Exam 11: Auditing Computer-Based Information Systems
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
Embedded audit molecules can be used to continually monitor the system and collect audit evidence.
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive more assurance that Chibuzo Incorporated is operating in an efficient,effective manner.Which type of audit would best suit the demands of the board of directors?
Free
(Multiple Choice)
5.0/5
(30)
Correct Answer:
C
What is not a typical responsibility of an external auditor?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
D
The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.
(Multiple Choice)
4.8/5
(40)
The information systems audit objective that pertains to protect computer equipment,programs,communications,and data from unauthorized access,modification,or destruction is known as
(Multiple Choice)
4.9/5
(33)
Explain why the auditor's role in program development and acquisition should be limited.
(Essay)
4.9/5
(33)
Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as
(Multiple Choice)
4.9/5
(30)
As the head of the internal audit department for Orange Computing,you want to hire a person to serve as one of Orange's operational auditors.Identify the candidate below that is likely to be the most qualified person for the job.
(Multiple Choice)
5.0/5
(40)
You are the head of the IT department at Panther Designs,Inc.A systems review reveals that your firm has poor control procedures for preventing inadvertent programming errors.However,you are not concerned because you feel Panther Designs has strong compensating controls.What control likely exists to give you this confidence?
(Multiple Choice)
4.9/5
(32)
Audit routines that notify auditors of questionable transactions,often as they occur is an example of
(Multiple Choice)
4.8/5
(33)
Expanding a firm's operations to include a manufacturing facility overseas will
(Multiple Choice)
4.8/5
(45)
Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?
(Essay)
4.7/5
(32)
Which statement below is incorrect regarding program modifications?
(Multiple Choice)
4.8/5
(34)
When a control deficiency is identified,the auditor should inquire about
(Multiple Choice)
5.0/5
(32)
Which auditing technique will not assist in determining if unauthorized programming changes have been made?
(Multiple Choice)
4.9/5
(37)
The information systems audit objective that pertains to source data being processed into some form of output is known as
(Multiple Choice)
4.9/5
(34)
An auditor might use ________ to convert data from several sources into a single common format.
(Multiple Choice)
4.8/5
(33)
Identify the company below that CAATS would likely provide the most value.
(Multiple Choice)
4.9/5
(39)
The evidence collection method that examines all supporting documents to determine the validity of a transaction is called
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)