Exam 17: IT Controls : Systems Development Program Changes and Application Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which input control check would detect a posting to the wrong customer account?

(Multiple Choice)
4.8/5
(45)

Which statement is not true? Embedded audit modules

(Multiple Choice)
4.9/5
(32)

What is an embedded audit module?

(Essay)
4.7/5
(42)

Which statement is not correct? The audit trail in a computerized environment

(Multiple Choice)
4.9/5
(33)

A __________________________ fraud affects a large number of victims but the harm to each appears to be very small.

(Short Answer)
4.8/5
(36)

What is the purpose of the auditor's review of SDLC documentation?

(Essay)
4.9/5
(37)

A salami fraud affects a large number of victims,but the harm to each appears to be very small.

(True/False)
4.8/5
(38)

Generalized audit software packages are used to assist the auditor in performing substantive tests.

(True/False)
4.9/5
(44)

Methods used to maintain an audit trail in a computerized environment include all of the following except

(Multiple Choice)
4.8/5
(41)

A run-to-run control is an example of an output control.

(True/False)
4.8/5
(40)

Which control is not associated with new systems development activities?

(Multiple Choice)
4.9/5
(39)

An example of a hash total is

(Multiple Choice)
4.9/5
(48)

The base case system evaluation is a variation of the test data method.

(True/False)
4.9/5
(33)

All of the following concepts are associated with the black box approach to auditing computer applications except

(Multiple Choice)
4.8/5
(34)

In a computerized environment,all input controls are implemented after data is input.

(True/False)
4.8/5
(32)

The presence of an audit trail is critical to the integrity of the accounting information system.Discuss three of the techniques used to preserve the audit trail.

(Essay)
4.9/5
(30)

Which statement is correct?

(Multiple Choice)
4.9/5
(46)

How does privacy relate to output control?

(Essay)
4.9/5
(36)

Input controls include all of the following except

(Multiple Choice)
4.8/5
(40)

Source program library controls should prevent and detect unauthorized access to application programs.

(True/False)
4.7/5
(36)
Showing 21 - 40 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)