Exam 12: Monitoring and Auditing AIS
Exam 1: Accounting Information Systems and Firm Value62 Questions
Exam 2: Accountants As Business Analysts43 Questions
Exam 3: Data Modeling45 Questions
Exam 4: Relational Databases and Enterprise Systems48 Questions
Exam 5: Sales and Collections Business Process25 Questions
Exam 6: Purchases and Payments Business Process15 Questions
Exam 7: Conversion Business Process18 Questions
Exam 9: Reporting Processes and Extensible Business Reporting Language XBRL50 Questions
Exam 10: Accounting Information Systems and Internal Controls57 Questions
Exam 11: Information Security and Computer Fraud47 Questions
Exam 12: Monitoring and Auditing AIS48 Questions
Exam 13: The Balanced Scorecard and Business Value of Information Technology27 Questions
Exam 14: Evaluating AIS Investments25 Questions
Exam 15: The Systems Development Life Cycle and Project Management: Addressing the Challenges of Building Ais Systems45 Questions
Select questions type
Which of the following is not a benefit of using wireless technology?
(Multiple Choice)
4.8/5
(39)
Parallel simulation uses an independent program to simulate a part of an existing application program,and is designed to test the validity and to verify the accuracy of an existing application program.
(True/False)
4.7/5
(33)
Integrated test facility (ITF)is an automated technique that enables test data to be continually evaluated during the normal operation of a system.
(True/False)
4.7/5
(35)
What are the two approaches of CAATs in auditing systems? What are the differences between them?
(Essay)
4.8/5
(36)
Discuss five significant barriers that are often encountered in implementing continuous auditing?
(Essay)
4.8/5
(32)
Which of the following statements about firewalls is wrong?
(Multiple Choice)
4.9/5
(34)
Which of the following is not a management control for wireless networks?
(Multiple Choice)
4.7/5
(26)
Which of the statements regarding the data warehouse is incorrect?
(Multiple Choice)
4.9/5
(30)
Which of the following strategies will a CPA most likely consider in auditing an entity that processes most of its financial data only in electronic form,such as a paperless system?
(Multiple Choice)
5.0/5
(35)
A wireless network is comprised access points and stations.Access points logically connect stations to a firm's network.
(True/False)
4.8/5
(36)
Common IT techniques that are needed to implement continuous auditing include
(Multiple Choice)
4.8/5
(35)
Which of the following statements about switches is correct?
(Multiple Choice)
5.0/5
(33)
What are the general security objectives for both wired LANs and wireless LANs?
(Essay)
4.7/5
(42)
Firewalls are security systems comprised of hardware and software that is built using routers,servers,and a variety of software.
(True/False)
4.8/5
(38)
The data in a data warehouse are updated when transactions are processed.
(True/False)
4.8/5
(48)
The Generally Accepted Auditing Standards (GAAS)issued by PCAOB provide guidelines for conducting an IS/IT audit.
(True/False)
4.9/5
(35)
Which of the following statements regarding the purposes of an operating system is correct?
(Multiple Choice)
4.9/5
(32)
Which of the following is not an approach used for the online analytical processing (OLAP).
(Multiple Choice)
4.8/5
(43)
Showing 21 - 40 of 48
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)