Exam 10: The impact of information technology on the audit process
Exam 1: Demand for audit and assurance services74 Questions
Exam 2: Auditors’ legal environment89 Questions
Exam 3: Audit quality and ethics101 Questions
Exam 4: Audit responsibilities and objectives113 Questions
Exam 5: Audit evidence118 Questions
Exam 6: Audit planning and documentation105 Questions
Exam7: Materiality and risk105 Questions
Exam 8: Internal control and control risk119 Questions
Exam 9: Fraud auditing75 Questions
Exam 10: The impact of information technology on the audit process104 Questions
Exam 11: Overall audit plan and audit program105 Questions
Exam 12: Audit of the sales and collection cycle: Tests of controls and substantive tests of transactions120 Questions
Exam 13: Completing tests in the sales and collection cycle: Accounts receivable109 Questions
Exam 14: Audit sampling146 Questions
Exam 15: Audit of transaction cycles and financial statement balances I138 Questions
Exam 16: Audit of transaction cycles and financial statement balances II137 Questions
Exam 17: Completing the audit100 Questions
Exam 18: Audit reporting85 Questions
Exam 19: Other auditing and assurance engagements102 Questions
Select questions type
Auditing around the computer is acceptable if the auditor has access to sufficient source documents and a detailed listing of output in a readable form.
(True/False)
4.7/5
(36)
One common use of generalised audit software is to help the auditor identify weaknesses in the client's IT control procedures.
(True/False)
4.9/5
(33)
Discuss the advantages and benefits of using generalised audit software.
(Essay)
4.7/5
(42)
The use of 'encryption' techniques protects the security of electronic communication during the data:
(Multiple Choice)
4.8/5
(31)
Which of the following is a control that relates to all parts of the IT system?
(Multiple Choice)
4.8/5
(31)
Systems development, operations and data control, and librarianship are separated in an IT system.
(True/False)
4.9/5
(33)
Describe the method used to reduce unauthorised exposures by external parties in e-commerce systems.
(Essay)
4.7/5
(37)
Discuss the circumstances that may exist in a 'network environment' which may challenge traditional general CIS controls.
(Essay)
4.8/5
(39)
Companies decide whether to outsource IT based on auditor judgement.
(True/False)
4.8/5
(38)
The perceived importance of IT within an organisation is often dictated by the attitude of the audit committee.
(True/False)
4.8/5
(40)
Provide five examples of different IT environments the auditor may encounter.
(Essay)
4.8/5
(35)
When the auditor decides to audit around the computer, he or she is not required to test the client's IT controls.
(True/False)
4.8/5
(33)
Which of the following type of risks is mitigated by strong general controls?
(Multiple Choice)
4.9/5
(39)
When auditing a computerised system, an auditor may use the test data approach as an audit tool.This technique:
(Multiple Choice)
4.8/5
(38)
Data Corporation has just completely computerised its billing and accounts receivable record-keeping.Your firm has recently acquired IDEA software, and you want to make maximum use of the computer in your audit of Data Corporation.Which of the following audit techniques could NOT be performed using generalised audit software?
(Multiple Choice)
4.9/5
(37)
When the client uses a computer but the auditor chooses to use only the non-IT segment of internal control to assess control risk, it is referred to as 'auditing around the computer'.Which one of the following conditions need NOT be present in order to audit around the computer?
(Multiple Choice)
4.8/5
(36)
Showing 61 - 80 of 104
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)