Exam 4: Internal Control, Control Risk, Section 404 Audits, Fraud Auditing, and the Impact of Information Technology on the Audit Process

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

As part of designing and performing procedures to address management override of controls, auditors must perform which of the following procedures? As part of designing and performing procedures to address management override of controls, auditors must perform which of the following procedures?

(Short Answer)
4.9/5
(43)

Which of the following is correct?

(Multiple Choice)
4.8/5
(34)

When management is evaluating the design of internal control, management evaluates whether the control can do which of the following? When management is evaluating the design of internal control, management evaluates whether the control can do which of the following?

(Short Answer)
4.8/5
(36)

To be effective, an internal audit department must be independent of:

(Multiple Choice)
4.8/5
(39)

Which of the following is not one of the levels of an absence of internal controls?

(Multiple Choice)
4.7/5
(39)

Which of the following is not a likely procedure to support the operating effectiveness of internal controls?

(Multiple Choice)
4.9/5
(30)

What types of reports may be issued by a service organization auditor? Which of these is likely to be used by an auditor performing an audit of a public company?

(Essay)
4.9/5
(38)

Why do businesses use networks? Describe a local area network and a wide area network.

(Essay)
4.8/5
(48)

During a financial statement audit of a private company, three steps must be completed by the auditor before concluding that control risk is low. What are these steps?

(Essay)
4.7/5
(47)

When the auditor decides to 'audit around the computer,' there is no need to test the client's IT controls or obtain an understanding of the client's internal controls related to the IT system.

(True/False)
4.9/5
(36)

Discuss the circumstances that must exist for the auditor to 'audit around the computer.

(Essay)
4.8/5
(43)

Which of the following non- verbal cues is a sign of stress?

(Multiple Choice)
4.8/5
(34)

This type of inquiry often elicits 'yes' or 'no' responses to the auditor's questions.

(Multiple Choice)
4.9/5
(37)

ISA 230 requires auditors to document which of the following matters related to the auditor's consideration of material misstatements due to fraud?

(Multiple Choice)
4.8/5
(35)

Which of the following is not an example of an applications control?

(Multiple Choice)
4.7/5
(46)

After fraud risks are identified and documented, the auditor should evaluate factors that ________ fraud risk before developing an appropriate response to the risk of fraud.

(Multiple Choice)
4.7/5
(37)

One significant risk related to an automated environment is that auditors may ________ information provided by an information system.

(Multiple Choice)
4.8/5
(45)

Programmers should not have access to transaction data.

(True/False)
4.8/5
(36)

Which of the following is one of the conditions for fraud described in the fraud triangle? Which of the following is one of the conditions for fraud described in the fraud triangle?

(Short Answer)
4.9/5
(29)

As part of the brainstorming sessions, auditors are directed to emphasize: As part of the brainstorming sessions, auditors are directed to emphasize:

(Short Answer)
4.9/5
(38)
Showing 21 - 40 of 70
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)