SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: Level 2

Questions and Answers List

level questions: Level 2

QuestionAnswer
Computerized audit technique which mixes fictitious data together with real and valid data in master file to be processed within the systemIntegrated test facility
Computerized audit technique which use real data but processed through separate audit program / test programParallel simulation
Computerized audit technique which embedding audit routines within a program to analyzed transaction dataEmbedded Audit Routines
Computerized audit technique which modify program to tag specific transactions and save all their processing steps in an extended recordExtended records
Computerized audit technique which print outs the content of selected memory areas when executedSnapshot
Computerized audit techniques which provides detailed audit trail of all the instructions executed by a programTracing
Computerized audit technique which use special software to monitor the execution of a program.Mapping
occurs when two different applications or transactions have a lock on data that is needed by the other application or transactionDeadly embrace (deadlock)
a single part of a system, which, if it fails, will result in the unavailability of the entire systemSingle point failure
allows users to log in to all of the different systems in the organization (accounting, email, shipping and so forth) with the same username and password.Single level sign-on
Is the combination of people, policies, procedures, and processes that help ensure that an entity is effectively and efficiently directs its activities toward meeting the objective of its stakeholdersGovernance
Designed to prevent payments of corporate funds which are contrary to public policy, e.g. bribery of foreign officials / political party / candidate for pollical office (government related)Foreign Corrupt Practices Act (FCPA)
Response to numerous financial reporting scandals involving large public companiesSarbanes-Oxley Act
the process whereby management identifies the organization’s vulnerabilitiesRisk assessment
the continuous process of designing and operating internal controls that mitigate risks identified during risk assessmentRisk management
Who is responsible for establishing and maintaining the system of internal control?Senior management
Internal audit is being headed byChief audit executive (CAE)
To whom does the CAE directly reports to?CEO
Also means alternative controlsCompensatory (mitigative) controls
Also means second layer controlsComplementary controls
Computer-assisted audit techniques which evaluates only input and output with manual interventionAuditing around the computer
Computer-Assisted Audit techniques which uses the computer to test the processing logic and control within the systems e.g. Integrated audit facilityAuditing through the computer
combines multiple physical disk drive components into a single logical unit for the purpose of data redundancy, performance, or bothRAID – Redundant array of independent discs
sending data to an intermediate storage that is accessible by the peripheral device when neededSpooling
Security attack uses password cracking software to try large numbers of letter and number combinations to access a networkBrute force
identity misrepresentation in cyberspaceSpoofing
use of software to eavesdrop on information sent by a user to the host computer of a websiteSniffing
A testing which identifies weakness in the IT infrastructureVulnerability testing
A testing which test how well the system tolerates real-world style attacks patternsPenetration Testing
A recovery center which imitates the company's data centerHot site
A recovery center which as a limited hardware such as communication and networking equipmentWarm site
A recovery center which lack most infrastructure but readily available for quick installation of hardwareCold site
What document does the GL department receive during sales to receivable cycle?Daily income summary
What document does the GL department receive during cash receipts cycleRemittance listing
What document does the GL department receive during Purchase to Payable cycleDaily PO summary
What document does the GL department receive during cash payment cycleCheck register
What document does the GL department receive during payroll cyclePayroll register
This document shows the total number of hours workedEmployee clock card
This document shows the total number of hours worked per jobJob time ticket
a formal document that defines internal audit's purpose, authority, responsibility and position within an organizationinternal audit charter
With whom does audit committee/CAE reports directly?CAE – CEO, Audit Committee, Board of Directors Audit Committee – BOD as member of the board
Which corporations are subject to accounting requirements of FCPAAll corporation (domestic or not) whose securities are registered pursuant to the SEC act of 1934
Which corporations engaged in interstate commerce are prohibited by FCPA of bribery of foreign officials?Domestic
Who specifically attest to the effectiveness of controlsCAE and CFO
Who approves charter of IAAmanagement and the board
used to search application source programs for code that is not used in the version of the program that is in use by the production systemMapping programs
is a potential encryption standard licensed to hardware and software vendorsRSA (Rivest, Shamir, and Adelman)
a backup operational mode used to make systems more fault-tolerantFailover