Exam 15: IT Controls : Sarbanes-Oxley and IT Governance
Exam 1: The Information System: An Accountant’s Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control119 Questions
Exam 4: The Revenue Cycle105 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures102 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures87 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: General Ledger, Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The REA Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems97 Questions
Exam 12: Electronic Commerce Systems102 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects93 Questions
Exam 15: IT Controls : Sarbanes-Oxley and IT Governance130 Questions
Exam 16: IT Controls : Security and Access96 Questions
Exam 17: IT Controls : Systems Development Program Changes and Application Controls96 Questions
Select questions type
What are commodity IT assets?
Free
(Essay)
4.8/5
(39)
Correct Answer:
Commodity IT assets are not unique to a particular organization and are thus easily acquired in the marketplace.These include such things as network management,systems operations,server maintenance,and help-desk functions.
To fulfill the segregation of duties control objective,computer processing functions (like authorization of credit and billing)are separated.
Free
(True/False)
4.8/5
(38)
Correct Answer:
False
Why should new systems development activities be segregated from the program change (maintenance)function.
Free
(Essay)
4.8/5
(41)
Correct Answer:
Combining these functions increases the potential for two problems: inadequate documentation and fraud.Inadequate systems documentation is a chronic IT problem and a significant challenge for many organizations seeking SOX compliance.The potential for fraud is increased when the original programmer of a system also has maintenance responsibility,.
Internal control in a computerized environment can be divided into two broad categories.What are they? Explain each.
(Essay)
4.8/5
(35)
Corporate management (including the CEO)must certify monthly and annually their organization's internal controls over financial reporting.
(True/False)
4.9/5
(33)
Both the SEC and the PCAOB require management to use the COBIT framework for assessing internal control adequacy.
(True/False)
4.8/5
(37)
Which of the following is NOT a requirement in management's report on the effectiveness of internal controls over financial reporting?
(Multiple Choice)
4.8/5
(40)
Describe how a Corporate Computer Services Function can overcome some of the problems associated with distributed data processing.
(Essay)
4.9/5
(31)
Which of the following is not an essential feature of a disaster recovery plan?
(Multiple Choice)
4.8/5
(38)
For disaster recovery purposes,what criteria are used to identify an application or data as critical?
(Essay)
4.8/5
(40)
Does a qualified opinion on management's assessment of internal controls over the financial reporting system necessitate a qualified opinion on the financial statements? Explain.
(Essay)
4.9/5
(37)
Systems development is separated from data processing activities because failure to do so
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 130
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)