Exam 8: Consideration of Internal Control in an Information Technology Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If a control total were to be computed on each of the following data items,which would best be identified as a hash total for a payroll computer application?

(Multiple Choice)
4.7/5
(36)

A data warehouse is an example of:

(Multiple Choice)
4.9/5
(35)

Entities doing business on the Internet generally use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:

(Multiple Choice)
4.9/5
(29)

Because log-on procedures may be cumbersome and tedious,users often store log-on sequences in their personal computers and invoke them when they want to use mainframe facilities.A risk of this practice is that

(Multiple Choice)
4.8/5
(34)

When designing the physical layout of a data processing center,which of the following would be least likely to be a necessary control that is considered?

(Multiple Choice)
4.9/5
(29)

For good internal control,programmers should not be given access to program documentation for the programs they work on.

(True/False)
4.8/5
(35)

Which of the following employees normally would be assigned the operating responsibility for designing the information system?

(Multiple Choice)
4.9/5
(39)

Which of the following is not a data communication control?

(Multiple Choice)
4.9/5
(34)

An auditor anticipates assessing control risk at a low level in a computerized environment.Under these circumstances,on which of the following controls would the auditor initially focus?

(Multiple Choice)
4.7/5
(39)

A system in which hardware and software are notonly linked together,but are also very dependent upon each other is referred to as:

(Multiple Choice)
4.9/5
(37)

In their consideration of a client's IT controls,the auditors will encounter general controls and application controls.Which of the following is an application control?

(Multiple Choice)
4.8/5
(32)

The best method of achieving internal control over advanced IT systems is through the use of:

(Multiple Choice)
4.9/5
(33)

Various characteristics of IT systems can present special audit risks.Explain each of the following characteristics of an IT system and the special audit risks that they present. a.Database system. b.Cloud Computing. c.End user computing.

(Essay)
4.8/5
(37)

Which of the following statements presents an example of a general control for a computerized system?

(Multiple Choice)
4.8/5
(38)

A control feature in a computer application program that involves comparing a customer number to the customer database:

(Multiple Choice)
4.9/5
(44)

Generalized audit software may be used for substantive procedures or for tests of controls.

(True/False)
4.9/5
(30)
Showing 61 - 76 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)