Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The first step in a risk-based audit approach is to

(Multiple Choice)
4.8/5
(42)

An auditor sets an embedded audit module to selectively monitor transactions.Selected transactions are then reprocessed independently,and the results are compared with those obtained by the normal system processing.The auditor is using

(Multiple Choice)
4.9/5
(46)

Describe the difference between concurrent audit techniques and embedded audit modules.

(Essay)
4.8/5
(41)

Who generally receives the findings and conclusions of an operational audit?

(Multiple Choice)
4.8/5
(30)

Which of the following is not one of the types of internal audits?

(Multiple Choice)
4.8/5
(36)

Auditors have the ability to change inherent risk.

(True/False)
4.9/5
(32)

Describe the five commonly used concurrent audit techniques.

(Essay)
4.9/5
(39)

The ________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.

(Multiple Choice)
4.8/5
(40)

The scope of a(n)________ audit encompasses all aspects of systems management.

(Multiple Choice)
4.9/5
(39)

Define and give examples of embedded audit modules.

(Essay)
4.8/5
(29)

Using embedded audit modules to continuously monitor transactions,collect data on transactions with special audit significance,and store the data to later identify and investigate questionable transactions is an example of

(Multiple Choice)
4.9/5
(32)

An auditor sets an embedded audit module to flag all credit transactions in excess of $5,000.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using

(Multiple Choice)
4.9/5
(34)

What is not a typical responsibility of an internal auditor?

(Multiple Choice)
4.7/5
(41)

The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as

(Multiple Choice)
4.8/5
(37)

Inserting a dummy entity in a company's system;processing test transactions to update that will not affect actual records is an example of

(Multiple Choice)
4.9/5
(44)

Which of the following is not an information systems audit test of controls?

(Multiple Choice)
4.8/5
(28)

A type of software that auditors can use to analyze program logic and detect unexecuted program code is

(Multiple Choice)
4.9/5
(30)

One of the advantages of CAATS software is that it can replace the auditor's judgment in specific areas of an audit.

(True/False)
4.7/5
(45)

The evidence collection stage of an operational audit includes all the following activities except

(Multiple Choice)
4.9/5
(32)

Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?

(Essay)
4.9/5
(32)
Showing 61 - 80 of 116
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)