Auditing Chapter 12 Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Kosdaisy
K
Kosdaisy
Community Contributor
Quizzes Created: 10 | Total Attempts: 15,419
Questions: 8 | Attempts: 853

SettingsSettingsSettings
Auditing Quizzes & Trivia

Auditing quiz derived from the 12th chapter of the textbook Auditing and Assurance Services an Intergrated Approach by Arens.


Questions and Answers
  • 1. 

    IT has several significant effects on an organization. Which of the following would not be important from an auditing perspective?

    • A.

      Organizational changes.

    • B.

      The visibility of information.

    • C.

      The potential for material misstatement.

    • D.

      None of the above; i.e., they are all important.

    Correct Answer
    D. None of the above; i.e., they are all important.
    Explanation
    From an auditing perspective, all of the given options are important. Organizational changes can impact the control environment and the effectiveness of internal controls, therefore they need to be assessed. The visibility of information is crucial for auditors to ensure that information is accurate, complete, and accessible. The potential for material misstatement is a key concern for auditors as it can affect the reliability of financial statements. Therefore, all of these factors are important from an auditing perspective.

    Rate this question:

  • 2. 

    The audit procedure which is least useful in gathering evidence on significant computer processes is:

    • A.

      Documentation

    • B.

      Observation

    • C.

      Test decks.

    • D.

      Generalized audit software.

    Correct Answer
    B. Observation
    Explanation
    Observation is the least useful audit procedure for gathering evidence on significant computer processes because it involves simply watching and noting down what is happening without actively testing or verifying the accuracy and effectiveness of the computer processes. While observation can provide some insight into how the processes are being performed, it does not provide concrete evidence or allow for the identification of potential errors or weaknesses in the system. Other audit procedures such as documentation, test decks, and generalized audit software are more effective in gathering evidence and evaluating the reliability of computer processes.

    Rate this question:

  • 3. 

    Which of the following is not a benefit of using IT-based controls?

    • A.

      Ability to process large volumes of transactions.

    • B.

      Ability to replace manual controls with computer-based controls.

    • C.

      Reduction in misstatements due to consistent processing of transactions.

    • D.

      Over-reliance on computer-generated reports.

    Correct Answer
    D. Over-reliance on computer-generated reports.
    Explanation
    Over-reliance on computer-generated reports is not a benefit of using IT-based controls because it can lead to a false sense of security and a lack of critical thinking. Relying solely on computer-generated reports without human review and analysis can result in overlooking errors or fraudulent activities that may not be detected by the system. It is important to have a balance between automated controls and human oversight to ensure the accuracy and reliability of financial information.

    Rate this question:

  • 4. 

    One significant risk related to an automated environment is that auditors may ____ information provided by an information system.

    • A.

      Not place enough reliance on

    • B.

      Place too much reliance on

    • C.

      Reveal

    • D.

      Not understand

    Correct Answer
    B. Place too much reliance on
    Explanation
    In an automated environment, auditors may place too much reliance on the information provided by an information system. This means that they may overly rely on the accuracy and completeness of the system's output without conducting sufficient independent verification. This can be a significant risk because if the information system is flawed or compromised, it can lead to incorrect or misleading audit conclusions. Auditors should always exercise caution and perform appropriate testing and validation to ensure the reliability of the information obtained from automated systems.

    Rate this question:

  • 5. 

    Which of the following is not a risk specific to IT environments?

    • A.

      Reliance on the functioning capabilities of hardware and software.

    • B.

      Increased human involvement.

    • C.

      Loss of data due to insufficient backup.

    • D.

      Reduced segregation of duties.

    Correct Answer
    B. Increased human involvement.
    Explanation
    Increased human involvement is not a risk specific to IT environments because in any environment, whether IT or non-IT, human involvement is always present. It is a general factor that can affect the overall risk in any situation, not just in IT environments. The other options mentioned, such as reliance on hardware and software, loss of data due to insufficient backup, and reduced segregation of duties, are all specific risks that are commonly associated with IT environments.

    Rate this question:

  • 6. 

    Which of the following is not an enhancement to internal control that will occur as a consequence of increased reliance on IT?

    • A.

      Computer controls replace manual controls.

    • B.

      Higher quality information is available.

    • C.

      Computer-based controls provide opportunities to enhance separation of duties.

    • D.

      Manual controls replace automated controls.

    Correct Answer
    D. Manual controls replace automated controls.
    Explanation
    Increased reliance on IT typically leads to the replacement of manual controls with computer controls. This is because computer controls are more efficient, consistent, and reliable compared to manual controls. They can automate processes, perform calculations, and detect errors or anomalies in real-time. As a result, the organization can reduce the risk of human error, improve the accuracy and timeliness of information, and enhance the overall internal control system. On the other hand, the statement "Manual controls replace automated controls" contradicts this trend and does not represent an enhancement to internal control.

    Rate this question:

  • 7. 

    Which of the following is not a risk to IT systems?

    • A.

      Need for IT experienced staff

    • B.

      Separation of IT duties from accounting functions

    • C.

      Improved audit trail

    • D.

      Hardware and data vulnerability

    Correct Answer
    C. Improved audit trail
    Explanation
    An improved audit trail is not a risk to IT systems. In fact, it is a beneficial measure that helps in enhancing the security and integrity of IT systems. An audit trail refers to a record of all activities and transactions within a system, allowing for easier monitoring and detection of any unauthorized or suspicious activities. It helps in identifying potential risks and vulnerabilities, ensuring compliance with regulations, and facilitating effective troubleshooting. Therefore, an improved audit trail is a protective measure rather than a risk to IT systems.

    Rate this question:

  • 8. 

    Which of the following is not a category of an application control?

    • A.

      Processing controls.

    • B.

      Output controls.

    • C.

      Hardware controls.

    • D.

      Input controls.

    Correct Answer
    C. Hardware controls.
    Explanation
    The given correct answer is "Hardware controls." This is because hardware controls refer to the physical security measures implemented to protect the hardware components of a system, such as locks, alarms, and surveillance cameras. While hardware controls are important for overall system security, they are not specifically categorized as application controls. Application controls focus on the software and logical security measures, such as input controls, processing controls, and output controls, which are designed to ensure the integrity, accuracy, and security of data within an application.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 20, 2011
    Quiz Created by
    Kosdaisy
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.