Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views3 pages

Audit in CIS Answer Key (Chatgpt)

The document contains a series of multiple-choice questions and answers related to computer processing, security, auditing techniques, and disaster recovery plans. Key topics include the distinction between manual and computer processing, the importance of segregation of duties, and various disaster recovery strategies. It also addresses auditing methods and controls in computerized environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views3 pages

Audit in CIS Answer Key (Chatgpt)

The document contains a series of multiple-choice questions and answers related to computer processing, security, auditing techniques, and disaster recovery plans. Key topics include the distinction between manual and computer processing, the importance of segregation of duties, and various disaster recovery strategies. It also addresses auditing methods and controls in computerized environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Multiple Choice Questions and Answers

1. 1. Which of the following characteristics distinguishes computer processing from


manual processing?

 a. Computer processing virtually eliminates the occurrence of computational error


normally associated with manual processing

2. 2. What type of computer system is characterized by data that are assembled from more
than one location and records that are updated immediately?

 d. Online, real-time system

3. 3. In a computer-based information system, which of the following duties needs to be


separated?

 d. All of the above duties should be separated

4. 4. All of the following are issues of computer security except

 a. Releasing incorrect data to authorized individuals

5. 5. Which is the most critical segregation of duties in the centralized computer services
function?

 a. Systems development from data processing

6. 6. Systems development is separated from data processing activities because failure to


do so

 b. Allows programmers access to make unauthorized changes to applications during


execution

7. 7. Adequate backups will protect against all of the following except

 b. Unauthorized access

8. 8. Which of the following is not an essential feature of a disaster recovery plan?

 b. Computer services function

9. 9. An auditor anticipates assessing control risk at a low level in a computerized


environment. Under these circumstances, on which of the following activities would the
auditor initially focus?

 d. General control activities


10. 10. An auditor would most likely be concerned with which of the following controls in a
distributed data processing system?

 c. Access controls

11. 11. Auditing by testing the input and output of a computer system instead of the
computer program itself will

 a. Not detect program errors which do not show up in the output sampled

12. 12. Which of the following computer-assisted auditing techniques processes client input
data on a controlled program under the auditor’s control to test controls in the
computer system?

 a. Test data

13. 13. To obtain evidence that online access controls are properly functioning, an auditor
most likely would

 c. Enter invalid identification numbers or passwords to ascertain whether the system


rejects them

14. 14. An auditor most likely would introduce test data into a computerized payroll system
to test controls related to the

 c. Discovery of invalid employee I.D. numbers

15. 15. When an auditor tests a computerized accounting system, which of the following is
true of the test data approach?

 b. Test data are processed by the client’s computer programs under the auditor’s
control

16. 16. Which of the following is not among the errors that an auditor might include in the
test data when auditing a client’s computer system?

 b. Authorized code

17. 17. Which of the following computer-assisted auditing techniques allows fictitious and
real transactions to be processed together without client operating personnel being
aware of the testing process?

 a. Integrated test facility

18. 18. To avoid invalid data input, a bank added an extra number at the end of each
account number and subjected the new number to an algorithm. This technique is
known as

 b. A check digit
19. 19. An entity has the following invoices in a batch... Which of the following most likely
represents a hash total?

 d. 410

20. 20. A client is concerned that a power outage or disaster could impair the computer
hardware’s ability to function as designed. The client desires off-site back-up hardware
facilities that are fully configured and are ready to operate within several hours. The
client most likely should consider

 d. Hot site

21. 21. A cold site backup approach is also known as

 c. Empty shell

22. 22. An advantage of a recovery operations center is that

 b. The initial recovery period is very quick

23. 23. For most companies, which of the following is the least critical application for
disaster recovery purposes?

 a. Month-end adjustments

24. 24. Which of the following is not true?

 a. When management outsources their organization’s IT functions, they also outsource


responsibility for internal control

25. 25. A disadvantage of distributed data processing is

 b. The potential for hardware and software incompatibility among users

26. 26. Which of the following disaster recovery techniques may be least optimal in the case
of a disaster?

 a. Empty shell

27. 27. Which of the following disaster recovery techniques has the least risk associated
with it?

 c. Internally provided backup

You might also like