Deck 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls

Full screen (f)
exit full mode
Question
Tracing is a method used to verify the logical operations executed by a computer application.
Use Space or
up arrow
down arrow
to flip the card.
Question
The presence of a SPLMS effectively guarantees program integrity.
Question
One of the auditor's objectives relating to systems development is to authorize development projects.
Question
To verify the module's internal logic, the programmer compares the actual results obtained from the test with the predetermined results.
Question
Meaningful test data is relatively easy to create.
Question
The base case system evaluation is a variation of the test data method.
Question
The technical design activities translate a set of detailed technical specifications for a system into user specifications.
Question
The longest period in the SDLC is the maintenance phase.
Question
The user test and acceptance procedure is the last point at which the user can determine the system's acceptability prior to it going into service.
Question
Maintenance access to systems increases the risk that logic will be corrupted either by the accident or intent to defraud.
Question
A salami fraud affects a large number of victims, but the harm to each appears to be very small.
Question
All program modules must be thoroughly tested before they are implemented.
Question
Users need to be activity involved in the systems development process.
Question
When using the test data method, the presence of multiple error messages indicates a flaw in the preparation of test transactions.
Question
The black box approach to testing computer applications allows the auditor to explicitly review program logic.
Question
Source program library controls should prevent and detect unauthorized access to application programs.
Question
The black box approach to testing computer program controls is also known as auditing around the computer.
Question
Programs in their compiled state are very susceptible to the threat of unauthorized modification.
Question
To support future audit needs, test data prepared during systems implementation should be preserved.
Question
All systems should be informally approved to ensure economic justification and feasibility.
Question
Generalized audit software packages are used to assist the auditor in performing substantive tests.
Question
Which control ensures that production files cannot be accessed without specific permission?

A) Database Management System
B) Recovery Operations Function
C) Source Program Library Management System
D) Computer Services Function
Question
Which test is not an example of a white box test?

A) determining the fair value of inventory
B) ensuring that passwords are valid
C) verifying that all pay rates are within a specified range
D) reconciling control totals
Question
When analyzing the results of the test data method, the auditor would spend the least amount of time reviewing

A) the test transactions
B) error reports
C) updated master files
D) output reports
Question
Firms with an independent internal audit staff may conduct tests of the system development life cycle on an ongoing basis.
Question
The results of a parallel simulation are compared to the results of a production run in order to judge the quality of the application processes and controls.
Question
Routine maintenance activities require all of the following controls except

A) documentation updates
B) testing
C) formal authorization
D) internal audit approval
Question
Which test of controls will provide evidence that the system as originally implemented was free from material errors and free from fraud? Review of the documentation indicates that

A) a cost-benefit analysis was conducted
B) the detailed design was an appropriate solution to the user's problem
C) tests were conducted at the individual module and total system levels prior to implementation
D) problems detected during the conversion period were corrected in the maintenance phase
Question
Which statement is correct?

A) compiled programs are very susceptible to unauthorized modification
B) the source program library stores application programs in source code form
C) modifications are made to programs in machine code language
D) the source program library management system increases operating efficiency
Question
The programmer's authority table will specify the libraries a programmer may access.
Question
All of the following concepts are associated with the black box approach to auditing computer applications except

A) the application need not be removed from service and tested directly
B) auditors do not rely on a detailed knowledge of the application's internal logic
C) the auditor reconciles previously produced output results with production input transactions
D) this approach is used for complex transactions that receive input from many sources
Question
Which of the following statements is NOT true?

A) All systems should be properly authorized to ensure their economic justification and feasibility.
B) Users need not be actively involved in the systems development process.
C) All program modules must be thoroughly tested before they are implemented.
D) The task of creating meaningful test data is time-consuming.
Question
When auditors do not rely on a detailed knowledge of the application's internal logic, they are performing

A) black box tests of program controls
B) white box tests of program controls
C) substantive testing
D) intuitive testing
Question
To meet the governance-related expectations of management under SOX, an organization's internal audit department needs to be

A) independent
B) objective
C) technically qualified
D) All of the above are true.
Question
Which control is not a part of the source program library management system?

A) using passwords to limit access to application programs
B) assigning a test name to all programs undergoing maintenance
C) combining access to the development and maintenance test libraries
D) assigning version numbers to programs to record program modifications
Question
Use of the integrated test facility poses no threat to organizational data files.
Question
When the auditor reconciles the program version numbers, which audit objective is being tested?

A) protect applications from unauthorized changes
B) ensure applications are free from error
C) protect production libraries from unauthorized access
D) ensure incompatible functions have been identified and segregated
Question
Which control is not associated with new systems development activities?

A) reconciling program version numbers
B) program testing
C) user involvement
D) internal audit participation
Question
Program testing

A) involves individual modules only, not the full system
B) requires creation of meaningful test data
C) need not be repeated once the system is implemented
D) is primarily concerned with usability
Question
Which statement is not true?

A) An audit objective for systems maintenance is to detect unauthorized access to application databases.
B) An audit objective for systems maintenance is to ensure that applications are free from errors.
C) An audit objective for systems maintenance is to verify that user requests for maintenance reconcile to program version numbers.
D) An audit objective for systems maintenance is to ensure that the production libraries are protected from unauthorized access.
Question
New system development activity controls must focus on the authorization, development, and implementation of new systems and its maintenance. Discuss at least five control activities that are found in an effective system development life cycle.
Question
Describe a test of controls that would provide evidence that only authorized program maintenance is occurring.
Question
Which statement is not true? Embedded audit modules

A) can be turned on and off by the auditor.
B) reduce operating efficiency.
C) may lose their viability in an environment where programs are modified frequently.
D) identify transactions to be analyzed using white box tests.
Question
Generalized audit software packages perform all of the following tasks except

A) recalculate data fields
B) compare files and identify differences
C) stratify statistical samples
D) analyze results and form opinions
Question
What is GAS? Identify two examples of GAS products.
Question
All of the following statements are true about the integrated test facility (ITF) except

A) production reports are affected by ITF transactions
B) ITF databases contain "dummy" records integrated with legitimate records
C) ITF permits ongoing application auditing
D) ITF does not disrupt operations or require the intervention of computer services personnel
Question
What are program version numbers and how are the used?
Question
What is ITF?
Question
Auditors do not rely on detailed knowledge of the application's internal logic when they use the __________________________ approach to auditing computer applications.
Question
What is an embedded audit module?
Question
What are the audit's objectives relating to systems development?
Question
Describe two methods used to control the source program library.
Question
Contrast the source program library (SPL) management system to the database management system (DBMS).
Question
What are CAATS? Identify five of them.
Question
All of the following are disadvantages of the test data technique except

A) the test data technique requires extensive computer expertise on the part of the auditor
B) the auditor cannot be sure that the application being tested is a copy of the current application used by computer services personnel
C) the auditor cannot be sure that the application being tested is the same application used throughout the entire year
D) preparation of the test data is time-consuming
Question
All of the following are advantages of the test data technique except

A) auditors need minimal computer expertise to use this method
B) this method causes minimal disruption to the firm's operations
C) the test data is easily compiled
D) the auditor obtains explicit evidence concerning application functions
Question
Describe parallel simulation.
Question
A __________________________ fraud affects a large number of victims but the harm to each appears to be very small.
Question
What is meant by auditing around the computer versus auditing through the computer? Why is this so important?
Question
Identify six controllable activities that distinguish an effective systems development process.
Question
Discuss the three types of controls auditors can perform to determine that programs are free from material errors.
Question
Describe and contrast the test data method with the integrated test facility.
Question
Describe two tests of controls the auditor can use confirm that authorization procedures for program changes.
Question
Outline the six controllable activities that relate to new systems development
Question
Contrast embedded audit modules with generalized audit software.
Question
What is the purpose of the auditor's review of SDLC documentation?
Question
Discuss the six general categories of tests of IT controls.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/67
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls
1
Tracing is a method used to verify the logical operations executed by a computer application.
True
2
The presence of a SPLMS effectively guarantees program integrity.
False
3
One of the auditor's objectives relating to systems development is to authorize development projects.
False
4
To verify the module's internal logic, the programmer compares the actual results obtained from the test with the predetermined results.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
5
Meaningful test data is relatively easy to create.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
6
The base case system evaluation is a variation of the test data method.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
7
The technical design activities translate a set of detailed technical specifications for a system into user specifications.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
8
The longest period in the SDLC is the maintenance phase.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
9
The user test and acceptance procedure is the last point at which the user can determine the system's acceptability prior to it going into service.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
10
Maintenance access to systems increases the risk that logic will be corrupted either by the accident or intent to defraud.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
11
A salami fraud affects a large number of victims, but the harm to each appears to be very small.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
12
All program modules must be thoroughly tested before they are implemented.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
13
Users need to be activity involved in the systems development process.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
14
When using the test data method, the presence of multiple error messages indicates a flaw in the preparation of test transactions.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
15
The black box approach to testing computer applications allows the auditor to explicitly review program logic.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
16
Source program library controls should prevent and detect unauthorized access to application programs.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
17
The black box approach to testing computer program controls is also known as auditing around the computer.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
18
Programs in their compiled state are very susceptible to the threat of unauthorized modification.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
19
To support future audit needs, test data prepared during systems implementation should be preserved.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
20
All systems should be informally approved to ensure economic justification and feasibility.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
21
Generalized audit software packages are used to assist the auditor in performing substantive tests.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
22
Which control ensures that production files cannot be accessed without specific permission?

A) Database Management System
B) Recovery Operations Function
C) Source Program Library Management System
D) Computer Services Function
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
23
Which test is not an example of a white box test?

A) determining the fair value of inventory
B) ensuring that passwords are valid
C) verifying that all pay rates are within a specified range
D) reconciling control totals
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
24
When analyzing the results of the test data method, the auditor would spend the least amount of time reviewing

A) the test transactions
B) error reports
C) updated master files
D) output reports
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
25
Firms with an independent internal audit staff may conduct tests of the system development life cycle on an ongoing basis.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
26
The results of a parallel simulation are compared to the results of a production run in order to judge the quality of the application processes and controls.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
27
Routine maintenance activities require all of the following controls except

A) documentation updates
B) testing
C) formal authorization
D) internal audit approval
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
28
Which test of controls will provide evidence that the system as originally implemented was free from material errors and free from fraud? Review of the documentation indicates that

A) a cost-benefit analysis was conducted
B) the detailed design was an appropriate solution to the user's problem
C) tests were conducted at the individual module and total system levels prior to implementation
D) problems detected during the conversion period were corrected in the maintenance phase
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
29
Which statement is correct?

A) compiled programs are very susceptible to unauthorized modification
B) the source program library stores application programs in source code form
C) modifications are made to programs in machine code language
D) the source program library management system increases operating efficiency
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
30
The programmer's authority table will specify the libraries a programmer may access.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
31
All of the following concepts are associated with the black box approach to auditing computer applications except

A) the application need not be removed from service and tested directly
B) auditors do not rely on a detailed knowledge of the application's internal logic
C) the auditor reconciles previously produced output results with production input transactions
D) this approach is used for complex transactions that receive input from many sources
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following statements is NOT true?

A) All systems should be properly authorized to ensure their economic justification and feasibility.
B) Users need not be actively involved in the systems development process.
C) All program modules must be thoroughly tested before they are implemented.
D) The task of creating meaningful test data is time-consuming.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
33
When auditors do not rely on a detailed knowledge of the application's internal logic, they are performing

A) black box tests of program controls
B) white box tests of program controls
C) substantive testing
D) intuitive testing
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
34
To meet the governance-related expectations of management under SOX, an organization's internal audit department needs to be

A) independent
B) objective
C) technically qualified
D) All of the above are true.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
35
Which control is not a part of the source program library management system?

A) using passwords to limit access to application programs
B) assigning a test name to all programs undergoing maintenance
C) combining access to the development and maintenance test libraries
D) assigning version numbers to programs to record program modifications
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
36
Use of the integrated test facility poses no threat to organizational data files.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
37
When the auditor reconciles the program version numbers, which audit objective is being tested?

A) protect applications from unauthorized changes
B) ensure applications are free from error
C) protect production libraries from unauthorized access
D) ensure incompatible functions have been identified and segregated
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
38
Which control is not associated with new systems development activities?

A) reconciling program version numbers
B) program testing
C) user involvement
D) internal audit participation
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
39
Program testing

A) involves individual modules only, not the full system
B) requires creation of meaningful test data
C) need not be repeated once the system is implemented
D) is primarily concerned with usability
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
40
Which statement is not true?

A) An audit objective for systems maintenance is to detect unauthorized access to application databases.
B) An audit objective for systems maintenance is to ensure that applications are free from errors.
C) An audit objective for systems maintenance is to verify that user requests for maintenance reconcile to program version numbers.
D) An audit objective for systems maintenance is to ensure that the production libraries are protected from unauthorized access.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
41
New system development activity controls must focus on the authorization, development, and implementation of new systems and its maintenance. Discuss at least five control activities that are found in an effective system development life cycle.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
42
Describe a test of controls that would provide evidence that only authorized program maintenance is occurring.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
43
Which statement is not true? Embedded audit modules

A) can be turned on and off by the auditor.
B) reduce operating efficiency.
C) may lose their viability in an environment where programs are modified frequently.
D) identify transactions to be analyzed using white box tests.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
44
Generalized audit software packages perform all of the following tasks except

A) recalculate data fields
B) compare files and identify differences
C) stratify statistical samples
D) analyze results and form opinions
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
45
What is GAS? Identify two examples of GAS products.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
46
All of the following statements are true about the integrated test facility (ITF) except

A) production reports are affected by ITF transactions
B) ITF databases contain "dummy" records integrated with legitimate records
C) ITF permits ongoing application auditing
D) ITF does not disrupt operations or require the intervention of computer services personnel
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
47
What are program version numbers and how are the used?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
48
What is ITF?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
49
Auditors do not rely on detailed knowledge of the application's internal logic when they use the __________________________ approach to auditing computer applications.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
50
What is an embedded audit module?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
51
What are the audit's objectives relating to systems development?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
52
Describe two methods used to control the source program library.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
53
Contrast the source program library (SPL) management system to the database management system (DBMS).
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
54
What are CAATS? Identify five of them.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
55
All of the following are disadvantages of the test data technique except

A) the test data technique requires extensive computer expertise on the part of the auditor
B) the auditor cannot be sure that the application being tested is a copy of the current application used by computer services personnel
C) the auditor cannot be sure that the application being tested is the same application used throughout the entire year
D) preparation of the test data is time-consuming
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
56
All of the following are advantages of the test data technique except

A) auditors need minimal computer expertise to use this method
B) this method causes minimal disruption to the firm's operations
C) the test data is easily compiled
D) the auditor obtains explicit evidence concerning application functions
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
57
Describe parallel simulation.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
58
A __________________________ fraud affects a large number of victims but the harm to each appears to be very small.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
59
What is meant by auditing around the computer versus auditing through the computer? Why is this so important?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
60
Identify six controllable activities that distinguish an effective systems development process.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
61
Discuss the three types of controls auditors can perform to determine that programs are free from material errors.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
62
Describe and contrast the test data method with the integrated test facility.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
63
Describe two tests of controls the auditor can use confirm that authorization procedures for program changes.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
64
Outline the six controllable activities that relate to new systems development
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
65
Contrast embedded audit modules with generalized audit software.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
66
What is the purpose of the auditor's review of SDLC documentation?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
67
Discuss the six general categories of tests of IT controls.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 67 flashcards in this deck.