Exam 8: Consideration of Internal Control in an Information Technology Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The operating system is an example of system software.

(True/False)
4.7/5
(32)

The individual with whom an auditor would be most likely to discuss specific access controls within a client's relational database management system is the

(Multiple Choice)
4.8/5
(35)

Which of the following is not a distinctive characteristic of advanced IT systems?

(Multiple Choice)
4.9/5
(41)

A problem for a CPA associated with advanced IT systems is that:

(Multiple Choice)
4.9/5
(31)

Which of the following is most likely to include user group development and execution of certain computer applications?

(Multiple Choice)
4.8/5
(37)

A network security system that monitors and controls the incoming and outgoing network access and data based on predetermined security criteria is referred to as a

(Multiple Choice)
4.9/5
(35)

Substantive procedures that cannot be performed with generalized audit software include:

(Multiple Choice)
4.9/5
(39)

Various computing devices (e.g. ,desktops,laptops,tablets,phones)have resulted in a(n):

(Multiple Choice)
4.8/5
(35)

Which of the following would be least likely to be considered a desirable attribute of a database management system?

(Multiple Choice)
4.9/5
(31)

Authentication can only be achieved through passwords.

(True/False)
4.9/5
(31)

Decentralized data processing eliminates the need for data security.

(True/False)
4.9/5
(36)

When conducting fieldwork for a physical inventory,an auditor is least likely to perform which of the following steps using a generalized audit software package?

(Multiple Choice)
4.9/5
(31)

Which of the following computer related employees should not be allowed access to program listings of application programs?

(Multiple Choice)
4.9/5
(40)

Usernames,passwords,and identity cards are examples approaches to:

(Multiple Choice)
4.8/5
(36)

Which of the following personnel is responsible for determining the computer processing needs of the various users?

(Multiple Choice)
4.9/5
(34)

End user computing is most likely to occur on which of the following types of computers?

(Multiple Choice)
4.8/5
(31)

The capability for computers to communicate with various electronic devices is an important feature in the design of modern business information systems.Which of the following risks associated with the use of telecommunications systems is minimized through the use of a password control system?

(Multiple Choice)
4.9/5
(42)

Auditors are now faced with examining clients that have database systems. a.Describe a database system,including its major advantage. b.Identify policies and procedures that may be established to provide control over that aspect of a database system.

(Essay)
4.8/5
(39)

Many auditors use generalized audit software to assist them in the examination of clients' computer records. a.Describe what is meant by generalized audit software. b.List two advantages of the use of generalized audit software. c.List three functions that may be performed with this type of software.

(Essay)
4.8/5
(34)

The completeness of computer generated sales figures can be tested by comparing the number of items listed on the daily sales report with the number of items billed on the actual invoices.This process uses:

(Multiple Choice)
4.7/5
(42)
Showing 21 - 40 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)