Exam 11: Auditing Computer-Based Information Systems
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?
(Essay)
4.9/5
(38)
The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.
(Multiple Choice)
4.9/5
(36)
There is a direct relationship between inherent risk and detection risk.
(True/False)
4.7/5
(37)
Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?
(Essay)
5.0/5
(40)
Embedded audit molecules can be used to continually monitor the system and collect audit evidence.
(True/False)
4.8/5
(37)
The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.
(Multiple Choice)
4.8/5
(43)
A(n)________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.
(Multiple Choice)
4.8/5
(36)
Which of the choices below best describes a risk-based audit approach?
(Multiple Choice)
4.7/5
(39)
The information systems audit objective that pertains to protect computer equipment,programs,communications,and data from unauthorized access,modification,or destruction is known as
(Multiple Choice)
4.9/5
(47)
How is a financial audit different from an information systems audit?
(Essay)
4.8/5
(40)
You are the head of the IT department at Panther Designs,Inc.A systems review reveals that your firm has poor control procedures for preventing inadvertent programming errors.However,you are not concerned because you feel Panther Designs has strong compensating controls.What control likely exists to give you this confidence?
(Multiple Choice)
4.9/5
(40)
The evidence collection stage of an operational audit includes all the following activities except
(Multiple Choice)
4.7/5
(40)
Briefly describe tests that can be used to detect unauthorized program modifications.
(Essay)
4.9/5
(38)
An organization that has an antiquated accounting information system has more ________ risk than an organization that has a more advanced system.
(Multiple Choice)
4.9/5
(45)
The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures.
(Multiple Choice)
4.9/5
(34)
Identify the company below that CAATS would likely provide the most value.
(Multiple Choice)
4.7/5
(33)
Showing 61 - 80 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)