Exam 11: Auditing Computer-Based Information Systems
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
An auditor sets an embedded audit module to selectively monitor transactions.Selected transactions are then reprocessed independently,and the results are compared with those obtained by the normal system processing.The auditor is using
(Multiple Choice)
4.9/5
(46)
Describe the difference between concurrent audit techniques and embedded audit modules.
(Essay)
4.8/5
(41)
Who generally receives the findings and conclusions of an operational audit?
(Multiple Choice)
4.8/5
(30)
Which of the following is not one of the types of internal audits?
(Multiple Choice)
4.8/5
(36)
The ________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.
(Multiple Choice)
4.8/5
(40)
The scope of a(n)________ audit encompasses all aspects of systems management.
(Multiple Choice)
4.9/5
(39)
Using embedded audit modules to continuously monitor transactions,collect data on transactions with special audit significance,and store the data to later identify and investigate questionable transactions is an example of
(Multiple Choice)
4.9/5
(32)
An auditor sets an embedded audit module to flag all credit transactions in excess of $5,000.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using
(Multiple Choice)
4.9/5
(34)
What is not a typical responsibility of an internal auditor?
(Multiple Choice)
4.7/5
(41)
The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as
(Multiple Choice)
4.8/5
(37)
Inserting a dummy entity in a company's system;processing test transactions to update that will not affect actual records is an example of
(Multiple Choice)
4.9/5
(44)
Which of the following is not an information systems audit test of controls?
(Multiple Choice)
4.8/5
(28)
A type of software that auditors can use to analyze program logic and detect unexecuted program code is
(Multiple Choice)
4.9/5
(30)
One of the advantages of CAATS software is that it can replace the auditor's judgment in specific areas of an audit.
(True/False)
4.7/5
(45)
The evidence collection stage of an operational audit includes all the following activities except
(Multiple Choice)
4.9/5
(32)
Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?
(Essay)
4.9/5
(32)
Showing 61 - 80 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)