Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe the risk-based audit approach.

(Essay)
5.0/5
(34)

When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that variables defined during the early part of development become irrelevant.The occurrences of variables that are not used by the program can be found using

(Multiple Choice)
4.7/5
(40)

Which type of work listed below is not typical of internal auditors?

(Multiple Choice)
4.9/5
(44)

One type of audit that is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives is known as a(n)________ audit.

(Multiple Choice)
4.9/5
(45)

Name and describe the different types of audits.

(Essay)
4.9/5
(34)

The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.

(Multiple Choice)
4.8/5
(31)

An auditor sets an embedded audit module to flag all credit transactions in excess of $1,500.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using

(Multiple Choice)
4.9/5
(39)

Organizing the audit team and the physical examination of assets are components of which two separate audit stages?

(Multiple Choice)
4.9/5
(37)

Regarding program modifications,which statement below is incorrect?

(Multiple Choice)
4.9/5
(37)

Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?

(Essay)
4.9/5
(40)

An auditor sets an embedded audit module to flag questionable online transactions,display information about the transaction on the auditor's computer,and send a text message to the auditor's cell phone.The auditor is using

(Multiple Choice)
4.9/5
(34)

Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?

(Essay)
5.0/5
(40)

The use of a secure file library and restrictions on physical access to data files are control procedures used together to prevent

(Multiple Choice)
4.8/5
(31)

The ________ audit examines the reliability and integrity of accounting records.

(Multiple Choice)
4.8/5
(31)

Assessing the quality of internal controls,the reliability of information,and operating performance are all part of which stage of the auditing process?

(Multiple Choice)
4.8/5
(33)

Which auditing technique will not assist in determining if unauthorized programming changes have been made?

(Multiple Choice)
4.9/5
(40)

Explain why the auditor's role in program development and acquisition should be limited.

(Essay)
4.7/5
(33)

The evidence collection method that examines all supporting documents to determine the validity of a transaction is called

(Multiple Choice)
4.9/5
(45)

What is the purpose of an information systems audit?

(Multiple Choice)
4.7/5
(35)

The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.

(Multiple Choice)
4.7/5
(42)
Showing 21 - 40 of 72
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)