A
U
D
I
T
1

•What is the main difference between attest services and advisory services?
A) Attest services are required by law, while advisory services are optional
B) Attest services involve examining agreed-upon procedures, while advisory services focus on improving operational efficiency
C) Attest services are performed by internal auditors, while advisory services are performed by external auditors
D) Attest services are focused on fraud audits, while advisory services are focused on financial audits

B) Attest services involve examining agreed-upon procedures, while advisory services focus on improving operational efficiency

1

Ano sa tagalog ang mud fish?

Dalag

1

•What does IT Governance focus on?
A. Managing strategic HR resources
B. Assessing financial resources
C. Managing and assessing strategic IT resources
D. Assessing marketing strategies

C. Managing and assessing strategic IT resources

1

Which of the following is NOT a category of internal control presented in the COSO framework?
A) Control environment
B) Risk assessment
C) Financial data integrity
D) Monitoring

C) Financial data integrity

1

•What is the main objective of application controls?
A) To ensure only authorized personnel have access to firm’s assets
B) To identify and expose undesirable events that eluded preventive controls
C) To ensure the validity, completeness, and accuracy of financial transactions
D) To separate transaction authorization from processing

C) To ensure the validity, completeness, and accuracy of financial transactions

2

•What is the formula for the audit risk model?
A) AR = IR x CR x DR
B) AR = DR x CR x IR
C) AR = IR / CR / DR
D) AR = DR / CR / IR

A) AR = IR x CR x DR

2

•What is the main benefit of IT outsourcing?
A. Reduced security
B. Improved core business processes
C. Increased IT costs
D. Loss of strategic advantage

B. Improved core business processes

2

Tungkol sa anong parte ng katawan ang sikat na impromtu spoken poetry ng social media personality na si Kween Yasmin? 

Esophagus

2

•What is the relationship between general controls, application control, and financial data integrity?
A) General controls are specific to financial data integrity, while application controls are related to operational efficiency
B) General controls apply to all systems and are necessary to support the functioning of application controls for accurate financial reporting
C) Application controls are focused on fraud audits, while general controls are focused on financial audits
D) General controls are only applicable to internal audits, while application controls are only applicable to external audits

B) General controls apply to all systems and are necessary to support the functioning of application controls for accurate financial reporting

2

•Which of the following is NOT a risk associated with Distributed Data Processing (DDP)?
A. Operational inefficiencies
B. Hardware and software incompatibility
C. Destruction of audit trails
D. Increased security measures

D. Increased security measures

3

•What is the primary function of internal auditing within an organization?
A) To conduct fraud audits
B) To perform compliance audits
C) To examine and evaluate activities within the organization
D) To assist external auditors in financial audits

C) To examine and evaluate activities within the organization

3

•What is the main objective of IT governance controls?
A. To increase risk
B. To reduce investments in IT resources
C. To ensure the security of an organization’s computer facilities
D. To decrease stakeholder participation

C. To ensure the security of an organization’s computer facilities

3

•Which of the following is NOT one of the three IT governance issues addressed by SOX and COSO?
A. Organizational structure of the IT function
B. Disaster recovery planning
C. Computer center operations
D. Human resources management

D. Human resources management

3

•What is a key feature of a disaster recovery team?
A. They should be inexperienced in their areas
B. They should not have assigned tasks
C. They should be experts in their areas
D. They should not participate actively

C. They should be experts in their areas

3

•What is a risk inherent to IT outsourcing?
A. Vendor exploitation
B. Increased security
C. Reduced costs
D. Enhanced strategic advantage

A. Vendor exploitation

4

•Who should be involved in identifying critical applications in a disaster recovery plan?
A. Only user departments
B. Only accountants
C. Only auditors
D. User departments, accountants, and auditors

D. User departments, accountants, and auditors

4

•What is the purpose of disaster recovery planning?
A. To identify critical applications
B. To provide technical help
C. To improve data processing efficiency
D. To reduce insurance coverage

A. To identify critical applications

4

•What is the purpose of detective controls in an internal control system?
A) To fix identified problems
B) To reduce the frequency of undesirable events occurring
C) To identify and expose undesirable events that eluded preventive controls
D) To ensure actions are taken to deal with identified risks

C) To identify and expose undesirable events that eluded preventive controls

4

•What is the purpose of providing second-site backups in a disaster recovery plan?
A. To increase the risk of data loss
B. To reduce hardware availability
C. To provide duplicate data processing facilities
D. To decrease disaster recovery team members

C. To provide duplicate data processing facilities

4

•What is the primary objective of preventive controls in an internal control system?
A) To identify and expose undesirable events that eluded preventive controls
B) To ensure only authorized personnel have access to firm’s assets
C) To reduce the frequency of undesirable events occurring
D) To fix identified problems

C) To reduce the frequency of undesirable events occurring

5

•What is the main objective of an external (financial) audit?
A) To improve operational efficiency
B) To investigate anomalies and gather evidence of fraud
C) To express an opinion on the fair presentation of financial statements
D) To evaluate internal controls within an organization

C) To express an opinion on the fair presentation of financial statements

5

•Which of the following is NOT a common type of audit?
A) External audit
B) Internal audit
C) Compliance audit
D) Advisory audit

D) Advisory audit

5

What is the smallest country in the world where the Pope resides? 

Vatican

5

Who is this controversial businesswoman and former politician who grew up in a farm? 

Alice Guo

5

What does IYKYK stands for?

If you know, you know