Exam 8: Consideration of Internal Control in an Information Technology Environment
Exam 1: The Role of the Public Accountant in the American Economy56 Questions
Exam 2: Professional Standards69 Questions
Exam 3: Professional Ethics76 Questions
Exam 4: Legal Liability of Cpas61 Questions
Exam 5: Audit Evidence and Documentation92 Questions
Exam 6: Audit Planning, understanding the Client, assessing Risks, and Responding84 Questions
Exam 7: Internal Control97 Questions
Exam 8: Consideration of Internal Control in an Information Technology Environment76 Questions
Exam 9: Audit Sampling91 Questions
Exam 10: Cash and Financial Investments69 Questions
Exam 11: Accounts Receivable, notes Receivable, and Revenue73 Questions
Exam 12: Inventories and Cost of Goods Sold64 Questions
Exam 13: Property,plant,and Equipment: Depreciation and Depletion46 Questions
Exam 14: Accounts Payable and Other Liabilities57 Questions
Exam 15: Debt and Equity Capital45 Questions
Exam 16: Auditing Operations and Completing the Audit83 Questions
Exam 17: Auditors Reports73 Questions
Exam 18: Integrated Audits of Public Companies49 Questions
Exam 19: Additional Assurance Services: Historical Financial Information65 Questions
Exam 20: Additional Assurance Services: Other Information55 Questions
Exam 21: Internal, operational, and Compliance Auditing51 Questions
Select questions type
If a control total were to be computed on each of the following data items,which would best be identified as a hash total for a payroll computer application?
(Multiple Choice)
4.7/5
(36)
Entities doing business on the Internet generally use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:
(Multiple Choice)
4.9/5
(29)
Because log-on procedures may be cumbersome and tedious,users often store log-on sequences in their personal computers and invoke them when they want to use mainframe facilities.A risk of this practice is that
(Multiple Choice)
4.8/5
(34)
When designing the physical layout of a data processing center,which of the following would be least likely to be a necessary control that is considered?
(Multiple Choice)
4.9/5
(29)
For good internal control,programmers should not be given access to program documentation for the programs they work on.
(True/False)
4.8/5
(35)
Which of the following employees normally would be assigned the operating responsibility for designing the information system?
(Multiple Choice)
4.9/5
(39)
Which of the following is not a data communication control?
(Multiple Choice)
4.9/5
(34)
An auditor anticipates assessing control risk at a low level in a computerized environment.Under these circumstances,on which of the following controls would the auditor initially focus?
(Multiple Choice)
4.7/5
(39)
A system in which hardware and software are notonly linked together,but are also very dependent upon each other is referred to as:
(Multiple Choice)
4.9/5
(37)
In their consideration of a client's IT controls,the auditors will encounter general controls and application controls.Which of the following is an application control?
(Multiple Choice)
4.8/5
(32)
The best method of achieving internal control over advanced IT systems is through the use of:
(Multiple Choice)
4.9/5
(33)
Various characteristics of IT systems can present special audit risks.Explain each of the following characteristics of an IT system and the special audit risks that they present.
a.Database system.
b.Cloud Computing.
c.End user computing.
(Essay)
4.8/5
(37)
Which of the following statements presents an example of a general control for a computerized system?
(Multiple Choice)
4.8/5
(38)
A control feature in a computer application program that involves comparing a customer number to the customer database:
(Multiple Choice)
4.9/5
(44)
Generalized audit software may be used for substantive procedures or for tests of controls.
(True/False)
4.9/5
(30)
Showing 61 - 76 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)