Exam 7: Computer Assisted Audit Tools and Techniques
Exam 1: Auditing and Internal Control100 Questions
Exam 2: Auditing IT Governance Controls91 Questions
Exam 3: Auditing Operating Systems and Networks105 Questions
Exam 4: Auditing Database Systems100 Questions
Exam 5: Systems Development and Program Change Activities94 Questions
Exam 6: Transaction Processing and Financial Reporting Systems Overview98 Questions
Exam 7: Computer Assisted Audit Tools and Techniques82 Questions
Exam 8: Data Structures and Caatts for Data Extraction81 Questions
Exam 9: Auditing the Revenue Cycle97 Questions
Exam 10: Auditing the Expenditure Cycle100 Questions
Exam 11: Enterprise Resource Planning Systems90 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection84 Questions
Select questions type
Name four input controls and describe what they test?
Free
(Essay)
4.7/5
(25)
Correct Answer:
1. numeric-alphabetic checks look for the correct type of character content in a field, numbers or letters;
2. limit checks verify that values are within preset limits;
3. range checks verify the values fall with in an acceptable range
4. reasonableness check determines if a value in one field, which has already passed a limit check and a range check, is reasonable when considered along with data in other fields of the record.
A salami fraud affects a large number of victims, but the harm to each appears to be very small.
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
Output controls ensure that output is not lost, misdirected, or corrupted and that privacy is not violated. What are some output exposures or situations where output is at risk?
Free
(Short Answer)
4.9/5
(36)
Correct Answer:
output spooling, delayed printing, waste, report distribution
Which of the following does not influence the length of time a hard copy report is retained?
(Multiple Choice)
4.7/5
(34)
Which input control check would detect a posting to the wrong customer account?
(Multiple Choice)
4.7/5
(42)
Which statement is not correct? The audit trail in a computerized environment
(Multiple Choice)
4.8/5
(27)
Methods used to maintain an audit trail in a computerized environment include all of the following except
(Multiple Choice)
4.8/5
(44)
Tracing is a method used to verify the logical operations executed by a computer application.
(True/False)
4.9/5
(36)
In a computerized environment, all input controls are implemented after data is input.
(True/False)
4.9/5
(48)
Contrast the black box approach to IT auditing and the white box approach. Which is preferred?
(Essay)
5.0/5
(37)
The firm allows no more than 10 hours of overtime a week. An employee entered "15" in the field. Which control will detect this error?
(Short Answer)
4.9/5
(44)
The black box approach to testing computer applications require a detailed knowledge of the the program logic being tested.
(True/False)
4.7/5
(38)
A __________________________ fraud affects a large number of victims but the harm to each appears to be very small.
(Short Answer)
4.9/5
(31)
Use of the integrated test facility poses no threat to organizational data files.
(True/False)
4.7/5
(41)
Which of the following is not an example of a processing control?
(Multiple Choice)
4.8/5
(37)
Input controls are intended to detect errors in transaction data after processing.
(True/False)
4.8/5
(33)
Showing 1 - 20 of 82
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)