ISC

Area III: SOC Engagements

88 questions across 5 exams

All questions (88)

Q30Medium1 mark·CPA ISC Practice Exam

A CPA is engaged to perform a SOC 1® engagement. Which of the following best describes the subject matter of this engagement?

Worked answer available with free account
View question →
Q31Hard1 mark·CPA ISC Practice Exam

A service organization's system description includes controls performed by a subservice organization (e.g., a data center). The service auditor decides to use the 'carve-out' method. What does this imply for the service auditor's report?

Worked answer available with free account
View question →
Q32Medium1 mark·CPA ISC Practice Exam

In a SOC 2® engagement, which of the following Trust Services Criteria is MANDATORY for every report?

Worked answer available with free account
View question →
Q33Hard1 mark·CPA ISC Practice Exam

A service auditor is issuing a SOC 2® Type II report. Testing identified that a key control for revoking terminated user access failed in 5 out of 25 instances sampled. The failure resulted in terminated employees retaining access for up to 2 weeks. What type of opinion should the auditor likely issue?

Worked answer available with free account
View question →
Q34Medium1 mark·CPA ISC Practice Exam

What is the primary difference between a SOC 2® Type I and a SOC 2® Type II report?

Worked answer available with free account
View question →
Q35Medium1 mark·CPA ISC Practice Exam

Which of the following is an example of a 'Complementary User Entity Control' (CUEC) that might be listed in a payroll service provider's SOC 1® report?

Worked answer available with free account
View question →
Q36Hard1 mark·CPA ISC Practice Exam

An auditor is testing a control that requires 'Quarterly access reviews'. The auditor selects a sample of one review from the year. Is this sample size appropriate?

Worked answer available with free account
View question →
Q44Medium1 mark·CPA ISC Practice Exam

A service organization provides a cloud-based data warehouse. A user entity auditor wants to know if the data in the warehouse is accurate and complete. Which Trust Services Criteria category is MOST relevant?

Worked answer available with free account
View question →
Q48Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing the 'Management's Assertion' in a SOC 2® report. Which of the following statements must be included in the assertion?

Worked answer available with free account
View question →
Q50Hard1 mark·CPA ISC Practice Exam

An auditor is testing the 'Termination' process. They sample 10 employees who left the company. For one employee, the Active Directory account was disabled 3 days after their departure date. The policy states 'within 24 hours'. What is the auditor's next step?

Worked answer available with free account
View question →
Q56Hard1 mark·CPA ISC Practice Exam

A service organization's management refuses to provide a written assertion for a SOC 2® engagement. What action must the auditor take?

Worked answer available with free account
View question →
Q63Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing the 'System Description' for a SOC 2® report. The description lists 'Google Cloud Platform' as a subservice organization. The auditor notes that the description does NOT include the specific controls performed by Google. This indicates:

Worked answer available with free account
View question →
Q65Hard1 mark·CPA ISC Practice Exam

An auditor is testing the 'Accuracy' of a report generated by an IT system. They trace a sample of items from the report back to the source documents (invoices). This test primarily provides evidence for:

Worked answer available with free account
View question →
Q68Medium1 mark·CPA ISC Practice Exam

An auditor is evaluating the 'Independence' of the personnel performing a SOC 2® engagement. Which of the following would impair independence?

Worked answer available with free account
View question →
Q72Medium1 mark·CPA ISC Practice Exam

A service organization has a control that states: 'Firewall rules are reviewed semi-annually.' The auditor tests this by requesting the minutes of the review meetings. The client provides minutes for a meeting in January and a meeting in July. Is this sufficient evidence for a Type II report covering Jan 1 to Dec 31?

Worked answer available with free account
View question →
Q73Hard1 mark·CPA ISC Practice Exam

Which of the following is a 'Substantive Procedure' in an IT audit context?

Worked answer available with free account
View question →
Q76Hard1 mark·CPA ISC Practice Exam

An auditor is reviewing the 'System Description' and notices it mentions 'The system is protected by a firewall'. However, the firewall is managed by a third-party MSP (Managed Service Provider) and is not included in the scope of the report (carve-out). What is the impact on the user entity?

Worked answer available with free account
View question →
Q77Medium1 mark·CPA ISC Practice Exam

Which of the following is a 'Privacy' control (as opposed to Security) in a SOC 2® engagement?

Worked answer available with free account
View question →
Q81Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing the 'System Description' for a SOC 2® report. The description includes a flowchart of the order processing system. The auditor notices a step in the flowchart where 'Orders > $5000 require Manager Approval'. During the walkthrough, the auditor observes that the system actually requires approval for orders > $10,000. What is the auditor's conclusion?

Worked answer available with free account
View question →
Q07Medium1 mark·CPA ISC Practice Exam 2

A service auditor is engaged to perform a SOC 2® examination. The client requests that the report focus solely on the security of the system and not on availability, processing integrity, confidentiality, or privacy. Is this permissible?

Worked answer available with free account
View question →
Q08Medium1 mark·CPA ISC Practice Exam 2

In a SOC 2® engagement, management asserts that they use a subservice organization for data center hosting. Management's description of the system excludes the controls performed by the data center. Which method of reporting is being used?

Worked answer available with free account
View question →

An auditor is testing a control that states: 'All new employees must undergo background checks.' The auditor selects a sample of 25 new hires. 24 have documented background checks, but 1 file is missing the documentation. The HR manager states the check was done but the file was lost. What is the appropriate conclusion?

Worked answer available with free account
View question →

A service organization's management refuses to provide a written assertion for a SOC 2® engagement. What action should the service auditor take?

Worked answer available with free account
View question →
Q19Medium1 mark·CPA ISC Practice Exam 2

Which of the following is a key difference between SOC 1® and SOC 2® engagements?

Worked answer available with free account
View question →
Q23Medium1 mark·CPA ISC Practice Exam 2

In a SOC 2® report, which opinion type is issued when the auditor concludes that controls were not suitably designed or operating effectively to achieve the control objectives?

Worked answer available with free account
View question →
Q28Medium1 mark·CPA ISC Practice Exam 2

What is the primary purpose of a 'Walkthrough' in an IT audit?

Worked answer available with free account
View question →
Q32Medium1 mark·CPA ISC Practice Exam 2

A service organization provides a SOC 2® Type II report covering the period January 1 to December 31. A significant control failure occurred on December 28 and was corrected on January 2. How should this be reflected in the report?

Worked answer available with free account
View question →
Q34Medium1 mark·CPA ISC Practice Exam 2

An auditor is evaluating the 'Processing Integrity' criterion in a SOC 2® engagement. Which of the following is a key requirement?

Worked answer available with free account
View question →
Q40Medium1 mark·CPA ISC Practice Exam 2

In a SOC 2® engagement, what are 'Complementary User Entity Controls' (CUECs)?

Worked answer available with free account
View question →
Q42Medium1 mark·CPA ISC Practice Exam 2

An auditor is testing the 'Logical Access' domain. They find that a terminated employee's account remained active for 3 weeks after departure. The policy requires removal within 24 hours. This is an example of:

Worked answer available with free account
View question →
Q46Medium1 mark·CPA ISC Practice Exam 2

What is the primary difference between a 'Type I' and 'Type II' SOC report?

Worked answer available with free account
View question →

In a SOC 2® engagement, the 'System Description' is primarily the responsibility of:

Worked answer available with free account
View question →

Which document in a SOC engagement outlines the auditor's opinion, the scope of the engagement, and the responsibilities of management and the auditor?

Worked answer available with free account
View question →
Q65Medium1 mark·CPA ISC Practice Exam 2

A service organization uses a 'Bridge Letter' (Gap Letter). What is its purpose?

Worked answer available with free account
View question →
Q73Medium1 mark·CPA ISC Practice Exam 2

Which of the following is a requirement of the 'Privacy' Trust Services Criterion?

Worked answer available with free account
View question →

In a SOC 2® engagement, if the service organization uses the 'Inclusive Method' for a subservice organization, what is the auditor's responsibility?

Worked answer available with free account
View question →

A service organization is undergoing a SOC 2® Type II engagement. The auditor finds that for a sample of 25 new hires, 2 did not complete the required security awareness training within 30 days of hire as mandated by company policy. The control description states: 'All new hires complete security training within 30 days.' What is the MOST appropriate conclusion?

Worked answer available with free account
View question →
Q10Medium1 mark·CPA ISC Practice Exam 3

Which of the following scenarios BEST describes a 'Carve-out' method in a SOC 2® report involving a subservice organization?

Worked answer available with free account
View question →

A CPA is performing a SOC 2® engagement. The service organization uses a third-party data center for physical hosting. The service organization's management asserts that physical security is the responsibility of the data center and excludes it from their system description. Which reporting method is being used?

Worked answer available with free account
View question →
Q16Medium1 mark·CPA ISC Practice Exam 3

Which of the following is a 'Complementary User Entity Control' (CUEC) likely to be found in a payroll service provider's SOC 1® report?

Worked answer available with free account
View question →
Q20Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing a SOC 2® report and notices the opinion is 'Qualified'. What does this indicate?

Worked answer available with free account
View question →

In a SOC 2® engagement, which Trust Services Criteria category is MANDATORY for every report?

Worked answer available with free account
View question →
Q35Medium1 mark·CPA ISC Practice Exam 3

A service organization provides a cloud-based accounting platform. They want to assure their customers that the system is available and confidential. However, they do not want to reveal the detailed results of their control testing to the general public. Which report is MOST appropriate?

Worked answer available with free account
View question →

A company is using the 'Inclusive Method' for a subservice organization in their SOC 2® report. What does this imply for the service auditor?

Worked answer available with free account
View question →
Q47Medium1 mark·CPA ISC Practice Exam 3

What is the primary purpose of a 'Management Assertion' in a SOC engagement?

Worked answer available with free account
View question →
Q59Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing a SOC 2® Type II report. The testing period covers January 1 to December 31. The auditor notices that a significant control failure occurred on December 28 and was not remediated by year-end. How should this be handled?

Worked answer available with free account
View question →
Q63Medium1 mark·CPA ISC Practice Exam 3

Which of the following is a 'Type 1' SOC report?

Worked answer available with free account
View question →

An auditor is assessing 'Independence' for a SOC engagement. Which of the following would impair independence?

Worked answer available with free account
View question →
Q76Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing the 'System Description' in a SOC 2® report. Which of the following MUST be included?

Worked answer available with free account
View question →
Q80Medium1 mark·CPA ISC Practice Exam 3

Which of the following is a 'Subsequent Event' in a SOC engagement?

Worked answer available with free account
View question →

An auditor is reviewing the 'System Boundaries' in a SOC 2® engagement. The client has excluded their 'Customer Support Chatbot' from the system description. The chatbot collects customer names and account numbers. Is this exclusion appropriate?

Worked answer available with free account
View question →

A service organization is preparing for a SOC 2® engagement. They have identified a risk that unauthorized changes to the production database could result in data integrity issues. Which of the following is a 'preventive' control addressing this risk?

Worked answer available with free account
View question →

During a SOC 2® Type II engagement, the auditor discovers that for a sample of 25 new hires, 2 did not complete the required security awareness training within 30 days of hire as mandated by company policy. What is the most appropriate next step for the auditor?

Worked answer available with free account
View question →

A service organization uses the 'Carve-out' method for a subservice organization that provides data center hosting. In the SOC 2® report, how are the controls of the data center presented?

Worked answer available with free account
View question →

Which of the following best describes the primary purpose of a SOC 3® report compared to a SOC 2® report?

Worked answer available with free account
View question →

In the context of a SOC 2® engagement, what is the definition of a 'deviation'?

Worked answer available with free account
View question →

An auditor is reviewing the 'System Description' for a SOC 2® report. Which of the following is a REQUIRED element of the system description?

Worked answer available with free account
View question →

A service organization provides payroll processing services. They outsource the printing and mailing of checks to a third-party vendor. In the context of the service organization's SOC 1® report, what is the printing vendor considered?

Worked answer available with free account
View question →

A company is using a 'SaaS' CRM application. The auditor wants to verify that the SaaS provider backs up the data. Since the auditor cannot physically visit the SaaS provider, what is the most appropriate evidence to obtain?

Worked answer available with free account
View question →

In a SOC 2® engagement, which of the following is a 'Trust Services Criterion' related to Privacy?

Worked answer available with free account
View question →

What is the primary difference between a SOC 2® Type I and a SOC 2® Type II report?

Worked answer available with free account
View question →

Which of the following is a 'Management Assertion' required in a SOC 2® report?

Worked answer available with free account
View question →

An auditor is reviewing the 'System Boundaries' in a SOC 2® engagement. Which of the following should be included in the system boundary definition?

Worked answer available with free account
View question →

Which of the following is a 'Risk Response' strategy where the company decides to stop the activity that causes the risk?

Worked answer available with free account
View question →

In a SOC 2® report, if the service auditor identifies a material weakness in the design of controls, what type of opinion should be issued?

Worked answer available with free account
View question →

An auditor is reviewing the 'Complementary User Entity Controls' (CUECs) in a SOC 2® report. Who is responsible for implementing these controls?

Worked answer available with free account
View question →

A service organization's management refuses to provide a written assertion for a SOC 2® engagement. What should the service auditor do?

Worked answer available with free account
View question →

Which of the following is a 'Subsequent Event' in a SOC 2® engagement?

Worked answer available with free account
View question →
Q63Medium1 mark·CPA ISC Practice Exam 5

A service organization's clients need assurance regarding the controls over financial reporting. Which SOC report is most appropriate?

Worked answer available with free account
View question →

Which of the following is NOT one of the five Trust Services Criteria categories used in SOC 2 engagements?

Worked answer available with free account
View question →
Q65Medium1 mark·CPA ISC Practice Exam 5

A service organization wants a report to display on their website for potential customers to prove they are secure. The report should not contain sensitive technical details. Which report should they choose?

Worked answer available with free account
View question →
Q66Medium1 mark·CPA ISC Practice Exam 5

What is the primary difference between a Type I and a Type II SOC report?

Worked answer available with free account
View question →
Q67Medium1 mark·CPA ISC Practice Exam 5

In a SOC 2 engagement, which criteria is MANDATORY for every report?

Worked answer available with free account
View question →

A service organization uses a subservice organization for data center hosting. The service organization's auditor decides to use the 'Carve-Out' method. What does this mean for the report?

Worked answer available with free account
View question →

When using the 'Inclusive' method for a subservice organization, what is the service auditor's responsibility?

Worked answer available with free account
View question →
Q70Medium1 mark·CPA ISC Practice Exam 5

What are 'Complementary User Entity Controls' (CUECs)?

Worked answer available with free account
View question →

In planning a SOC 2 engagement, the auditor must assess 'Materiality'. How is materiality typically viewed in a SOC 2 compared to a financial audit?

Worked answer available with free account
View question →
Q72Medium1 mark·CPA ISC Practice Exam 5

Which section of a SOC 2 report contains the Management's Assertion?

Worked answer available with free account
View question →

During a SOC 2 Type II engagement, an auditor finds that a daily backup failed 3 times out of 365 days. The backups were successfully retried the next day. How should the auditor handle this?

Worked answer available with free account
View question →
Q74Medium1 mark·CPA ISC Practice Exam 5

Which testing procedure provides the highest level of assurance for operating effectiveness?

Worked answer available with free account
View question →

An auditor is testing a control that states 'All new hires must undergo a background check'. The auditor selects a sample of 25 new hires and finds 2 missing background checks. What is the deviation rate?

Worked answer available with free account
View question →
Q76Medium1 mark·CPA ISC Practice Exam 5

In a SOC engagement, what is the purpose of the 'System Description'?

Worked answer available with free account
View question →

If an auditor discovers a 'Subsequent Event' (after the period end but before the report date) that significantly affects the system's security, what should they do?

Worked answer available with free account
View question →
Q78Medium1 mark·CPA ISC Practice Exam 5

Which opinion type is issued when the system description is fairly presented and controls are effective, EXCEPT for one or more significant deficiencies?

Worked answer available with free account
View question →
Q79Medium1 mark·CPA ISC Practice Exam 5

What constitutes an 'Adverse Opinion' in a SOC report?

Worked answer available with free account
View question →

In a SOC 2 report, where would a user find the auditor's detailed tests and the results of those tests?

Worked answer available with free account
View question →

A service organization refuses to provide a written assertion (Section II). What must the auditor do?

Worked answer available with free account
View question →
Q82Medium1 mark·CPA ISC Practice Exam 5

Which of the following statements is TRUE regarding the use of a SOC 2 report?

Worked answer available with free account
View question →

Practice these questions with detailed guidance

Full answers, grading, and explanations on why each answer is correct.