing
, Not Selected
Correct answer:
Parallel simulation
Tracing
, Not Selected
Feedback
General Feedback
42
1 / 1 point
What is the main advantage of using an Integrated Test Facility (ITF) over traditional test data
methods?
, Not Selected
, Not Selected
Correct answer:
ITF allows real-time testing during normal operations without disrupting users
, Not Selected
Feedback
General Feedback
Answer: ITF allows real-time testing during normal operations without disrupting users.
Explanation: ITF integrates test data into live data streams, allowing auditors to continuously assess
control functionality without halting regular system processes.
43
1 / 1 point
Which of the following would an auditor test to verify the integrity of SPL access control?
Transaction logs
, Not Selected
Correct answer:
, Not Selected
Firewall settings
, Not Selected
Feedback
General Feedback
44
1 / 1 point
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
45
1 / 1 point
Which of the following tests would confirm that all fields in a record are filled as required?
Accuracy tests
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
46
1 / 1 point
Which feature of an SPLMS assigns a unique version number with each authorized change?
Firewall logging
, Not Selected
, Not Selected
Correct answer:
Program versioning
, Not Selected
Feedback
General Feedback
47
1 / 1 point
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
48
1 / 1 point
Which audit approach allows auditors to evaluate application controls without interfering with live
operations?
Parallel simulation
, Not Selected
Correct answer:
Black box approach
, Not Selected
, Not Selected
Feedback
General Feedback
49
1 / 1 point
When testing the redundancy control in a payroll application, what is the primary objective?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
50
1 / 1 point
Which aspect of substantive testing is unique compared to other IT control tests?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Instructions
When answering the multiple-choice questions, begin by carefully reading the case to understand
the main points. As you work through each question, think about what it’s asking and review all the
answer choices before making your selection. Use details from the case to help you choose the
correct answer. Make sure to answer every question by selecting the answer you believe is best. If
you have time, review your answers before submitting to ensure they accurately reflect your
understanding of the case.
Golden Tigresses Sporting Goods is a company that supplies sports equipment and apparel to
various schools and athletic organizations. To streamline its inventory processes, Golden Tigresses
has implemented an automated inventory management system integrated with its receiving
department. This system updates inventory in real-time as new items are received and recorded by
a receiving clerk. The clerk logs inventory receipts at a terminal in the receiving department, with
the system automatically updating inventory records.
The company is preparing for an audit, and the auditor has been granted access to a current copy of
the inventory application and supporting documentation. The auditor’s task is to evaluate the
accuracy and integrity of the system’s inventory receipt process, which includes ensuring the
accuracy of postings to inventory accounts, validating the three-way match process, and verifying
multilevel security and access controls in the purchases/accounts payable (AP) system.
The following controls and testing procedures are relevant to this audit:
1. Test Data Creation: The auditor will create test data with valid and invalid inventory
transactions to verify if errors are appropriately identified and reported.
2. Accuracy of Postings: By setting up a master file of inventory records, the auditor will use
test data to verify if approved transactions are accurately posted to inventory accounts.
3. Three-Way Match Testing: The auditor will check if the system correctly reconciles the
quantities ordered with the items received and the supplier’s invoice amounts with the
approved purchase order prices.
4. Multilevel Security Testing: The auditor will test if different access levels in the system
limit access to various data files and functionalities according to user roles.
51
1 / 1 point
What is the primary purpose of creating test data with both valid and invalid inventory
transactions for Golden Tigresses' inventory system audit?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
52
1 / 1 point
In the test to confirm accuracy of postings to inventory accounts, the auditor will use a master
file to:
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
53
1 / 1 point
What key feature should the three-way match process demonstrate in Golden Tigresses'
inventory system?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Answer: Reconciliation of received goods with purchase orders and invoices
Explanation: The three-way match verifies the alignment between the quantities ordered, received,
and invoiced, which is critical for accurate financial records.
54
1 / 1 point
Why is it essential for the auditor to log into the system under different roles when testing
multilevel security and access controls?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Answer: To verify that each role has the correct level of access
Explanation: Testing different user roles ensures that access permissions are appropriately
restricted according to each user’s role in the company.
55
1 / 1 point
During the audit, the auditor detects discrepancies in the postings to the inventory account.
What might this indicate?
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
56
1 / 1 point
Which of the following describes a key objective of testing the security and access privileges
in Golden Tigresses' inventory and AP systems?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
57
1 / 1 point
What does the auditor aim to achieve by examining the error reports generated from the
inventory system test data?
Correct answer:
To verify that all transactions have updated the master file correctly
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: To verify that all transactions have updated the master file correctly
Explanation: Error reports highlight discrepancies, helping the auditor assess if the system
correctly identifies and addresses errors in transaction data.
58
1 / 1 point
What would be the auditor’s next step if test data reveals unauthorized access to the
inventory system by certain roles?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
Answer: Notify management of the security gap and recommend access revisions
Explanation: Unauthorized access findings require management attention to revise access
controls and prevent data misuse.
59
1 / 1 point
If the auditor’s test data shows that some transactions were posted incorrectly, what control
weakness does this highlight?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
60
1 / 1 point
When the auditor compares test results with the expected results, what outcome would signal
an effective inventory receipt process?
, Not Selected
, Not Selected
Correct answer:
Test results align with expected results, and error reports are minimal
Feedback
General Feedback
Answer: Test results align with expected results, and error reports are minimal
Explanation: Consistency between test and expected results, with few errors, suggests the system
is functioning correctly and reliably in processing inventory receipts.
Instructions
When answering the multiple-choice questions, begin by carefully reading the case to understand
the main points. As you work through each question, think about what it’s asking and review all the
answer choices before making your selection. Use details from the case to help you choose the
correct answer. Make sure to answer every question by selecting the answer you believe is best. If
you have time, review your answers before submitting to ensure they accurately reflect your
understanding of the case.
Tiger-Dragons Rowing Club, a well-known sporting organization, develops its own in-house software
to track rower performance, manage event logistics, and process memberships. Due to frequent
changes in club activities and events, the IT environment at Tiger-Dragons faces constant updates
and application development requirements.
To keep up with this dynamic environment, the club’s IT director has combined the system
development and maintenance roles into a single department. This setup allows programmers who
create new applications to maintain them as well, reducing the learning curve and allowing quicker
updates without the need for extensive system documentation. To further streamline processes,
the IT team has an "open" source program library (SPL) policy, allowing programmers unrestricted
access to all applications and enabling them to download software to their personal computers for
modifications.
The club has noted an increase in efficiency, but this approach has raised concerns among auditors
who have flagged potential risks related to fraud, poor documentation, and a lack of audit trail for
program changes.
61
1 / 1 point
What is a primary risk associated with allowing Tiger-Dragons Rowing’s programmers full
access to all programs in the SPL without restrictions?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
62
1 / 1 point
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: Increased potential for poorly documented systems
Explanation: Without separation between development and maintenance roles, programmers may
produce insufficient documentation, complicating future maintenance.
63
1 / 1 point
In the current setup at Tiger-Dragons, what is the impact of having no control over
downloading software to personal devices?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
64
1 / 1 point
Which of the following controls would most effectively limit unauthorized changes in Tiger-
Dragons’ SPL?
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
65
1 / 1 point
Why might Tiger-Dragons' current approach lack an adequate audit trail for program changes?
, Not Selected
Correct answer:
The system combines development and maintenance roles without documented changes
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: The system combines development and maintenance roles without documented changes
Explanation: When the same programmer manages development and maintenance, changes may
be undocumented, reducing audit trail reliability.
66
1 / 1 point
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
67
1 / 1 point
The absence of strict version control in Tiger-Dragons’ SPL policy could lead to:
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
68
1 / 1 point
What is a potential disadvantage of the open access policy in Tiger-Dragons' SPL system?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
69
1 / 1 point
Which of the following would be an appropriate control for Tiger-Dragons to track and report
changes made in their SPL?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
70
1 / 1 point
To improve system control and reduce risks, which of the following would be an essential
feature to add to Tiger-Dragons' SPL management?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: Passwords, audit trails, and version control for all programs
Explanation: Implementing these controls provides security and accountability, reducing the risks
of unauthorized access and ensuring only approved program versions are used.
Instructions
When answering the multiple-choice questions, begin by carefully reading the case to understand
the main points. As you work through each question, think about what it’s asking and review all the
answer choices before making your selection. Use details from the case to help you choose the
correct answer. Make sure to answer every question by selecting the answer you believe is best. If
you have time, review your answers before submitting to ensure they accurately reflect your
understanding of the case.
As you begin your verification, you recognize potential risks related to data integrity in the flat file
extraction process. You know that, in some cases, there is a risk that specific accounts might be
altered or omitted during the creation of the flat file. Therefore, you consider whether to proceed
with the flat file or to develop an independent data extraction method.
71
1 / 1 point
What primary risk should the auditor consider when relying on a flat file generated by Golden
Spikers' systems programmer?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
72
1 / 1 point
Which action should the auditor take to ensure data integrity when provided a flat file for
testing purposes by Golden Spikers?
Rely solely on the provided flat file without further verification
, Not Selected
, Not Selected
Correct answer:
Review the procedures used to create the flat file and consider alternative extraction methods
, Not Selected
Feedback
General Feedback
Answer: Review the procedures used to create the flat file and consider alternative extraction
methods
Explanation: By reviewing the file creation procedures and exploring independent extraction
methods, the auditor can reduce the risk of relying on potentially altered or incomplete data.
73
1 / 1 point
Why might an auditor with programming skills consider writing their own data extraction
routines instead of using Golden Spikers' flat file?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Answer: To avoid potential data integrity issues introduced by client-prepared files
Explanation: Creating an independent extraction routine allows the auditor to ensure data integrity,
as it bypasses the need to rely on the client’s programmer and reduces the risk of omitted or
manipulated data.
74
1 / 1 point
If the auditor suspects that certain accounts in Golden Spikers' AR file could be fraudulently
omitted in the flat file, which procedure would best address this concern?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
75
1 / 1 point
What additional step should an auditor take after receiving the flat file generated by the
Golden Spikers’ systems programmer?
, Not Selected
, Not Selected
Perform only high-level review procedures on the flat file contents
, Not Selected
Correct answer:
Evaluate the accuracy and completeness of the flat file against known records
Feedback
General Feedback
Answer: Evaluate the accuracy and completeness of the flat file against known records
Explanation: By comparing the flat file contents with known records, the auditor can verify its
accuracy and completeness, helping to detect any anomalies or omissions.
Instructions
When answering the multiple-choice questions, begin by carefully reading the case to understand
the main points. As you work through each question, think about what it’s asking and review all the
answer choices before making your selection. Use details from the case to help you choose the
correct answer. Make sure to answer every question by selecting the answer you believe is best. If
you have time, review your answers before submitting to ensure they accurately reflect your
understanding of the case.
Case: Tiger Sands - Risk Identification and Audit Concerns in AR Confirmation Process
Tiger Sands, a high-end supplier of beach and coastal equipment, relies heavily on an embedded
audit module (EAM) in its accounts receivable (AR) confirmation process. This EAM is configured to
record only “material” invoices to the audit file for external confirmation by customers. As the
manager of the external audit team, you have identified a potential risk: by focusing exclusively on
large invoices, small transactions could accumulate unnoticed, potentially overstating the AR
balance.
This concern raises a red flag, as an organized scheme involving multiple small invoices could
evade detection in the confirmation process. Additionally, there is a risk of an elaborate accounts
receivable lapping scheme, where collections from smaller invoices might be misappropriated and
cycled through customer accounts to conceal fraud.
76
1 / 1 point
Why is the auditor concerned that only “material” invoices are selected for confirmation in the
AR audit process at Tiger Sands?
The EAM system ensures all invoices are adequately reviewed, regardless of size.
, Not Selected
Material invoices are likely to be more prone to errors than smaller ones.
, Not Selected
Correct answer:
Small invoices may collectively amount to a material total, potentially overstating AR.
Confirming only material invoices is a typical audit practice with minimal risk.
, Not Selected
Feedback
General Feedback
Answer: Small invoices may collectively amount to a material total, potentially overstating AR.
Explanation: Excluding small invoices from confirmation could enable a scheme where immaterial
amounts accumulate into a significant discrepancy, leading to AR overstatement.
77
1 / 1 point
What audit risk is associated with Tiger Sands’ current EAM setup, which confirms only
material invoices?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
78
1 / 1 point
As the audit team manager, what initial step should you take to determine if Tiger Sands’ AR is
overstated due to small unconfirmed invoices?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
79
1 / 1 point
What potential fraud scheme is most likely to evade detection if Tiger Sands’ EAM only
captures material invoices?
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
80
1 / 1 point
If discrepancies are found in the sample of immaterial invoices, what action should the
auditor take next?
Request Tiger Sands to reconfigure the EAM to include only large invoices.
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
81
1 / 1 point
What is the primary purpose of reviewing small, immaterial invoices in the AR confirmation
process?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
82
1 / 1 point
What could Tiger Sands do to mitigate the risk of AR overstatement due to small, unconfirmed
invoices?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
Instructions
When answering the multiple-choice questions, begin by carefully reading the case to understand
the main points. As you work through each question, think about what it’s asking and review all the
answer choices before making your selection. Use details from the case to help you choose the
correct answer. Make sure to answer every question by selecting the answer you believe is best. If
you have time, review your answers before submitting to ensure they accurately reflect your
understanding of the case.
Case: Yellow Jackets Office Solutions – Risks in Audit Modules and System Integrity
Yellow Jackets Office Solutions, a provider of office equipment and digital solutions, installed
embedded audit modules (EAMs) two years ago to support its transaction processing and auditing
requirements. The installation and programming of these EAMs were managed under the
supervision of an external audit firm to ensure that critical transactions were logged for audit
purposes.
During this year's audit process, the external auditors requested a transaction log of all records
copied to the audit file for review. However, the auditors observed significant gaps in dates and
times for recorded transactions. Upon investigation, they discovered that, due to the increased load
on the mainframe, system operators often disabled the EAMs to ensure efficient processing of high-
priority transactions. Additionally, the application programs had undergone extensive maintenance
over the past year, raising concerns about undocumented or unauthorized changes to the system.
83
1 / 1 point
What primary risk arises from operators frequently disabling the EAMs at Yellow Jackets
Office Solutions?
, Not Selected
, Not Selected
, Not Selected
Correct answer:
Feedback
General Feedback
Answer: Unauthorized or undetected transactions may bypass audit logging.
Explanation: By turning off EAMs, essential transactions could escape logging, creating a gap in the
audit trail and increasing the risk of unauthorized or fraudulent activity going undetected.
84
1 / 1 point
How should the external auditors proceed to ensure that any changes to Yellow Jackets'
application programs are legitimate and documented?
Correct answer:
, Not Selected
, Not Selected
Request that the system operators maintain the EAMs permanently off for reliability.
, Not Selected
Feedback
General Feedback
85
1 / 1 point
What should auditors ensure regarding system programmers' access to Yellow Jackets’
system?
Correct answer:
Programmers only have access to the source code and not the running application or compilers.
Programmers have full access to all aspects of the system to troubleshoot effectively.
, Not Selected
Programmers can access the running application but not the compilers.
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: Programmers only have access to the source code and not the running application or
compilers.
Explanation: Restricting programmers to source code access reduces the risk of unauthorized
program changes, as they cannot run or alter live applications without approval.
86
1 / 1 point
What specific control should Yellow Jackets implement to monitor undocumented program
changes?
Allow EAMs to run only during routine transactions and maintenance updates.
, Not Selected
, Not Selected
Correct answer:
Enforce version control for each application change and reconcile with change records.
Increase the processing speed to handle both EAM and transaction loads.
, Not Selected
Feedback
General Feedback
Answer: Enforce version control for each application change and reconcile with change records.
Explanation: Version control ensures that each change to the application is recorded, and any
discrepancies can be traced back to prevent unauthorized modifications.
87
1 / 1 point
What is a potential exposure when application maintenance activities at Yellow Jackets are
not fully documented?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
88
1 / 1 point
To enhance the integrity of transaction records, what action should the external auditors
recommend regarding the EAMs at Yellow Jackets?
, Not Selected
Correct answer:
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: Require continuous operation of EAMs, regardless of system load.
Explanation: Continuous operation of EAMs ensures that all transactions, regardless of priority, are
logged, providing a complete audit trail without gaps.
89
1 / 1 point
If CASE (Computer-Aided Software Engineering) tools are being used at Yellow Jackets, what
control should the auditors verify?
Correct answer:
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
90
1 / 1 point
In the current scenario at Yellow Jackets, what is the potential effect of disabling the EAMs on
audit accuracy?
, Not Selected
Correct answer:
The audit process becomes faster and more efficient with fewer records.
, Not Selected
, Not Selected
Feedback
General Feedback
Instructions
When answering the multiple-choice questions, begin by carefully reading the case to understand
the main points. As you work through each question, think about what it’s asking and review all the
answer choices before making your selection. Use details from the case to help you choose the
correct answer. Make sure to answer every question by selecting the answer you believe is best. If
you have time, review your answers before submitting to ensure they accurately reflect your
understanding of the case.
1. The system was deemed necessary and was justified at various checkpoints throughout the
Systems Development Life Cycle (SDLC).
3. The system, as initially implemented, was free from significant errors or potential for fraud.
The audit identified six main activities that provide critical control evidence:
• Systems Authorization: Verifying that all systems are formally authorized before
development.
• User Specification: Ensuring users created detailed, clear specifications for their needs,
which are documented.
• Technical Design: Confirming that technical requirements are thoroughly analyzed and
documented to meet user needs.
• Internal Audit Participation: Verifying active participation by the internal audit team at key
decision points throughout the SDLC.
• Program Testing: Ensuring each program module undergoes rigorous testing to confirm
error-free functionality.
• User Testing and Acceptance: Validating that the completed system was fully tested and
formally accepted by users before being deployed.
Audit Tests: To meet these objectives, the auditors sampled completed projects and reviewed
authorization records, user specifications, technical design documents, and internal audit
participation. They also verified that program testing was documented and that test results were
saved for future reference. Finally, the audit reviewed maintenance authorizations and reconciled
program version numbers to confirm the accuracy and integrity of any modifications.
91
1 / 1 point
What is the primary purpose of the Systems Authorization activity in Teletigers’ systems
development process?
To provide users with the authority to manage the system's technical needs.
, Not Selected
, Not Selected
Correct answer:
To ensure that all systems are economically justified and formally approved.
, Not Selected
Feedback
General Feedback
Answer: To ensure that all systems are economically justified and formally approved.
Explanation: Systems Authorization confirms the project’s feasibility and justification, ensuring
each system is formally approved before development starts.
92
1 / 1 point
, Not Selected
, Not Selected
Correct answer:
By involving users in specifying needs, ensuring the system aligns with operational requirements.
, Not Selected
Feedback
General Feedback
Answer: By involving users in specifying needs, ensuring the system aligns with operational
requirements.
Explanation: User Specification ensures that the system meets operational requirements,
capturing the needs as defined by users for accurate development.
93
1 / 1 point
What role does Internal Audit Participation play in Teletigers’ systems development controls?
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
94
1 / 1 point
Correct answer:
To identify programming and logic errors by testing all branches of logic before implementation.
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: To identify programming and logic errors by testing all branches of logic before
implementation.
Explanation: Program Testing identifies potential errors by testing each module’s logic before
deployment, helping prevent issues post-implementation.
95
1 / 1 point
Ensures the final system meets user requirements and functions as expected before deployment.
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: Ensures the final system meets user requirements and functions as expected before
deployment.
Explanation: User Testing and Acceptance validate that the system meets specified requirements,
with users verifying functionality before it goes live.
96
1 / 1 point
, Not Selected
Correct answer:
To confirm that each phase of the SDLC is documented and followed accurately.
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: To confirm that each phase of the SDLC is documented and followed accurately.
Explanation: Testing controls ensure compliance with the SDLC phases, with appropriate
documentation maintained as evidence.
97
1 / 1 point
In the Teletigers audit, why should the auditor verify program version numbers?
, Not Selected
, Not Selected
Correct answer:
, Not Selected
Feedback
General Feedback
Answer: To confirm that all authorized changes are documented and tracked.
Explanation: Program version numbers are tracked to confirm each authorized change, ensuring
transparency and control over modifications.
98
1 / 1 point
During the audit, why would auditors review Teletigers' technical design activities?
, Not Selected
Correct answer:
To ensure that design activities accurately translate user needs into technical specifications.
, Not Selected
To reduce the need for rigorous user testing.
, Not Selected
Feedback
General Feedback
Answer: To ensure that design activities accurately translate user needs into technical
specifications.
Explanation: Reviewing technical design activities ensures that user needs are translated into a
functional system that meets specified requirements.
99
1 / 1 point
How does saving test data support Teletigers' systems development controls?
, Not Selected
, Not Selected
Correct answer:
It provides a reference for comparing future test results to confirm system integrity.
, Not Selected
Feedback
General Feedback
Answer: It provides a reference for comparing future test results to confirm system integrity.
Explanation: Saving test data allows auditors to reference previous results, ensuring that no
unauthorized changes impact system functionality.
100
1 / 1 point
What is the main objective of verifying user involvement in system specification at Teletigers?
Correct answer:
To ensure the system aligns with operational requirements and user needs.
, Not Selected
, Not Selected
, Not Selected
Feedback
General Feedback
Answer: To ensure the system aligns with operational requirements and user needs.
Explanation: User involvement ensures that the system is designed to meet specific operational
needs, fostering a more effective developme