Exam 8: Consideration of Internal Control in an Information Technology Environment
Exam 1: The Role of the Public Accountant in the American Economy56 Questions
Exam 2: Professional Standards69 Questions
Exam 3: Professional Ethics76 Questions
Exam 4: Legal Liability of Cpas61 Questions
Exam 5: Audit Evidence and Documentation92 Questions
Exam 6: Audit Planning, understanding the Client, assessing Risks, and Responding84 Questions
Exam 7: Internal Control97 Questions
Exam 8: Consideration of Internal Control in an Information Technology Environment76 Questions
Exam 9: Audit Sampling91 Questions
Exam 10: Cash and Financial Investments69 Questions
Exam 11: Accounts Receivable, notes Receivable, and Revenue73 Questions
Exam 12: Inventories and Cost of Goods Sold64 Questions
Exam 13: Property,plant,and Equipment: Depreciation and Depletion46 Questions
Exam 14: Accounts Payable and Other Liabilities57 Questions
Exam 15: Debt and Equity Capital45 Questions
Exam 16: Auditing Operations and Completing the Audit83 Questions
Exam 17: Auditors Reports73 Questions
Exam 18: Integrated Audits of Public Companies49 Questions
Exam 19: Additional Assurance Services: Historical Financial Information65 Questions
Exam 20: Additional Assurance Services: Other Information55 Questions
Exam 21: Internal, operational, and Compliance Auditing51 Questions
Select questions type
Data encryption is an example of data communication control.
Free
(True/False)
4.9/5
(43)
Correct Answer:
True
Smith Corporation has numerous customers.Customer files are kept on disk storage.Each account in the customer file contains name,address,credit limit,and account balance.The auditor wishes to test these files to determine whether credit limits are being exceeded.The best procedure for the auditor to follow would be to:
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
B
Which of the following is not programmed as a processing control?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
A
Which of the following testing techniques minimizes the possibility that the auditors will contaminate a client's financial records?
(Multiple Choice)
4.8/5
(36)
Auditors usually begin their consideration of IT systems with tests of application controls.
(True/False)
4.9/5
(42)
An audit client outsources portions of its IT system to a cloud service provider.Which type of report would a report on management's description of the service organizations system and operating effectiveness of controls?
(Multiple Choice)
4.8/5
(40)
Which of the following components may not use a network as part of the information systems architecture?
(Multiple Choice)
4.8/5
(38)
Which of the following terms best describes a payroll system?
(Multiple Choice)
4.9/5
(29)
Which of the following is leastlikely to be a general control over computer activities?
(Multiple Choice)
4.8/5
(41)
State whether each of the following statements is correct or incorrect.
A. Specialists with specialized skills in IT processing are seldom used on audits since each audit team member is expected to have the necessary skills. B. The nature of the IT-based system may affect the specific procedures employed by the auditors in testing the controls. C. Computer assisted audit techniques, while help ful for tests of controls, are seldom help ful for substantive procedures. D. DEA and ACL are examples of computer assisted audit techniques.
(Short Answer)
4.9/5
(39)
A fast-growing service company is developing its information technology internally.What is the first step in the company's systems development life cycle?
(Multiple Choice)
4.8/5
(42)
Software that is designed to disable or damage computer systems or data is referred to as:
(Multiple Choice)
4.8/5
(45)
Which of the following would not generally be considered a program control?
(Multiple Choice)
4.8/5
(33)
Which of the following testing techniques is more commonly used by internal auditors than by independent auditors?
(Multiple Choice)
4.9/5
(28)
A system in which each department member is responsible for the development and execution of the computer application that he or she uses is referred to as:
(Multiple Choice)
4.8/5
(38)
Which of the following procedures would an entity most likely include in its disaster recovery plan?
(Multiple Choice)
4.9/5
(34)
Which of the following personnel is responsible for the proper functioning of the security features built into the operating system?
(Multiple Choice)
4.8/5
(41)
When erroneous data are detected by computer program controls,such data may be excluded from processing and printed on an exception report.The exception report should most probably be reviewed and followed up on by the:
(Multiple Choice)
4.7/5
(38)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)