Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An auditor manually calculates accumulated depreciation on a delivery van and compares her calculation with accounting records.This is an example collecting audit evidence by

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

B

One tool used to document the review of source data controls is

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

C

With which stage in the auditing process are the consideration of risk factors and materiality most associated?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

An increase in the effectiveness of auditing software will have the effect of

(Multiple Choice)
4.9/5
(41)

An auditor creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.The auditor is using

(Multiple Choice)
4.8/5
(34)

Which of the following is not one of the types of internal audits?

(Multiple Choice)
4.9/5
(36)

Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as

(Multiple Choice)
4.8/5
(34)

Evaluating effectiveness,efficiency,and goal achievement are objectives of ________ audits.

(Multiple Choice)
4.9/5
(37)

How and to whom does an auditor communicate the audit results?

(Essay)
4.9/5
(33)

How could auditors determine if unauthorized program changes have been made?

(Multiple Choice)
4.9/5
(35)

Determining whether the necessary control procedures are in place is accomplished by conducting

(Multiple Choice)
4.9/5
(34)

When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that blocks of code are superseded by other blocks of code.Blocks of code that are not executed by the program can be identified by

(Multiple Choice)
4.8/5
(37)

An expansion of a firm's operations to include production in Russia and China will have the effect of

(Multiple Choice)
4.8/5
(31)

The evidence collection method that considers the relationships and trends among information to detect items that should be investigated further is called

(Multiple Choice)
4.8/5
(34)

Briefly describe tests that can be used to detect unauthorized program modifications.

(Essay)
4.7/5
(39)

a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?

(Essay)
4.9/5
(30)

The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.

(Multiple Choice)
4.7/5
(28)

What is the primary purpose of computer audit software?

(Multiple Choice)
4.8/5
(28)

The purpose of ________ is to determine why,how,when,and who will perform the audit.

(Multiple Choice)
4.9/5
(35)

When doing an information systems audit,auditors must review and evaluate the program development process.What errors or fraud could occur during the program development process?

(Essay)
4.9/5
(28)
Showing 1 - 20 of 72
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)