Exam 8: Consideration of Internal Control in an Information Technology Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Consider the following computer applications: (1)At a catalog sales firm,as phone orders are entered into their computer,both inventory and credit are immediately checked. (2)A manufacturer's computer sends the coming week's production schedule and parts orders to a supplier's computer. Which statement below is true for these applications?

(Multiple Choice)
4.9/5
(40)

General controls over IT systems are typically tested using:

(Multiple Choice)
4.8/5
(35)

Passwords are designed primarily to prevent:

(Multiple Choice)
4.8/5
(37)

An auditor may decide not to perform tests of controls related to the control activities within the computer portion of the client's internal control.Which of the following would not be a valid reason for choosing to omit such test?

(Multiple Choice)
4.8/5
(31)

Auditing by testing the input and output of a computer system instead of the computer program itself will:

(Multiple Choice)
4.9/5
(38)

Encryption protection is least likely to be used in which of the following situations?

(Multiple Choice)
4.8/5
(35)

In the weekly computer run to prepare payroll checks,a check was printed for an employee who had been terminated the previous week.Which of the following controls,if properly utilized,would have been most effective in preventing the error or ensuing its prompt detection?

(Multiple Choice)
4.8/5
(39)

The auditors are least likely to "audit around the computer" when:

(Multiple Choice)
4.8/5
(28)

A bank wants to reject erroneous account numbers to avoid invalid input.Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers.What technique is this?

(Multiple Choice)
4.9/5
(42)

Which of the following is a password security problem?

(Multiple Choice)
4.8/5
(33)

Generalized audit software is effective for substantive procedures,but not for tests of controls.

(True/False)
4.7/5
(51)

When a client's accounts payable computer system was relocated,the administrator provided support through an Internet connection to a server.Subsequently,the administrator left the company.No changes were made to the accounts payable system at that time.Which of the following situations represents the greatest security risk?

(Multiple Choice)
5.0/5
(25)

A limit test is a general computer control built into the software.

(True/False)
4.8/5
(35)

In a client/server environment,the "client" is most likely to be the:

(Multiple Choice)
4.9/5
(34)

Which of the following is likely to be of least importance to an auditor in considering the internal control in a company with computer processing?

(Multiple Choice)
4.8/5
(44)

A company's labor distribution report requires extensive corrections each month because of labor hours charged to inactive jobs.Which of the following data processing input controls appears to be missing?

(Multiple Choice)
4.7/5
(42)

Which of the following is an example of general computer control?

(Multiple Choice)
4.7/5
(37)

Which of the following constitutes a weakness in the internal control of a computer system?

(Multiple Choice)
4.9/5
(35)

Which of the following is not a problem associated with the use of test data for computer-audit purposes?

(Multiple Choice)
4.9/5
(38)

An example of an access control is a:

(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)