Deck 15: IT Controls Part I: Sarbanes-Oxley and It Governance

Full screen (f)
exit full mode
Question
INTERNAL CONTROL
Gustave, CPA, during its preliminary review of the financial statements of Comet, Inc., found a lack of proper segregation of duties between the programming and operating functions. Comet owns its own computing facilities. Gustave diligently intensified the internal control study and assessment tasks relating to the computer facilities. Gustave concluded in its final report that sufficient compensating general controls provided reasonable assurance that the internal control objectives were being met.
Required
What compensating controls are most likely in place?
Use Space or
up arrow
down arrow
to flip the card.
Question
PHYSICAL SECURITY OF DATA CENTER
Big Apple Financials, Inc., is a financial services firm located in New York City. The company keeps client investment and account information on a server at its Brooklyn data center. This information includes the total value of the portfolio, type of investments made, the income structure of each client, and associated tax liabilities. The company has recently upgraded its Web site to allow clients to access their investment information.
The company's data center is in the basement of a rented building. Company management believes that the location is secure enough to protect their data from physical threats. The servers are housed in a room that has smoke detectors and associated sprinklers. It is enclosed, with no windows, and has temperature-controlled air conditioning. The company's auditors, however, have expressed concern that some of the measures at the current location are inadequate and that newer alternatives should be explored. Management has expressed counter concerns about the high cost of purchasing new equipment and relocating its data center.
Required
a. Why are Big Apple's auditors stressing the need to have a better physical environment for the server?
b. Describe six control features that contribute to the physical security of the computer center.
c. Big Apple management is concerned about the cost of relocating the data center. Discuss some options open to them that could reduce their operating costs and provide the security the auditors seek.
Question
Discuss the differences between the attest function and assurance services.
Question
What is fault tolerance?
Question
Explain the concept of materiality.
Question
Distinguish between inherent risk and control risk. How do internal controls affect inherent risk and control risk, if at all? What is the role of detection risk?
Question
At which stage of the general accounting model is it easiest to commit computer fraud?
Question
DISTRIBUTED DATA PROCESSING
Explain why an organization would choose to install a distributed instead of a centralized computer system.
Question
Explain the outsourcing risk of failure to perform.
Question
What tasks do auditors perform during audit planning, and what techniques are used?
Question
Discuss the key features of Section 302 of SOX.
Question
Prior to SOX, external auditors were required to be familiar with the client organization's internal controls, but not to test them. Explain why.
Question
Explain at least three forms of computer fraud.
Question
Differentiate between general and application controls. Give two examples of each.
Question
What is RAID?
Question
Distinguish between tests of controls and substantive testing.
Question
Which of the following is NOT a task performed in the audit planning phase?

A) Reviewing an organization's policies and practices
B) Planning substantive testing procedures
C) Reviewing general controls
D) Determining the degree of reliance on controls
Question
Which of the following disaster recovery techniques may be least optimal in the case of a widespread natural disaster?

A) Empty shell
B) Internally provided backup
C) ROC
D) They are all equally beneficial
Question
Which of the following is associated with the unique characteristics of an industry?

A) Inherent risk
B) Detection risk
C) Control risk
D) None of the above
Question
Define the management assertions of existence or occurrence, completeness, rights and obligations, valuation or allocation, and presentation and disclosure.
Question
Explain vendor exploitation.
Question
What is audit risk?
Question
SERVICE PROVIDER AUDIT
The Harvey Manufacturing Company is undergoing its annual financial statement audit. Last year the company purchased an SaaS application from Excel Systems (a cloud service provider) to run mission critical financial transactions. The SaaS application runs on an IaaS server, which Excel Systems outsourced to another service provider.
Required
Explain how the Harvey Manufacturing auditors will assess the relevant internal controls related to these mission critical transactions.
Question
DISASTER RECOVERY PLANNING CONTROVERSY
The relevance of a disaster recovery plan (DRP) to a financial statement audit is a matter of debate. Some argue that the existence of a DRP is irrelevant to the audit. Others argue that it is an important control that needs to be considered in the assessment of internal control.
Required
Address both sides of this debate.
a. Provide a logical argument why a DRP should not be considered in the audit.
b. Argue why a DRP is an important control and should be reviewed within the conduct of a financial audit.
Question
DISASTER RECOVERY PLAN
Hexagon is an online retailer of exotic foods including spices from around the world, canned sauces, and prepackaged breads such as tortillas and naan. The company does 100% of its business over the Internet to consumers and through private networks with retail trading partners. Recently, Hexagon moved its sales and business headquarters functions into a warehouse on the outskirts of San Francisco. Prior to the move, the company engaged the services of an architect to redesign the facility to be modern yet in keeping with the original character of the building. While remodeling the warehouse, the architects retained the wooden-shingled exterior and the exposed wooden beams throughout the interior. The data processing center, which contained the servers and networked terminals were situated in a large open area with high ceilings and skylights. The center was made accessible to the rest of the staff to be consistent with the firm's philosophy of removing barriers and encouraging a team approach to problem solving. Before occupying the new facility, city inspectors declared the building to be compliant with all relevant building codes.
In a recent compliance audit, Hexagon's auditors advised the company's management to develop a disaster recovery plan. Toward this end, the company entered into a mutual aid agreement with several other firms in the area that had similar technology systems. These firms all agreed verbally to provide emergency assistance to each other in the event of disasters or emergencies. In addition, Hexagon implemented a data backup system in which all files are copied daily to tapes and disks and each week the backup storage devices are taken to an offsite facility where they are secured.
The operator's manual with instructions on how to restore the system is stored in the main data processing area along with a list of names and phone numbers of key IT professionals to contact in case of an emergency.
Required
a. Describe the internal control weaknesses present at Hexagon.
b. List the components that should be included in a disaster recovery plan for a company like Hexagon.
c. What factors, other than those included in the plan itself, should a company consider when formulating a disaster recovery plan?
Question
What are the primary reasons for separating operational tasks?
Question
What is the purpose of an audit?
Question
Distinguish between errors and irregularities. Which do you think concerns auditors the most?
Question
SOX contains many sections. Which sections are the focus of this chapter?
Question
What is the relationship between tests of controls and substantive tests?
Question
How do automated authorization procedures differ from manual authorization procedures?
Question
An organization's internal audit department is usually considered an effective control mechanism for evaluating the organization's internal control structure. Birch Company's internal auditing function reports directly to the controller. Comment on the effectiveness of this organizational structure.
Question
Explain why reduced security is an outsourcing risk.
Question
List the four general control areas.
Question
Discuss the key features of Section 404 of SOX.
Question
Does a qualified opinion on internal controls over the financial reporting system necessitate a qualified opinion on the financial statements? Explain why or why not.
Question
A bank in California has 13 branches spread throughout northern California, each with its own minicomputer where its data are stored. Another bank has 10 branches spread throughout California, with the data being stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster?
Question
What problems may occur as a result of combining applications programming and maintenance tasks into one position?
Question
Discuss the concept of independence within the context of an audit.
Question
What types of documents would an auditor review in testing organizational structure controls? Why is it also important to observe actual behavior?
Question
2 Which of the following is the best example of an application control objective?

A) Ensure that the computer operating system functions efficiently.
B) Provide backup facilities in the event of a disaster.
C) Prevent unauthorized access to corporate databases.
D) Ensure the validity, completeness, and accuracy of sales transactions.
Question
Which of the following is NOT a potential threat to computer hardware and peripherals?

A) Low humidity
B) High humidity
C) Carbon dioxide fire extinguishers
D) Water sprinkler fire extinguishers
Question
Which of the following is not true about the SSAE 16 report?

A) It is a third-party attestation report.
B) It replaced Statement on Auditing Standards No. 70 (SAS 70).
C) The service provider prepares a separate SSAE 16 report tailored to the needs of each of its client firms, which the client auditors rely upon.
D) When using the carve-out method, service provider management would exclude the subservice organization's relevant controls.
E) All of the above are true.
Question
Discuss why any distinction between IT auditing and financial auditing is not meaningful.
Question
Explain how IT outsourcing can lead to loss of strategic advantage.
Question
What are some tests of physical security controls?
Question
INTERNAL CONTROL
During the past year, Howard Industries has experienced excessive employee turnover in their IT function. Exit interviews with employees revealed that they were dissatisfied with the working environment. Howard employed the services of a management consulting firm that had expertise in employee relationship management. The consulting firm made recommendation to restructure IT operations to create a greater sense of "ownership" among the IT staff. After three months, under the new operation a survey indicated a marked increase in the level of job satisfaction among the IT group.
During the conduct of the audit planning phase of the annual financial audit, the auditor observed the following practices: Individual IT professionals are assigned exclusively to support specific business functions such as sales processing, billing, customer account maintenance, etc. Each professional provides a range of IT services for their respective users including computer operations, program changes, and documenting the system through record layouts, system flowcharts, and program listings. They also reconcile computer output reports and logs of transactions errors.
Required
a. Identify and explain any control concerns you have with the new operations.
b. What potential computer fraud might this operational approach permit?
Question
SEPARATION OF DUTIES
Transferring people from job to job within the organization is the philosophy at Arcadia Plastics. Management believes that job rotation deters employees from feeling that they are stagnating in their jobs and promotes a better understanding of the company. The computer services personnel typically work for six months as an operator, one year as a systems developer, six months as a database administrator, and one year in systems maintenance. At that point, they are assigned to a permanent position.
Required
Discuss the importance of separation of duties within the information systems department. How can Arcadia Plastics have both job rotation and well-separated duties?
Question
INTERNAL CONTROL AND DISTRIBUTED SYSTEM
Until a year ago, Dagwood Printing Company had always operated in a centralized computer environment. Now, 75 percent of the office employees have a PC. Users have been able to choose their own software packages, and no documentation of end user- developed applications has been required. Next month, each PC will be linked into a local area network and to the company's mainframe.
Required
a. Outline a plan of action for Dagwood Printing Company to ensure that the proper controls over hardware, software, data, people, procedures, and documentation are in place.
b. Discuss any risks the company may face if the devised plan is not implemented.
Question
Why is poor-quality systems documentation a prevalent problem?
Question
What is the meaning of the term attest service?
Question
What are the often-cited benefits of IT outsourcing?
Question
Define audit risk.
Question
Define general controls.
Question
Explain why certain duties that are deemed incompatible in a manual system may be combined in a computer-based information system environment. Give an example.
Question
Discuss how the process of obtaining audit evidence in a IT environment is inherently different from obtaining it in a manual system.
Question
Explain the role of Statement on Standards for Attestation Engagements No. 16 (SSAE 16) report in the review of internal controls.
Question
Define commodity IT asset.
Question
404 requires management to make a statement identifying the control framework used to conduct the assessment of internal controls. Discuss the options in selecting a control framework.
Question
The PCAOB Standard No. 5 specifically requires auditors to understand transaction flows in designing their tests of controls. What steps does this entail?
Question
Compare and contrast the following disaster recovery options: empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as from most costly to least costly.
Question
What is the role of a corporate computer services department? How does this differ from other configurations?
Question
What are assurance services?
Question
Define specific asset.
Question
Which of the following statements is true?

A) Both the SEC and the PCAOB require the use of the COSO framework.
B) Any framework can be used that encompasses all of COSO's general themes.
C) The SEC recommends COBIT and the PCAOB recommends COSO.
D) Both the SEC and the PCAOB require the COBIT framework.
E) None of the above are true.
Question
Which of the following is NOT requirement of Section 302 of SOX?

A) Corporate management (including the CEO) must certify monthly and annually their organization's internal controls over financial reporting.
B) Auditors must interview management regarding significant changes in the design or operation of internal control that occurred since the last audit.
C) Auditors must determine whether changes in internal control have materially affected, or are likely to materially affect, internal control over financial reporting.
D) Management must disclose any material changes in the company's internal controls that have occurred during the most recent fiscal quarter.
E) All of the above are requirements.
Question
INTERNAL CONTROL RESPONSIBILITY FOR OUTSOURCED IT
Explain why managers who outsource their IT function may or may not also outsource responsibility for IT controls. What options are open to auditors regarding expressing an opinion on the adequacy of internal controls?
Question
Some internal controls can be tested objectively. Discuss some internal controls that you think are relatively more subjective to assess in terms of adequacy than others.
Question
How do SSAE 16 Type 1 and Type 2 differ?
Question
List five risks associated with IT outsourcing.
Question
DISTRIBUTED PROCESSING SYSTEM
The internal audit department of a manufacturing company conducted a routine examination of the company's distributed computer facilities. The auditor's report was critical of the lack of coordination in the purchase of PC systems and software that individual departments use. Several different hardware platforms, operating systems, spreadsheet packages, database systems, and networking applications were in use. In response to the internal audit report, and without consulting with department users regarding their current and future systems needs, Mr. Marten, the vice president of Information Services, issued a memorandum to all employees stating the following new policies:
1. The Micromanager Spreadsheet package has been selected to be the standard for the company, and all employees must switch to it within the month.
2. All future PC purchases must be Megasoft compatible.
3. All departments must convert to the Megasoft Entree database package.
4. The office of the vice president of Information Services must approve all new hardware and software purchases.
Several managers of other operating departments have complained about Marten's memorandum.
Required
a. Regarding setting systems standards in a distributed processing environment, discuss factors pertinent to:
1. Computer hardware and software considerations
2. Controls considerations
b. Discuss the benefits of having standardized hardware and software distributed across departments in the firm.
c. Discuss the concerns that the memorandum is likely to create for distributed users in the company.
Question
DISASTER RECOVERY SERVICE PROVIDERS
Visit SunGard's website, http://www.sungard.com, and research its recovery services offered for the following classes: High Availability, System Recovery, and End-User Recovery. Write a report of your findings.
Question
What are the three primary IT functions that must be separated?
Question
What are the five control implications of distributed data processing?
Question
What are the conceptual phases of an audit? How do they differ between general auditing and IT auditing?
Question
Distinguish between errors and irregularities.
Question
What is computer fraud, and what types of activities does it include?
Question
Who should determine and prioritize the critical applications? How is this done? How frequently is it done?
Question
Give a specific example, other than the one in the chapter, to illustrate the relationship between risk, control, audit objective, and tests of control.
Question
How are the carve-out and inclusive methods of reporting on subservice organizations different?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/90
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: IT Controls Part I: Sarbanes-Oxley and It Governance
1
INTERNAL CONTROL
Gustave, CPA, during its preliminary review of the financial statements of Comet, Inc., found a lack of proper segregation of duties between the programming and operating functions. Comet owns its own computing facilities. Gustave diligently intensified the internal control study and assessment tasks relating to the computer facilities. Gustave concluded in its final report that sufficient compensating general controls provided reasonable assurance that the internal control objectives were being met.
Required
What compensating controls are most likely in place?
Internal Controls:
• Internal controls are generally divided into two types of controls: application and general.
• Application controls deal with the completeness, accuracy and validity of financial transactions.
• General controls are related to the entire system. They include controls on IT governance, IT infrastructure, security of network and operating system, access on database, acquisition and development of applications and changes in program.
Following compensating general controls are most likely in place:
• Adequate documentation must be there.
• IT infrastructure deals with the physical security of the computer center that is the systems of room temperature, fire extinguishers and fault tolerance control must be there.
• There should be security provisions for networks and operating system. There must be policies for computer security.
• Database access must be limited and by authorized personnel only.
• Verification of user rights and access privileges must be done.
2
PHYSICAL SECURITY OF DATA CENTER
Big Apple Financials, Inc., is a financial services firm located in New York City. The company keeps client investment and account information on a server at its Brooklyn data center. This information includes the total value of the portfolio, type of investments made, the income structure of each client, and associated tax liabilities. The company has recently upgraded its Web site to allow clients to access their investment information.
The company's data center is in the basement of a rented building. Company management believes that the location is secure enough to protect their data from physical threats. The servers are housed in a room that has smoke detectors and associated sprinklers. It is enclosed, with no windows, and has temperature-controlled air conditioning. The company's auditors, however, have expressed concern that some of the measures at the current location are inadequate and that newer alternatives should be explored. Management has expressed counter concerns about the high cost of purchasing new equipment and relocating its data center.
Required
a. Why are Big Apple's auditors stressing the need to have a better physical environment for the server?
b. Describe six control features that contribute to the physical security of the computer center.
c. Big Apple management is concerned about the cost of relocating the data center. Discuss some options open to them that could reduce their operating costs and provide the security the auditors seek.
Physical Security:
The physical security of data center is very necessary because the client's data is very critical element for any business and to be secured. If it was leaked, the trust of the clients is lost and business suffers the problem of declination.
• Physical security concerns with the location of and equipment for security at the data center.
• AV Financials set up its data server at the place where the production plan was running and it allowed the free access also.
(a) Need of having a better physical environment for server:
Although the center is working on the specialized temperature secured from physical intruders and has detectors for smoking and sprinkles. There is need of better environment for the server because of following reasons:
• Access must be limited to the server operators and the employees, presently working there. Even, the analysts and the maintenance programmers, sometimes for detecting and correcting errors, must be allowed access by signing in and out. The record of outsiders' access must be maintained.
• Hidden cameras and the video recording system must be there.
• Any specialized type of fault tolerance controls. RAID (Redundant Array of Independent disks) or uninterrupted power supply backup must be installed.
AV has proper software controls there but it is not enough for securing the information because if the outsiders get the access anytime on that then they can change or damage the information.
(b) Six control features that contribute to the physical security:
The important control features which are responsible for contributing computer server environment are described below:
• Physical construction: The auditor must test the architectural overview and controls set for the physical security of the server room.
• Fire Detection System and Room Temperature: The auditor must test the controls set for detecting any type of sprinkles and specified room temperature because if any of the both is not there then the server could fail or corrupt anytime.
• Access Controls: outsiders must not be allowed for accessing the server without special grants.
(c) Some options that are open to B A Management that reduces their operating costs and provide security:
(1) Any specialized type of fault tolerance controls. RAID or uninterrupted power supply backup, must be installed.
(2) Controls over electronic information security through anti-viruses or other specialized programs.
(3) Controls on operator documentation that is run manual.
3
Discuss the differences between the attest function and assurance services.
Attest Functions and Assurance Services
The primary differences between attest function and assurance services are described below:
Attest Functions and Assurance Services The primary differences between attest function and assurance services are described below:
4
What is fault tolerance?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
5
Explain the concept of materiality.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
6
Distinguish between inherent risk and control risk. How do internal controls affect inherent risk and control risk, if at all? What is the role of detection risk?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
7
At which stage of the general accounting model is it easiest to commit computer fraud?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
8
DISTRIBUTED DATA PROCESSING
Explain why an organization would choose to install a distributed instead of a centralized computer system.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
9
Explain the outsourcing risk of failure to perform.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
10
What tasks do auditors perform during audit planning, and what techniques are used?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
11
Discuss the key features of Section 302 of SOX.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
12
Prior to SOX, external auditors were required to be familiar with the client organization's internal controls, but not to test them. Explain why.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
13
Explain at least three forms of computer fraud.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
14
Differentiate between general and application controls. Give two examples of each.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
15
What is RAID?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
16
Distinguish between tests of controls and substantive testing.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a task performed in the audit planning phase?

A) Reviewing an organization's policies and practices
B) Planning substantive testing procedures
C) Reviewing general controls
D) Determining the degree of reliance on controls
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following disaster recovery techniques may be least optimal in the case of a widespread natural disaster?

A) Empty shell
B) Internally provided backup
C) ROC
D) They are all equally beneficial
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is associated with the unique characteristics of an industry?

A) Inherent risk
B) Detection risk
C) Control risk
D) None of the above
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
20
Define the management assertions of existence or occurrence, completeness, rights and obligations, valuation or allocation, and presentation and disclosure.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
21
Explain vendor exploitation.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
22
What is audit risk?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
23
SERVICE PROVIDER AUDIT
The Harvey Manufacturing Company is undergoing its annual financial statement audit. Last year the company purchased an SaaS application from Excel Systems (a cloud service provider) to run mission critical financial transactions. The SaaS application runs on an IaaS server, which Excel Systems outsourced to another service provider.
Required
Explain how the Harvey Manufacturing auditors will assess the relevant internal controls related to these mission critical transactions.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
24
DISASTER RECOVERY PLANNING CONTROVERSY
The relevance of a disaster recovery plan (DRP) to a financial statement audit is a matter of debate. Some argue that the existence of a DRP is irrelevant to the audit. Others argue that it is an important control that needs to be considered in the assessment of internal control.
Required
Address both sides of this debate.
a. Provide a logical argument why a DRP should not be considered in the audit.
b. Argue why a DRP is an important control and should be reviewed within the conduct of a financial audit.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
25
DISASTER RECOVERY PLAN
Hexagon is an online retailer of exotic foods including spices from around the world, canned sauces, and prepackaged breads such as tortillas and naan. The company does 100% of its business over the Internet to consumers and through private networks with retail trading partners. Recently, Hexagon moved its sales and business headquarters functions into a warehouse on the outskirts of San Francisco. Prior to the move, the company engaged the services of an architect to redesign the facility to be modern yet in keeping with the original character of the building. While remodeling the warehouse, the architects retained the wooden-shingled exterior and the exposed wooden beams throughout the interior. The data processing center, which contained the servers and networked terminals were situated in a large open area with high ceilings and skylights. The center was made accessible to the rest of the staff to be consistent with the firm's philosophy of removing barriers and encouraging a team approach to problem solving. Before occupying the new facility, city inspectors declared the building to be compliant with all relevant building codes.
In a recent compliance audit, Hexagon's auditors advised the company's management to develop a disaster recovery plan. Toward this end, the company entered into a mutual aid agreement with several other firms in the area that had similar technology systems. These firms all agreed verbally to provide emergency assistance to each other in the event of disasters or emergencies. In addition, Hexagon implemented a data backup system in which all files are copied daily to tapes and disks and each week the backup storage devices are taken to an offsite facility where they are secured.
The operator's manual with instructions on how to restore the system is stored in the main data processing area along with a list of names and phone numbers of key IT professionals to contact in case of an emergency.
Required
a. Describe the internal control weaknesses present at Hexagon.
b. List the components that should be included in a disaster recovery plan for a company like Hexagon.
c. What factors, other than those included in the plan itself, should a company consider when formulating a disaster recovery plan?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
26
What are the primary reasons for separating operational tasks?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
27
What is the purpose of an audit?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
28
Distinguish between errors and irregularities. Which do you think concerns auditors the most?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
29
SOX contains many sections. Which sections are the focus of this chapter?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
30
What is the relationship between tests of controls and substantive tests?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
31
How do automated authorization procedures differ from manual authorization procedures?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
32
An organization's internal audit department is usually considered an effective control mechanism for evaluating the organization's internal control structure. Birch Company's internal auditing function reports directly to the controller. Comment on the effectiveness of this organizational structure.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
33
Explain why reduced security is an outsourcing risk.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
34
List the four general control areas.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
35
Discuss the key features of Section 404 of SOX.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
36
Does a qualified opinion on internal controls over the financial reporting system necessitate a qualified opinion on the financial statements? Explain why or why not.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
37
A bank in California has 13 branches spread throughout northern California, each with its own minicomputer where its data are stored. Another bank has 10 branches spread throughout California, with the data being stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
38
What problems may occur as a result of combining applications programming and maintenance tasks into one position?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
39
Discuss the concept of independence within the context of an audit.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
40
What types of documents would an auditor review in testing organizational structure controls? Why is it also important to observe actual behavior?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
41
2 Which of the following is the best example of an application control objective?

A) Ensure that the computer operating system functions efficiently.
B) Provide backup facilities in the event of a disaster.
C) Prevent unauthorized access to corporate databases.
D) Ensure the validity, completeness, and accuracy of sales transactions.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is NOT a potential threat to computer hardware and peripherals?

A) Low humidity
B) High humidity
C) Carbon dioxide fire extinguishers
D) Water sprinkler fire extinguishers
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is not true about the SSAE 16 report?

A) It is a third-party attestation report.
B) It replaced Statement on Auditing Standards No. 70 (SAS 70).
C) The service provider prepares a separate SSAE 16 report tailored to the needs of each of its client firms, which the client auditors rely upon.
D) When using the carve-out method, service provider management would exclude the subservice organization's relevant controls.
E) All of the above are true.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss why any distinction between IT auditing and financial auditing is not meaningful.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
45
Explain how IT outsourcing can lead to loss of strategic advantage.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
46
What are some tests of physical security controls?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
47
INTERNAL CONTROL
During the past year, Howard Industries has experienced excessive employee turnover in their IT function. Exit interviews with employees revealed that they were dissatisfied with the working environment. Howard employed the services of a management consulting firm that had expertise in employee relationship management. The consulting firm made recommendation to restructure IT operations to create a greater sense of "ownership" among the IT staff. After three months, under the new operation a survey indicated a marked increase in the level of job satisfaction among the IT group.
During the conduct of the audit planning phase of the annual financial audit, the auditor observed the following practices: Individual IT professionals are assigned exclusively to support specific business functions such as sales processing, billing, customer account maintenance, etc. Each professional provides a range of IT services for their respective users including computer operations, program changes, and documenting the system through record layouts, system flowcharts, and program listings. They also reconcile computer output reports and logs of transactions errors.
Required
a. Identify and explain any control concerns you have with the new operations.
b. What potential computer fraud might this operational approach permit?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
48
SEPARATION OF DUTIES
Transferring people from job to job within the organization is the philosophy at Arcadia Plastics. Management believes that job rotation deters employees from feeling that they are stagnating in their jobs and promotes a better understanding of the company. The computer services personnel typically work for six months as an operator, one year as a systems developer, six months as a database administrator, and one year in systems maintenance. At that point, they are assigned to a permanent position.
Required
Discuss the importance of separation of duties within the information systems department. How can Arcadia Plastics have both job rotation and well-separated duties?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
49
INTERNAL CONTROL AND DISTRIBUTED SYSTEM
Until a year ago, Dagwood Printing Company had always operated in a centralized computer environment. Now, 75 percent of the office employees have a PC. Users have been able to choose their own software packages, and no documentation of end user- developed applications has been required. Next month, each PC will be linked into a local area network and to the company's mainframe.
Required
a. Outline a plan of action for Dagwood Printing Company to ensure that the proper controls over hardware, software, data, people, procedures, and documentation are in place.
b. Discuss any risks the company may face if the devised plan is not implemented.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
50
Why is poor-quality systems documentation a prevalent problem?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
51
What is the meaning of the term attest service?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
52
What are the often-cited benefits of IT outsourcing?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
53
Define audit risk.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
54
Define general controls.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
55
Explain why certain duties that are deemed incompatible in a manual system may be combined in a computer-based information system environment. Give an example.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
56
Discuss how the process of obtaining audit evidence in a IT environment is inherently different from obtaining it in a manual system.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
57
Explain the role of Statement on Standards for Attestation Engagements No. 16 (SSAE 16) report in the review of internal controls.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
58
Define commodity IT asset.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
59
404 requires management to make a statement identifying the control framework used to conduct the assessment of internal controls. Discuss the options in selecting a control framework.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
60
The PCAOB Standard No. 5 specifically requires auditors to understand transaction flows in designing their tests of controls. What steps does this entail?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
61
Compare and contrast the following disaster recovery options: empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as from most costly to least costly.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
62
What is the role of a corporate computer services department? How does this differ from other configurations?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
63
What are assurance services?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
64
Define specific asset.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following statements is true?

A) Both the SEC and the PCAOB require the use of the COSO framework.
B) Any framework can be used that encompasses all of COSO's general themes.
C) The SEC recommends COBIT and the PCAOB recommends COSO.
D) Both the SEC and the PCAOB require the COBIT framework.
E) None of the above are true.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following is NOT requirement of Section 302 of SOX?

A) Corporate management (including the CEO) must certify monthly and annually their organization's internal controls over financial reporting.
B) Auditors must interview management regarding significant changes in the design or operation of internal control that occurred since the last audit.
C) Auditors must determine whether changes in internal control have materially affected, or are likely to materially affect, internal control over financial reporting.
D) Management must disclose any material changes in the company's internal controls that have occurred during the most recent fiscal quarter.
E) All of the above are requirements.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
67
INTERNAL CONTROL RESPONSIBILITY FOR OUTSOURCED IT
Explain why managers who outsource their IT function may or may not also outsource responsibility for IT controls. What options are open to auditors regarding expressing an opinion on the adequacy of internal controls?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
68
Some internal controls can be tested objectively. Discuss some internal controls that you think are relatively more subjective to assess in terms of adequacy than others.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
69
How do SSAE 16 Type 1 and Type 2 differ?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
70
List five risks associated with IT outsourcing.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
71
DISTRIBUTED PROCESSING SYSTEM
The internal audit department of a manufacturing company conducted a routine examination of the company's distributed computer facilities. The auditor's report was critical of the lack of coordination in the purchase of PC systems and software that individual departments use. Several different hardware platforms, operating systems, spreadsheet packages, database systems, and networking applications were in use. In response to the internal audit report, and without consulting with department users regarding their current and future systems needs, Mr. Marten, the vice president of Information Services, issued a memorandum to all employees stating the following new policies:
1. The Micromanager Spreadsheet package has been selected to be the standard for the company, and all employees must switch to it within the month.
2. All future PC purchases must be Megasoft compatible.
3. All departments must convert to the Megasoft Entree database package.
4. The office of the vice president of Information Services must approve all new hardware and software purchases.
Several managers of other operating departments have complained about Marten's memorandum.
Required
a. Regarding setting systems standards in a distributed processing environment, discuss factors pertinent to:
1. Computer hardware and software considerations
2. Controls considerations
b. Discuss the benefits of having standardized hardware and software distributed across departments in the firm.
c. Discuss the concerns that the memorandum is likely to create for distributed users in the company.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
72
DISASTER RECOVERY SERVICE PROVIDERS
Visit SunGard's website, http://www.sungard.com, and research its recovery services offered for the following classes: High Availability, System Recovery, and End-User Recovery. Write a report of your findings.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
73
What are the three primary IT functions that must be separated?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
74
What are the five control implications of distributed data processing?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
75
What are the conceptual phases of an audit? How do they differ between general auditing and IT auditing?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
76
Distinguish between errors and irregularities.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
77
What is computer fraud, and what types of activities does it include?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
78
Who should determine and prioritize the critical applications? How is this done? How frequently is it done?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
79
Give a specific example, other than the one in the chapter, to illustrate the relationship between risk, control, audit objective, and tests of control.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
80
How are the carve-out and inclusive methods of reporting on subservice organizations different?
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 90 flashcards in this deck.