Exam 7: Computer-Assisted Audit Tools and Techniques
Exam 1: Auditing and Internal Control103 Questions
Exam 2: Auditing IT Governance Controls99 Questions
Exam 3: Security Part I: Auditing Operating Systems and Networks143 Questions
Exam 4: IT Security Part II: Auditing Database Systems101 Questions
Exam 5: Systems Development and Program Change Activities108 Questions
Exam 6: Overview of Transaction Processing and Financial Reporting Systems143 Questions
Exam 7: Computer-Assisted Audit Tools and Techniques83 Questions
Exam 8: Data Structures and CAATTs for Data Extraction89 Questions
Exam 9: Auditing the Revenue Cycle105 Questions
Exam 10: Auditing the Expenditure Cycle144 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection85 Questions
Exam 11: Enterprise Resource Planning Systems92 Questions
Select questions type
Which input control check would detect a posting to the wrong customer account?
(Multiple Choice)
4.8/5
(31)
The firm allows no more than 10 hours of overtime a week.An employee entered "15" in the field.Which control will detect this error?
(Short Answer)
4.8/5
(39)
The correct purchase order number,is123456.All of the following are transcription errors except
(Multiple Choice)
4.8/5
(30)
Achieving batch control objectives requires grouping similar types of input transactions (such as sales orders)together in batches and then controlling the batches throughout data processing.
(True/False)
4.9/5
(34)
The employee entered "40" in the "hours worked per day" field.Which check would detect this unintentional error?
(Multiple Choice)
4.8/5
(35)
Contrast the black box approach to IT auditing and the white box approach.Which is preferred?
(Essay)
4.8/5
(39)
A salami fraud affects a large number of victims,but the harm to each appears to be very small.
(True/False)
4.8/5
(26)
If all of the inputs have been validated before processing,then what purpose do run-to-run controls serve?
(Essay)
4.9/5
(24)
Auditors do not rely on detailed knowledge of the application's internal logic when they use the __________________________ approach to auditing computer applications.
(Short Answer)
4.8/5
(39)
Various techniques can be used to control the input effort.Write a one-page essay discussing three techniques.
(Essay)
4.9/5
(42)
Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling)include all of the following actions by a computer criminal except
(Multiple Choice)
5.0/5
(40)
After data is entered into the system,it is processed.Processing control exists to make sure that the correct things happen during processing.Discuss processing controls.
(Essay)
4.9/5
(36)
A __________________________ fraud affects a large number of victims but the harm to each appears to be very small.
(Short Answer)
4.9/5
(33)
Showing 41 - 60 of 83
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)