Exam 8: Consideration of Internal Control in an Information Technology Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following computer related employees should not be allowed access to program listings of application programs?

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

C

Auditing by testing the input and output of a computer system instead of the computer program itself will:

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

Which of the following personnel is responsible for the proper functioning of the security features built into the operating system?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

A

Magnetic tape drives have the advantage of direct access to stored data.

(True/False)
4.8/5
(37)

Distributive data processing eliminates the need for data security.

(True/False)
4.9/5
(38)

Which of the following is not a data transmission control?

(Multiple Choice)
4.9/5
(40)

The advent of personal computers has resulted in a(n):

(Multiple Choice)
4.7/5
(42)

Which of the following testing techniques minimizes the possibility that the auditors will contaminate a client's financial records?

(Multiple Choice)
4.8/5
(44)

For good internal control,programmers should not be given access to complete program documentation for the programs they work on.

(True/False)
4.8/5
(41)

If a control total were to be computed on each of the following data items,which would best be identified as a hash total for a payroll computer application?

(Multiple Choice)
4.9/5
(38)

Auditors usually begin their consideration of IT systems with tests of application controls.

(True/False)
4.8/5
(38)

The purpose of using generalized computer programs is to test and analyze a client's computer:

(Multiple Choice)
4.8/5
(39)

When conducting field work for a physical inventory,an auditor cannot perform which of the following steps using a generalized audit software package?

(Multiple Choice)
4.9/5
(29)

Which of the following is not a distinctive characteristic of advanced IT systems?

(Multiple Choice)
4.8/5
(42)

General controls over IT systems are typically tested using:

(Multiple Choice)
4.8/5
(39)

An example of an access control is a:

(Multiple Choice)
4.9/5
(37)

Which of the following is a password security problem?

(Multiple Choice)
4.8/5
(33)

In the weekly computer run to prepare payroll checks,a check was printed for an employee who had been terminated the previous week.Which of the following controls,if properly utilized,would have been most effective in preventing the error or ensuing its prompt detection?

(Multiple Choice)
4.8/5
(39)

A system in which the end user is responsible for the development and execution of the computer application that he or she uses is referred to as:

(Multiple Choice)
4.8/5
(33)

Parallel simulation programs used by the auditors for testing programs:

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)