Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Embedded audit molecules can be used to continually monitor the system and collect audit evidence.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive more assurance that Chibuzo Incorporated is operating in an efficient,effective manner.Which type of audit would best suit the demands of the board of directors?

Free
(Multiple Choice)
5.0/5
(30)
Correct Answer:
Verified

C

What is not a typical responsibility of an external auditor?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

D

The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.

(Multiple Choice)
4.8/5
(40)

The information systems audit objective that pertains to protect computer equipment,programs,communications,and data from unauthorized access,modification,or destruction is known as

(Multiple Choice)
4.9/5
(33)

Explain why the auditor's role in program development and acquisition should be limited.

(Essay)
4.9/5
(33)

Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as

(Multiple Choice)
4.9/5
(30)

As the head of the internal audit department for Orange Computing,you want to hire a person to serve as one of Orange's operational auditors.Identify the candidate below that is likely to be the most qualified person for the job.

(Multiple Choice)
5.0/5
(40)

You are the head of the IT department at Panther Designs,Inc.A systems review reveals that your firm has poor control procedures for preventing inadvertent programming errors.However,you are not concerned because you feel Panther Designs has strong compensating controls.What control likely exists to give you this confidence?

(Multiple Choice)
4.9/5
(32)

Audit routines that notify auditors of questionable transactions,often as they occur is an example of

(Multiple Choice)
4.8/5
(33)

Expanding a firm's operations to include a manufacturing facility overseas will

(Multiple Choice)
4.8/5
(45)

Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?

(Essay)
4.7/5
(32)

Which statement below is incorrect regarding program modifications?

(Multiple Choice)
4.8/5
(34)

When a control deficiency is identified,the auditor should inquire about

(Multiple Choice)
5.0/5
(32)

Which auditing technique will not assist in determining if unauthorized programming changes have been made?

(Multiple Choice)
4.9/5
(37)

The information systems audit objective that pertains to source data being processed into some form of output is known as

(Multiple Choice)
4.9/5
(34)

An auditor might use ________ to convert data from several sources into a single common format.

(Multiple Choice)
4.8/5
(33)

Identify the company below that CAATS would likely provide the most value.

(Multiple Choice)
4.9/5
(39)

Auditors have the ability to change control risk.

(True/False)
4.8/5
(42)

The evidence collection method that examines all supporting documents to determine the validity of a transaction is called

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 116
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)