Exam 8: Consideration of Internal Control in an Information Technology Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Data encryption is an example of data communication control.

Free
(True/False)
4.9/5
(43)
Correct Answer:
Verified

True

Smith Corporation has numerous customers.Customer files are kept on disk storage.Each account in the customer file contains name,address,credit limit,and account balance.The auditor wishes to test these files to determine whether credit limits are being exceeded.The best procedure for the auditor to follow would be to:

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

B

Which of the following is not programmed as a processing control?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

Which of the following testing techniques minimizes the possibility that the auditors will contaminate a client's financial records?

(Multiple Choice)
4.8/5
(36)

Most advanced computer systems do not have audit trails.

(True/False)
4.8/5
(44)

Auditors usually begin their consideration of IT systems with tests of application controls.

(True/False)
4.9/5
(42)

An audit client outsources portions of its IT system to a cloud service provider.Which type of report would a report on management's description of the service organizations system and operating effectiveness of controls?

(Multiple Choice)
4.8/5
(40)

Which of the following components may not use a network as part of the information systems architecture?

(Multiple Choice)
4.8/5
(38)

Which of the following terms best describes a payroll system?

(Multiple Choice)
4.9/5
(29)

Which of the following is leastlikely to be a general control over computer activities?

(Multiple Choice)
4.8/5
(41)

State whether each of the following statements is correct or incorrect. A. Specialists with specialized skills in IT processing are seldom used on audits since each audit team member is expected to have the necessary skills. B. The nature of the IT-based system may affect the specific procedures employed by the auditors in testing the controls. C. Computer assisted audit techniques, while help ful for tests of controls, are seldom help ful for substantive procedures. D. DEA and ACL are examples of computer assisted audit techniques.

(Short Answer)
4.9/5
(39)

A fast-growing service company is developing its information technology internally.What is the first step in the company's systems development life cycle?

(Multiple Choice)
4.8/5
(42)

Software that is designed to disable or damage computer systems or data is referred to as:

(Multiple Choice)
4.8/5
(45)

Which of the following would not generally be considered a program control?

(Multiple Choice)
4.8/5
(33)

A computer input control is designed to ensure that

(Multiple Choice)
5.0/5
(33)

Which of the following testing techniques is more commonly used by internal auditors than by independent auditors?

(Multiple Choice)
4.9/5
(28)

A system in which each department member is responsible for the development and execution of the computer application that he or she uses is referred to as:

(Multiple Choice)
4.8/5
(38)

Which of the following procedures would an entity most likely include in its disaster recovery plan?

(Multiple Choice)
4.9/5
(34)

Which of the following personnel is responsible for the proper functioning of the security features built into the operating system?

(Multiple Choice)
4.8/5
(41)

When erroneous data are detected by computer program controls,such data may be excluded from processing and printed on an exception report.The exception report should most probably be reviewed and followed up on by the:

(Multiple Choice)
4.7/5
(38)
Showing 1 - 20 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)