IT controls : Systems development, program changes, and application controls
22 important questions on IT controls : Systems development, program changes, and application controls
Which points distinguish an effective systems development process?
- User specification activities: the users need to be actively involved in the systems development process.
- Technical design activities: the technical design activities translate user specifications into a set of detailed technical specifications for a system that meets the user’s needs.
- Internal audit participation: the internal auditor can serve as a liaison between users and the systems professionals to ensure an effective transfer of knowledge.
What are the four controls all maintenance actions should require?
2. technical specifications,
3. testing and
4. documentation updates.
What is a source program library (SPL)?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
Which four critical functions does the SPLMS control?
(2) retrieving programs for maintenance purposes,
(3) deleting obsolete programs from the library and
(4) documenting program changes to provide an audit trail of the changes.
Which planning and control techniques does an SPL require?
- Separation of test libraries: a strict separation is maintained between the production programs that are subject to maintenance in the SPL and those being developed
- Audit trail and management reports: an important feature of SPLMS is the creation of reports that enhance management control and support the audit function.
What are batch controls?
- a unique batch number
- a batch date
- a transaction code
- record count
- batch control total
- hash total.
What is a run-to-run control?
What are output controls?
What is output spooling and how can it be abused?
- Access the output file and change critical data values;
- Access the file and change the number of copies of output to be printed;
- Make a copy of the output file to produce illegal output reports;
- Destroy the output file before output printing takes place.
What are print programs?
Pausing the print program to load the correct type of output documents;
Entering parameters that the print run needs (number of copies to be printed);
Restarting the print run at a prescribed checkpoint after a printer malfunction;
Removing printed output from the printer for review and distribution.
Print programs should deal with two types of exposure:
1) the production of unauthorized copies of output and
2) employee browsing of sensitive data.
How can waste be abused?
What are the risks with report distribution?
- a secure mailbox of which only the user has the key;
- user must (in person) sign for receipt of the report;
- making use of a security officer or special courier.
What are end-user controls?
How can digital output be controlled?
What is black box testing?
What is white box testing?
- Authenticity tests;
- Accuracy tests;
- Completeness tests;
- Redundancy tests:
- Access tests;
- Audit trial tests;
- Rounding error tests
What is the test data method?
What is a base case system evaluation (BCSE)?
What is an integrated test facility (ITF)?
What are substantive testing techniques?
Determining the correct value of inventory;
Determining the accuracy of prepayments and accruals;
Confirming accounts receivable with customers;
Searching for unrecorded liabilities.
What is the embedded audit module?
What is the generalized audit software?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding