Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?

(Essay)
4.9/5
(38)

The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.

(Multiple Choice)
4.9/5
(36)

There is a direct relationship between inherent risk and detection risk.

(True/False)
4.7/5
(37)

Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?

(Essay)
5.0/5
(40)

Embedded audit molecules can be used to continually monitor the system and collect audit evidence.

(True/False)
4.8/5
(37)

Describe the concept of materiality and provide an example.

(Essay)
4.8/5
(31)

The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.

(Multiple Choice)
4.8/5
(43)

What role should an auditor play in system development?

(Multiple Choice)
4.9/5
(44)

Auditors have the ability to change control risk.

(True/False)
4.8/5
(38)

A(n)________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.

(Multiple Choice)
4.8/5
(36)

Which of the choices below best describes a risk-based audit approach?

(Multiple Choice)
4.7/5
(39)

The information systems audit objective that pertains to protect computer equipment,programs,communications,and data from unauthorized access,modification,or destruction is known as

(Multiple Choice)
4.9/5
(47)

How is a financial audit different from an information systems audit?

(Essay)
4.8/5
(40)

You are the head of the IT department at Panther Designs,Inc.A systems review reveals that your firm has poor control procedures for preventing inadvertent programming errors.However,you are not concerned because you feel Panther Designs has strong compensating controls.What control likely exists to give you this confidence?

(Multiple Choice)
4.9/5
(40)

The evidence collection stage of an operational audit includes all the following activities except

(Multiple Choice)
4.7/5
(40)

Briefly describe tests that can be used to detect unauthorized program modifications.

(Essay)
4.9/5
(38)

Which of the following is not one way CAATS could be used?

(Multiple Choice)
4.7/5
(41)

An organization that has an antiquated accounting information system has more ________ risk than an organization that has a more advanced system.

(Multiple Choice)
4.9/5
(45)

The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures.

(Multiple Choice)
4.9/5
(34)

Identify the company below that CAATS would likely provide the most value.

(Multiple Choice)
4.7/5
(33)
Showing 61 - 80 of 116
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)