Exam 7: Auditing Information Technology-Based Processes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An important requirement of CPA firms is that they must be ________ with regard to the company being audited.The requirement allows CPA firms to provide a completely unbiased opinion on the information it audits.

(Multiple Choice)
4.7/5
(38)

A type of assurance services that involves accumulating and analyzing support for the information provided by management is called an:

(Multiple Choice)
4.8/5
(44)

The independence of a CPA could be impaired by:

(Multiple Choice)
4.8/5
(30)

Which of the following describes a mathematical sum of data that is meaningless to the financial statements but useful for controlling the data and detecting possible missing items?

(Multiple Choice)
4.9/5
(43)

The IT auditing approach referred to as "auditing through the system" is necessary under which of the following conditions?

(Multiple Choice)
4.8/5
(42)

Which of the following terms in not associated with a financial statement auditor's requirement to maintain independence?

(Multiple Choice)
4.8/5
(24)

Accounting services that improve the quality of information provided to the decision maker, an audit being the most common type of this service, is called:

(Multiple Choice)
4.9/5
(42)

This type of audit is completed in order to determine whether a company has adhered to the regulations and policies established by contractual agreements, governmental agencies, or some other high authority.

(Multiple Choice)
4.8/5
(34)

This type of auditor conducts audits of government agencies or income tax returns.

(Multiple Choice)
4.9/5
(37)

During this phase of the audit, the auditor must gain a thorough understanding of the client's business and financial reporting systems.When completing this phase, the auditors review and assess the risks and controls related to the business.

(Multiple Choice)
4.9/5
(35)

Which of the following scenarios does NOT impair the independence of a CPA firm from its client?

(Multiple Choice)
4.8/5
(37)

This law, also known as the first-digit law, was named after a physicist who discovered a specific but non-uniform pattern in the frequency of digits occurring as the first number in a list of numbers:

(Multiple Choice)
4.8/5
(28)

Auditors may send text messages through a company's system to find out whether encryption of private information is occurring properly.In addition, special software programs are available to help auditors identify weak points in a company's security measures.These are examples of:

(Multiple Choice)
4.9/5
(26)

The ten standards that provide broad guidelines for an auditor's professional responsibilities are referred to as:

(Multiple Choice)
4.8/5
(43)

This type of audit is completed to determine whether or not the client has prepared and presented its financial statements fairly, in accordance with established financial accounting criteria.

(Multiple Choice)
4.9/5
(32)

A process of constant evidence gathering and analysis to provide assurance on the information as soon as it occurs or shortly thereafter is referred to as:

(Multiple Choice)
4.8/5
(38)

There are four primary phases of the IT audit.Which of the following is not one of those phases?

(Multiple Choice)
4.9/5
(33)

Which of the following audit procedures is most likely to be performed during the planning phase of the audit?

(Multiple Choice)
4.8/5
(42)

The audit practice of "auditing around the computer" is also referred to as:

(Multiple Choice)
4.9/5
(30)

Which of the following is a general control to test for external access to a client's computerized systems?

(Multiple Choice)
4.8/5
(47)
Showing 41 - 60 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)