Exam 17: IT Controls : Systems Development Program Changes and Application Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling)include all of the following actions by a computer criminal except

(Multiple Choice)
4.9/5
(39)

What are the three categories of processing control?

(Essay)
4.8/5
(42)

Describe and contrast the test data method with the integrated test facility.

(Essay)
4.7/5
(30)

Routine maintenance activities require all of the following controls except

(Multiple Choice)
4.9/5
(32)

What is meant by auditing around the computer versus auditing through the computer? Why is this so important?

(Essay)
4.7/5
(33)

The user test and acceptance procedure is the last point at which the user can determine the system's acceptability prior to it going into service.

(True/False)
5.0/5
(42)

When auditors do not rely on a detailed knowledge of the application's internal logic,they are performing

(Multiple Choice)
4.9/5
(36)

The black box approach to testing computer program controls is also known as auditing around the computer.

(True/False)
4.7/5
(38)

Which of the following is an example of input control test?

(Multiple Choice)
5.0/5
(42)

Which check is not an input control?

(Multiple Choice)
5.0/5
(35)

Name three types of transcription error.

(Essay)
4.8/5
(32)

Which of the following is not an input control?

(Multiple Choice)
4.8/5
(35)

After data is entered into the system,it is processed.Processing control exists to make sure that the correct things happen during processing.Discuss processing controls.

(Essay)
4.7/5
(41)

What are the audit's objectives relating to systems development?

(Essay)
4.9/5
(45)

When the auditor reconciles the program version numbers,which audit objective is being tested?

(Multiple Choice)
4.9/5
(38)

When analyzing the results of the test data method,the auditor would spend the least amount of time reviewing

(Multiple Choice)
4.8/5
(38)

Achieving batch control objectives requires grouping similar types of input transactions (such as sales orders)together in batches and then controlling the batches throughout data processing.

(True/False)
4.8/5
(44)

Programs in their compiled state are very susceptible to the threat of unauthorized modification.

(True/False)
4.9/5
(43)

Describe two types of transposition error

(Essay)
4.8/5
(32)

The programmer's authority table will specify the libraries a programmer may access.

(True/False)
4.8/5
(43)
Showing 41 - 60 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)