Preview

Questions on Controls Part III: Systems Development, Program Changes, and Application Controls

Better Essays
Open Document
Open Document
4820 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Questions on Controls Part III: Systems Development, Program Changes, and Application Controls
Chapter 17—IT Controls Part III: Systems Development, Program Changes, and Application Controls

TRUE/FALSE

1. Programs in their compiled state are very susceptible to the threat of unauthorized modification.

ANS: F

2. Maintenance access to systems increases the risk that logic will be corrupted either by the accident or intent to defraud.

ANS: T

3. Source program library controls should prevent and detect unauthorized access to application programs.

ANS: T

4. A check digit is a method of detecting data coding errors.

ANS: T

5. Input controls are intended to detect errors in transaction data after processing.

ANS: F

6. A header label is an internal, machine-readable label.

ANS: T

7. The user test and acceptance procedure is the last point at which the user can determine the system’s acceptability prior to it going into service.

ANS: T

8. A run-to-run control is an example of an output control.

ANS: F

9. Shredding computer printouts is an example of an output control.

ANS: T

10. In a CBIS environment, all input controls are implemented after data is input.

ANS: F

11. Achieving batch control objectives requires grouping similar types of input transactions (such as sales orders) together in batches and then controlling the batches throughout data processing.

ANS: T

12. The "white box" tests of program controls are also known as auditing through the computer.

ANS: T

13. The presence of a SPLMS effectively guarantees program integrity.

ANS: F

14. When using the test data method, the presence of multiple error messages indicates a flaw in the preparation of test transactions.

ANS: F

15. The Base Case System Evaluation is a variation of the test data method.

ANS: T

16. Tracing is a method used to verify the logical operations executed by a computer application.

ANS: T

17. Generalized audit software packages are used to assist the auditor in performing

You May Also Find These Documents Helpful

  • Better Essays

    Manual/ White Box: In this technique, a thorough code review is performed over the whole code, which may become a very tedious and tiresome process. But in this process, logical flaws may be identified which may not be possible using automated tools, such as business logic problems. Automated tools are mostly capable of finding technical flaws such as injection attacks but may miss flaws like authorization problems. In this process, instead of going line by line through whole code base, we can concentrate on potential problems in the code. Those potential vulnerabilities can be given a high priority. For example, in C/C++, if we try to find any copying function in the code and check whether it’s using functions such as, strcpy() for performing copy function. As we know, strcpy() is known to be vulnerable to buffer overflow attacks. We may also want to check if any customized encryption is being used in the application, which automated tools may miss as they can identify standard algorithms only…

    • 813 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    b. In lieu of traditional testing, what approaches can be used in on-line entry/on-line processing systems?…

    • 6750 Words
    • 23 Pages
    Satisfactory Essays
  • Satisfactory Essays

    application. This some high quality software that lets you run more tests in less time with fewer…

    • 442 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CAATs are divided into two techniques that will be beneficial to Kudler. The first is validating application integrity. The purpose of this technique is to find whether the source code has been compromised. Verifying the overall integrity of the applications is the second CAATs technique. This technique’s objective is to ensure that the data was imported correctly and also to find any irregularities within the data.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Java exam 1 practice test

    • 6434 Words
    • 53 Pages

    That a program may be written on one type of computer and then run on a wide variety of computers with little or no modification necessary.…

    • 6434 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Having all custom application code reviewed for common vulnerabilities by an organization that specializes in application security.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Dentistar, Inc. was formed in 1985 to provide dental and orthodontic services to subscribers of their prepaid dental plans. This report examines the western region’s office, located in Los Angeles, and its issuance of excessive manual checks that resulted in multiple bank overdrafts. Results indicate that only minimal efforts have been made for internal control measures in this office and companywide, and that weaknesses have allowed the Finance Coordinator to embezzle funds. There are many issues to be addressed, and several remedial actions to be taken to prevent these types of losses going forward.…

    • 1799 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    This paper will discuss input controls and their various functions. An input control includes the necessary measures to ensure that data is correct, complete, and secure (Shelly & Rosenblatt, 2012). Input controls as it relate to user interface, includes audit trails, password security, data security, and encryption (Shelly & Rosenblatt, 2012). It is vital a company should take all needed measures to protect its data, which include customer, employees, and suppliers. Most assets have a value, but corporate data is priceless, because without safe, secure, accurate data, a company cannot function. (Shelly & Rosenblatt, 2012).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Lab 4

    • 581 Words
    • 2 Pages

    Loss of Integrity – Impact if system or data integrity is lost by unauthorized changes to the data or system.…

    • 581 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Refining Solutions

    • 947 Words
    • 4 Pages

    A program that allows people to see how computers on the network are running, allowing the opportunity for regular maintenance on systems. There is also the ability to contact a professional immediately and have help with any possible problems that might be at hand.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Equipment failure-no backup’s setup. This is another vulnerability that can be avoided by performing regular backups and keeping them at an offsite location.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    B. The company must make sure the implementation of the test is done in a uniform manner.…

    • 1281 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Outsource Uat Testing

    • 553 Words
    • 3 Pages

    Owing to Business exigencies attention from the implementation may come down sporadically leading the Key Users to pass the UAT easily leading to missing business scenario testing.…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    E-Commerce

    • 2676 Words
    • 11 Pages

    Acceptance testing – verifies that the business objectives of the system as originally conceived are in fact working.…

    • 2676 Words
    • 11 Pages
    Satisfactory Essays