Exam 5: Systems Development and Program Change Activities
Exam 1: Auditing and Internal Control103 Questions
Exam 2: Auditing IT Governance Controls99 Questions
Exam 3: Security Part I: Auditing Operating Systems and Networks143 Questions
Exam 4: IT Security Part II: Auditing Database Systems101 Questions
Exam 5: Systems Development and Program Change Activities108 Questions
Exam 6: Overview of Transaction Processing and Financial Reporting Systems143 Questions
Exam 7: Computer-Assisted Audit Tools and Techniques83 Questions
Exam 8: Data Structures and CAATTs for Data Extraction89 Questions
Exam 9: Auditing the Revenue Cycle105 Questions
Exam 10: Auditing the Expenditure Cycle144 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection85 Questions
Exam 11: Enterprise Resource Planning Systems92 Questions
Select questions type
Typical contents of a run manual include all of the following except
(Multiple Choice)
5.0/5
(45)
Which control is not associated with new systems development activities?
(Multiple Choice)
4.9/5
(35)
Examples of one-time costs include all of the following except
(Multiple Choice)
4.8/5
(49)
Which control is not a part of the source program library management system?
(Multiple Choice)
4.9/5
(35)
When the nature of the project and the needs of the user permit,most organizations will seek a pre-coded commercial software package rather than develop a system in-house.
(True/False)
4.8/5
(34)
Which test of controls will provide evidence that the system as originally implemented was free from material errors and free from fraud? Review of the documentation indicates that
(Multiple Choice)
4.9/5
(35)
Firms with an independent internal audit staff may conduct tests of the system development life cycle on an ongoing basis.
(True/False)
4.9/5
(33)
The user test and acceptance procedure is the last point at which the user can determine the system's acceptability prior to it going into service.
(True/False)
4.7/5
(30)
A tangible benefit can be measured and expressed in financial terms.
(True/False)
4.7/5
(40)
Which control ensures that production files cannot be accessed without specific permission?
(Multiple Choice)
4.9/5
(35)
Programs in their compiled state are very susceptible to the threat of unauthorized modification.
(True/False)
4.9/5
(31)
Maintenance access to systems increases the risk that logic will be corrupted either by the accident or intent to defraud.
(True/False)
4.8/5
(35)
Showing 81 - 100 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)