Exam 7: Computer-Assisted Audit Tools and Techniques
Exam 1: Auditing and Internal Control103 Questions
Exam 2: Auditing IT Governance Controls99 Questions
Exam 3: Security Part I: Auditing Operating Systems and Networks143 Questions
Exam 4: IT Security Part II: Auditing Database Systems101 Questions
Exam 5: Systems Development and Program Change Activities108 Questions
Exam 6: Overview of Transaction Processing and Financial Reporting Systems143 Questions
Exam 7: Computer-Assisted Audit Tools and Techniques83 Questions
Exam 8: Data Structures and CAATTs for Data Extraction89 Questions
Exam 9: Auditing the Revenue Cycle105 Questions
Exam 10: Auditing the Expenditure Cycle144 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection85 Questions
Exam 11: Enterprise Resource Planning Systems92 Questions
Select questions type
Which statement is not correct? The audit trail in a computerized environment
(Multiple Choice)
4.9/5
(30)
The black box approach to testing computer applications require a detailed knowledge of the the program logic being tested.
(True/False)
4.8/5
(38)
All of the following concepts are associated with the black box approach to auditing computer applications except
(Multiple Choice)
4.9/5
(40)
In a computerized environment,all input controls are implemented after data is input.
(True/False)
4.8/5
(38)
Which statement is not correct? The goal of batch controls is to ensure that during processing
(Multiple Choice)
4.8/5
(45)
The presence of an audit trail is critical to the integrity of the accounting information system.Discuss three of the techniques used to preserve the audit trail.
(Essay)
4.9/5
(40)
When using the test data method,the presence of multiple error messages indicates a flaw in the preparation of test transactions.
(True/False)
4.9/5
(46)
Classify each of the following as a field,record,or file interrogation:
a.Limit check
b.Validity check
c.Version check
d.Missing data check
e.Sign checks
f.Expiration date check
g.Numeric-alphabetic data check
h. Sequence check
i. Zero-value check
j. Header label check
k. Range check
l. Reasonableness check
(Short Answer)
4.7/5
(42)
The base case system evaluation is a variation of the test data method.
(True/False)
4.8/5
(39)
Define each of the following input controls and give an example of how they may be used:
a. Missing data check
b. Numeric/alphabetic data check
c. Limit check
d. Range check
e. Reasonableness check
f. Validity check
(Essay)
4.9/5
(35)
Input controls are programmed procedures that perform tests on master file data to ensure they are free from errors.
(True/False)
4.8/5
(40)
Use of the integrated test facility poses no threat to organizational data files.
(True/False)
4.9/5
(38)
Tracing is a method used to verify the logical operations executed by a computer application.
(True/False)
4.9/5
(38)
Methods used to maintain an audit trail in a computerized environment include all of the following except
(Multiple Choice)
4.8/5
(39)
Showing 21 - 40 of 83
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)