Exam 20: Auditing in a Computerized Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not an appropriate statement with regard to computer control activities?

(Multiple Choice)
4.7/5
(36)

An example of a program in which the audit team would be most interested in testing automated application controls is a(n)

(Multiple Choice)
4.7/5
(37)

The evaluation of computer controls with simulated data processed through the client's computer programs is referred to as

(Multiple Choice)
4.9/5
(34)

The effectiveness of general controls is an important consideration for audit teams when assessing control risk on an audit.Which management assertions are primarily affected by general controls?

(Multiple Choice)
4.8/5
(42)

Computer operators should have complete access to programs and application documentation.

(True/False)
4.8/5
(32)

____________________________ techniques are special audit modules designed and coded into computer programs to allow audit teams to evaluate various stages of transaction processing.

(Short Answer)
4.8/5
(39)

Match each of the following program-embedded techniques (letters A-I)with a description of these techniques (numbers 1-9).Each technique relates to only one description. Match each of the following program-embedded techniques (letters A-I)with a description of these techniques (numbers 1-9).Each technique relates to only one description.    Match each of the following program-embedded techniques (letters A-I)with a description of these techniques (numbers 1-9).Each technique relates to only one description.

(Essay)
4.8/5
(41)

Which of the following is true with respect to fraud risk factors in a computerized environment?

(Multiple Choice)
5.0/5
(41)

Auditing _________________________________________________ refers to the actual evaluation of the hardware and programs to determine the reliability of computer operations and test the operating effectiveness of the related controls.

(Short Answer)
4.7/5
(46)

Controls used in the management of a computer center to minimize the possibility of using an incorrect file or program are

(Multiple Choice)
4.9/5
(42)

Which of the following is not a category of general controls?

(Multiple Choice)
4.7/5
(34)

Input controls are one of the major categories of general controls.

(True/False)
4.8/5
(40)

When processing controls within the computerized processing system may not leave visible evidence that could be inspected by audit teams,the teams should:

(Multiple Choice)
4.8/5
(24)

Techniques needed to select specific transactions of audit interest for testing would not include

(Multiple Choice)
4.8/5
(33)

To test the operating effectiveness of computer controls,audit teams can use each of the following methods except

(Multiple Choice)
4.8/5
(29)

The major phases in the audit team's study of internal control are the same in a computerized processing environment as those in a manual processing environment.

(True/False)
4.9/5
(43)

Which of the following is not true with respect to the test data approach for evaluating computer controls?

(Multiple Choice)
4.7/5
(27)

The most important preventive controls for computer fraud are those that limit access to computers.

(True/False)
5.0/5
(36)

After obtaining a preliminary understanding of a client's computer controls,audit teams may decide not to perform tests of controls.Which of the following would not be a valid reason for choosing to omit tests of controls?

(Multiple Choice)
4.9/5
(36)

Which of the following input controls would not be effective in identifying the erroneous input of numeric fields in a transaction?

(Multiple Choice)
4.9/5
(40)
Showing 61 - 80 of 118
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)