Beruflich Dokumente
Kultur Dokumente
10. Designed identify errors once they have happened. I.e. Bank reconciliation and physical checks of
inventory against inventory records. Are example of .............................. Control procedure.
A. Detect
B. Prevent
C. Correct
D. Discretionary
11....................... Controls are designed to minimize or negate the defect of errors... E.g. back up of
computer input at the end of the day.
A. Backup
B. Correct
C. Accounting
D. Detect.
E. Prevent.
13. .................... Controls are provided automatically by the system and cannot be overridden. E.g.
entering a pin in ATM
A. Financial
B. Manual
C. General
D. Non- Discretionary
14. A .................... Is a list that is drawn up before any processing takes place?
A. Post list
B. Pre List
C. Total List
D. Job list.
15. Acknowledgment of work means Person who carries out a particular job should acknowledge their
work by getting the signature of its senior manager
A. True
B. False
16. Funds and property of the company should be kept under proper custody. Access to assets should be
limited to........................
A. Directors
B. None Executive Directors
C. Authorized personal.
D. Bankers or lenders
18. Internal Audit need is depending on the following (state which is the wrong one.)
A. Problem with the internal Control system
B. An increased number of unexplained or unacceptable events
C. Cost benefit considerations
D. When management is satisfied with the internal control system.
19. Internal Auditors seeks to monitor the financial activity of a company only.
A. True
B. False
20. Operation Audit is also known as management, efficiency or value for money audit.
A. True
B. False
22. ........................ Is based on a testing and evaluation of the internal controls within an organization so
that those controls may be relied on to ensure that resources are being managed effectively and
information provided accurately
A. System Audit
B. Value of Money
C. Operational Audit
D. Social Audit.
24. ............................ Seeks evidence that the internal controls are being applied as prescribed.
A. Compliance Test
B. Substantive Test
C. Error detection Test
D. Productivity test.
25. ........................... Test is used to check the entries in the figures in accounts. They are used to
discover errors and omissions.
A. Error and Omission
B. Accounts
C. Casting
D. Substantive
26. A Transactions or Probity Audit aims to detect fraud and uses only substantive tests.
A. True
B. False
28. This is wrong Perception that Independence is vital for the work and productivity for Internal
Auditors.
A. True
B. False
29. External Auditor has a much wider scope then the Internal Auditors.
A. True
B. False
31. The external auditors do not have a specific duty to detect fraud.
A. True
B. False.
32. A .............. Can be maintained of unauthorized attempts to gain access to a computer system.
A. Database
B. Log
C. Password
D. Register
33. It is in practice.................... To prevent all threats cost effectively.
A. Impossible
B. Possible
C. Logical
D. Practical.
34. Physical access control is design to prevent...................... Getting near to computer equipment or
storage media.
A. Managers
B. IT Workers
C. Intruders
D. Operators.
35. An ................... Is a record showing who has accessed a computer system and what operations he
has perform.
A. A Fraud Trial
B. Password Trial
C. Computer Trial
D. Audit Trail
38. An Audit trial should be provided so that every transaction on a file contain a...........................
A. Audit Mark
B. Unique Reference
C. Internal control ref.
D. Software Ver. Detail
A. Accountability
B. Password
C. Business History
D. Employees time
E. Hard disk space.
41. A Contingency is an unscheduled interruption of computing services that requires measures outside
the day to day routine operation procedure.
A. True
B. False
42. A …………... Audit aims to detect fraud and uses only substantive tests.
A. Transactions or probity
B. Compliance
C. Working Audit
D. Tax Audit.
44. An organization has a policy of checking all invoices from suppliers against goods received notes
before paying the invoices. This is an example of what type of control procedure?
A. Accounting controls
B. Correct controls
C. Detect controls
D. Prevent controls
45. Below are few factors that influenced the control environment. Which of the following one is
incorrect?
A. Management attitude toward control.
B. Organization Structure.
C. Stakeholder perception.
D. Values and ability of employee\s.
46. Control Environment. Which of the two control classifications are related to reduce of risk associated
to computer environment?
A. General.
B. Application.
C. Manual.
D. Voluntary.
48. Arithmetical internal check includes the following three steps. Which of the following is not correct?
A. Pre-list.
B. Post-list.
C. Segregate tasks
D. Control total.
49. The main responsibility of the external auditor is to ensure that the financial statements of the client
are
A. Accurate and free from bias.
B. Should reach the Govt. Authorities on time.
C. Should have a detail report on the performance of internal auditors performance
D. Gave a true and fair view of the company activities.
50. External auditor should also see whether the management and the directors has act on the
recommendations of the internal auditors in their report about the weakness and other areas of the
company.
A. True.
B. False.
51. One of the main responsibilities of the external auditor is to ensure that company complies with the
regulations relating to preparing the financial statement on time and submit the copy to the govt.
authorities.
A. True.
B. False.
52. Substantive test are tests by an auditor to establish whether a figure in the financial statement is
correct or not.
A. True.
B. False.
54. Destruction of data can be even more costly than the destruction of hardware. Company data is
more important than hardware.
A. True.
B. False.
55. Physical access of intruders to the computer equipment and data can be control by the following
way. State the one incorrect?
A. Personal control like security guards or watch man etc.
B. Door locks and Cameras
C. Sign of no entry.
D. Intruders Alarms.
56. Modern computer equipments are safe from theft due to their extra large size.
A. True.
B. False.
57. Which of the following two are the most important aspect of physical access control to the computer
equipment.
A. Personal control like security guards or watch man etc.
B. Door locks
C. Card entry system. .
D. Intruders Alarms
58. .in the context of security is preserved when data is the same as in source documents and has not
been accidentally or intentionally altered destroyed or disclosed.
A. System integrity
B. Risk control
C. Data redundancy.
D. Data integrity
59. ………………. Mean a same data in two or more places. System database through data integration
reduce/delete duplicate data.
A. System integrity
B. Risk control
C. Data redundancy.
D. Data integrity
60. Back-up control in computer data protection aims to maintain system and data integrity.
A. True.
B. False.
61. A ………………can provide a restorable history from one day to several years, depending on the needs
of the business. A. Old unused computer.
B. Tape rotation scheme
C. Physical hard copies of record.
D. Company accountant.
62. The key objective of the internal Audit is to protect and report for the benefits of the stakeholders.
A. True.
B. False.