Exam 12: Implications of Information Technology for the Audit Process

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Security controls should require that users enter a(n)________ before being allowed access to software and other related data files.

(Multiple Choice)
4.8/5
(33)

Typical controls developed for manual systems which are still important in IT systems include:

(Multiple Choice)
4.7/5
(35)

Programmers should be allowed access to:

(Multiple Choice)
4.8/5
(40)

"Auditing around the computer" is acceptable only if the auditor has access to the client's data in a machine-readable language.

(True/False)
4.8/5
(39)

Which of the following is not seen as an advantage to using generalized audit software (GAS)?

(Multiple Choice)
4.9/5
(35)

Parallel testing is used when old and new systems are operated simultaneously in all locations.

(True/False)
4.7/5
(35)

The objective of the computer audit technique known as the test data approach is to determine whether the client's computer programs can correctly process valid and invalid transactions.

(True/False)
4.9/5
(37)

Which of the following statements is correct?

(Multiple Choice)
4.9/5
(36)

Auditors should evaluate which of the following before evaluating application controls because of the potential for pervasive effects?

(Multiple Choice)
4.9/5
(29)

Which of the following is not a risk in an IT system?

(Multiple Choice)
4.7/5
(37)

"Auditing around the computer" is most appropriate when the client has not maintained detailed output or source documents in a form readable by humans.

(True/False)
4.9/5
(42)

Control risk may be reduced for a company with a complex IT system when compared to a company that relies primarily on manual controls.

(True/False)
4.9/5
(38)

In an IT system,automated equipment controls or hardware controls are designed to:

(Multiple Choice)
4.7/5
(46)

What tools do companies use to limit access to sensitive company data?

(Multiple Choice)
4.7/5
(33)

Controls that relate to a specific use of the IT system,such as the processing of sales or cash receipts,are called application controls.

(True/False)
4.7/5
(36)

Which of the following controls prevent and detect errors while transaction data are processed?

(Multiple Choice)
4.9/5
(28)

What are the two software testing strategies that companies typically use? Which strategy is more expensive?

(Essay)
4.9/5
(30)

General controls include all of the following except:

(Multiple Choice)
4.9/5
(33)

The continued integration of IT in accounting systems can impact a company by:

(Multiple Choice)
4.9/5
(36)

Identify the three categories of application controls,and give one example of each.

(Essay)
4.8/5
(34)
Showing 61 - 80 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)