MCQ on Information Audit...Risk and controls
- Which
is not the purpose of Risk analysis?
- It
supports risk based audit decisions
- Assists
the Auditor in determining Audit objectives
- Ensures
absolute safety during the Audit
- Assists
the Auditor in identifying risks and threats
- Which
term best describes the difference between the sample and the population
in the sampling process?
- Precision
- Tolerable
error rate
- Level
of Risk
- Analytical
Data
- Name
one of the purposes of creating Business Continuity Plan
- To
maximise the number of decisions made during an incident
- To
minimise decisions needed during a crisis
- To
lower business insurance premiums
- To
provide guidance for federal regulations
- Failing
to prevent or detect a material error would represent which type of risk?
- Overall
Audit Risk
- Detection
Risk
- Inherent
Risk
- Control
Risk
- Which
is one of the bigger concerns regarding asset disposal?
- Residual
Asset Value
- Employees
taking disposed property home
- Standing
data
- Environmental
Regulations
- Who
should issue ogranisational policies?
- Policies
should originate from the bottom and move upto the middle management
level for approval
- The
policy should be issued in accordance with the approved standards by the
middle management level
- Policy
can be issued by any level of management based on a case to case basis
- The
policy should be signed and enforced by the highest level of management
- A
program check that ensures data entered by a data entry operator is
complete is an example of a
- Detective
Control
- Preventive
Control
- Corrective
Control
- Redundancy
Control
- What
is the primary objective in problem escalation?
- Improve
customer satisfaction
- Optimise
the number of skilled personnel
- Ensure
the correct response
- Prove
that the IT staff is competent
- Which
of the following is LEAST important when Auditors review Internal
Controls?
- The
existence of an Audit Committee in the Organisation
- The
Organisational structure and the Management style used by the
Organisation
- The
existence of a Budgeting System
- The
number of Personnel working for the Organisation
- What
is the best example of why plan testing is important?
- To
prove the plan worked the first time
- To
find the correct problems
- To
show the team that is not pulling their own weight
- To
verify that everyone shows up at the recovery site
- Continuity
planners can create plans without the business impact analysis (BIA)
process because
- Business
Impact Analysis is not required
- Management
already dictated all the key processes to be used
- Not
possible, critical processes continuously changes
- Risk
assessment is acceptable
- What
are the three competing demands to be addressed by the Project Management?
- Scope,
Authority and Availability of Resources
- Time,
Cost and Scope
- Requirements,
Authority and Responsibility
- Authority,
Organisational Culture and Scope
- How
should management act to best deal with emergency changes?
- Emergency
changes can not be made without advanced testing
- All
changes should still undergo review
- The
changes control process does not apply to emergency conditions
- Emergency
changes are not allowed under any condition
- Which
is the following is not an objective of a control?
- Reduce
expected losses from irregularities
- Reduce
the probability of an error occurring
- Reduce
the amount of loss if an occurs
- Provide
for all the failures and to ensure that business is protected fully from
such failures
- IT
audit is the process of collecting and evaluating evidence to determine
- Whether
a computer system safeguards assets
- Whether
maintains data integrity
- Whether
allows organisational goals to be achieved effectively and uses resources
efficiently
- All
of the above
- The
objectives of IT audit include
- Ensures
asset safeguarding
- Ensures
that the attributes of data or information are maintained
- Both
(a) and (b)
- None
of the above
- Which
is not an attribute of data or information
- Compliance
- Integrity
- Confidentiality
- Technology
- Which
among the following does not encompass organisational and management
controls within the information processing facility (IPF)
- Sound
human resource policies and management practices
- Methods
to assess effective and efficient operations.
- The
regulatory framework within which the business is carried out
- Separation
of duties within the information processing environment
- The
essential aspect to be understood about the organisation subject to IT
audit is
- Organisation’s
business and its strategic goals and objectives
- The
number of operating units / locations and their geographic dispersion
- Major
pending projects in progress
- All
of the above
- While
understanding the type of software used in the organisation the IT auditor
has to
- See
the policy decision on developing software inhouse or to buy commercial
products.
- Collect
details of operating systems, application system and database management
system
- Collect
information relating to network architecture and technology to establish
connectivity.
- All
of the above
- The
security goals of the organisation does not cover
- Confidentiality
- Probability
and impact of occurrence
- Availability
- Integrity
- Find
out the incorrect statement with reference to Risk assessment
- The
detailed audit is needed where the risk assessment is low and the risk
management is high
- An
independent assessment is necessary whether threats have been countered /
guarded against effectively and economically
- The
assessment of the soundness of IT system will necessarily have to study
the policies and process of risk management
- None
of the above
- Consider
the following statement and find out the correct one w.r.t. IT audit
- In
inherent risk there is an assumption that there are related internal
controls.
- In
control risk errors will not be prevented or detected and corrected by
the internal control system.
- The
control risk associated with computerised data validation procedures is
ordinarily high.
- None
of the above
- What
is the characteristic of ‘detective control’
- Minimise
the impact of a threat
- Use
controls that detect and report the occurrence of an error, omission or
malicious act.
- Detect
problems before they occur
- None
of the above
- Which
among the following is not characteristic of ‘preventive control’
- Monitor
both operation and imports
- Prevent
error, omission or malicious act from occurring
- Correct
errors from occurring
- None
of the above
- IT
access is not controlled or regulated though password it indicates
- Poor
security control
- High
risk of the system getting hacked
- High
risk of the system getting breached
- All
of the above
- Basic
risk areas which the external Govt. auditor may come across when reviewing
internal audit’s work include
- Availability
of sufficient resources, in terms of finance, staff and skills required
- Involvement
of internal audit with IT system and under development
- Management
not required to act on internal audit’s recommendations
- None
of the above
- Which
is the common audit objectives for an IT audit
- Review
of the security of the IT system
- Evaluation
of the performance of a system
- Examination
of the system development process and the procedures followed at various
stages involved
- All
of the above.
- The
type of audit evidence which the auditor should consider using in IT audit
includes
- Observed
process and existence of physical items
- Documentary
audit evidence excluding electronic records
- Analysis
excluding IT enabled analysis using
- None
of the above
(A)
System analysis of programmers |
(A)
To determine whether any application system to consume abnormal amounts of
resources. |
(B)
Clerical / Data entry staff |
(B)
To determine their perceptions of how the system has affected the quality of
working life |
(C)
Users of an application systems |
(C)
To determine how they correct input data. |
(D)
Operation staff |
(D) To
obtain a better understanding of the functions and controls embedded with the
system. |
- Match
the following w.r.t interviews to be conducted with staff and purpose
interviewing Kinds of staff / personnel Purpose of interview
- A–B;
B–A; C–D; D–C
- A–D;
B–C; C–A; D–A
- A–C;
B–D; C–A; D–B
- None
of the above
- Which
of the following type of questions need to be included in the
questionnaire(s)
- Ambiguous
questions
- Leading
questions
- Presumptuous
questions
- Specific
questions
- Analytical
procedures are useful in the following way in collecting audit evidence in
IT audit
- Use
comparisons and relationships to determine whether account balances
appear reasonable
- To
decide which accounts do not need further verification
- To
decide which audit areas should be more thoroughly investigated
- All
of the above
- What
is the commonly used example of generalised audit software?
- CAAT
- IDEA
- COBIT
- None
of the above
- A
higher risk of system violation happens where
- The
audit module is not operational
- The
audit module has been disabled
- The
audit module is not periodically reviewed
- All
of the above
- Which
among the following is not a compliance test as related to IT environment
- Determining
whether passwords are changed periodically.
- Determining
whether systems logs are reviewed
- Determining
whether program changes are authorised.
- Reconciling
account balances
- Substantive
tests as they relate to the IT environment does not include
- Conducting
system availability analysis
- Conducting
system outage analysis
- Performing
system storage media analysis
- Determining
whether a disaster recovery plan was tested
- Find
out the incorrect statement w.r.t. attribute sampling used by IT auditors
- Attribute
sampling is used in substantive testing situations
- Attribute
sampling deals with the presence or absence of the attribute
- It
provides conclusions that are expressed in rates of incidence
- None
of the above
- Variable
sampling is used and deals with and provide
- Applied
in substantive testing situations
- Deals
with population characteristics that vary
- Provides
conclusions related to deviations from the norm
- All
of the above
- Which
among the following is true as to Audit Reporting
- Normal
reporting format is not adhered to in the case of IT Audit
- In
IT audit, the base of the focus is the system
- In
IT audit the audience for the report should normally be ignored
- None
of the above
- The
conclusions of the IT audit report does not include
- Sweeping
conclusions regarding absence of controls and risks
- A
mismatch between hardware procurement and software development in the
absence of IT policy
- Haphazard
development which cannot be ascribed to lack of IT policy
- All
of the above
- Which
among the following is not a limitation in IT Audit
- Data
used not from production environment
- If
these is only production environment and audit could not test dummy data
- “Read
only Access” given to audit
- None
of the above
- With
the help of what tools, IT auditor can plan for 100% substantive testing
- CAATs
tools
- CMM
(Software)
- COBIT
- None
of the above
- The
reason for management’s failure to use information properly is
- Failure
to identify significant information
- Failure
to interpret the meaning and value of the acquired information
- Failure
to communicate information to the decision maker
- All
of the above
- Find
out the incorrect statement
- Distributed
networks may decrease the risk of data inconsistencies
- Application
software developed inhouse may have lower inherent risk than vendor
supplied software
- Peripheral
access devices or system interfaces can increase inherent risk
- None
of the above
- Categories
of general control do not include
- Logical
access controls
- Acquisition
and program change controls
- Control
over standing data and master files
- None
of the above
- Application
controls includes
- IT
operational controls
- Control
over processing
- Physical
controls
- None
of the above
- What
legal protection is available to prevent theft illegal copying of software
- Computer
misuse legislation
- Data
protection and privacy legislation
- Copyright
laws
- None
of the above
- Match
the following w.r.t. the following critical elements and its impact
(A) Poor reporting structures |
(A) Cannot satisfactorily review the computer systems and
associated controls |
(B) Inappropriate or no IT planning |
(B) Leads to security breaches, data loss fraud and errors |
(C) Security policies not in place or not enforced |
(C) Leads to business growth being constrained by a lack
of IT resources |
(D) Ineffective internal audit function |
(D) Leads to inadequate decision making and affect the
future as a going concern |
- A–D;
B–A; C–B; D–C
- A–D;
B–C; C–B; D–A
- A–B;
B–A; C–D; D–C
- None
of the above
- The
risk areas associated with poorly controlled computer operations include
- Applications
not run correctly
- Loss
or corruption of financial applications
- lack
of backups and contingency planning
- All
of the above
- In
case of outsourcing IT activities the IT auditor should
- Review
the policies and procedures which ensure the security of the financial
data
- Obtain
a copy of the contract to determine if adequate controls have been
specified
- Ensure
that audit needs are taken into account and included in the contracts
- All
of the above
- While
reviewing the network management and control the IT auditor is required to
- Review
the security and controls in non-financial systems
- Review
the security and controls in financial system’
- Either
(a) or (b) depending upon scope of audit and SAI’s mandate
- None
of the above
- Which
among the following is not true w.r.t. logical access controls
- Logical
access control usually depend on the in – built security facilities
- The
importance of logical access controls is increased where physical access
control is more effective
- logical
access control exits at both an installation and application level
- None
of the above
- Weak
input control may increase the risk of
- Entry
of an authorised data
- incomplete
data entry
- Entry
of duplicate / redundant data
- All
of the above
- Weak
process controls would lead to:
- Unauthorised
changes or amendments to the existing data
- Absence
of audit trial rendering, sometimes the application unauditable
- Inaccurate
processing of transactions leading to wrong outputs / results
- All
of the above
0 Comments