Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview79 Questions
Exam 2: Overview of Transaction Processing and Erp Systems74 Questions
Exam 3: Systems Documentation Techniques83 Questions
Exam 4: Relational Databases80 Questions
Exam 5: Computer Fraud46 Questions
Exam 6: Computer Fraud and Abuse Techniques45 Questions
Exam 7: Control and Accounting Information Systems96 Questions
Exam 8: Information Systems Controls for System Reliability Part 1: Information Security53 Questions
Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy24 Questions
Exam 10: Information Systems Controls for Systems Reliability Part 3: Processing Integrity and Availability63 Questions
Exam 11: Auditing Computer-Based Information Systems72 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections81 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements83 Questions
Exam 14: The Production Cycle68 Questions
Exam 15: The Human Resources Management and Payroll Cycle58 Questions
Exam 16: General Ledger and Reporting System57 Questions
Exam 17: The Rea Data Model61 Questions
Exam 18: Implementing an Rea Model in a Relational Database68 Questions
Exam 19: Special Topics in Rea Modeling72 Questions
Exam 20: Introduction to Systems Development Systems Analysis90 Questions
Exam 21: Ais Development Strategies73 Questions
Exam 22: Systems Design, implementation, and Operation70 Questions
Select questions type
Which of the following is the first step in the risk-based audit approach?
(Multiple Choice)
4.8/5
(42)
An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example of collecting audit evidence by
(Multiple Choice)
4.9/5
(33)
The ________ procedure for auditing computer process controls uses a hypothetical series of valid and invalid transactions.
(Multiple Choice)
4.9/5
(31)
The ________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.
(Multiple Choice)
4.8/5
(39)
In the ________ stage of an operational audit,the auditor measures the actual system against an ideal standard.
(Multiple Choice)
4.9/5
(43)
Strong ________ controls can partially compensate for inadequate ________ controls.
(Multiple Choice)
4.8/5
(35)
A system that employs various types of advanced technology has more ________ risk than traditional batch processing.
(Multiple Choice)
4.8/5
(35)
The information systems audit objective that pertains to source data being processed into some form of output is known as
(Multiple Choice)
4.8/5
(30)
The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as
(Multiple Choice)
5.0/5
(44)
A type of software that auditors can use to analyze program logic and detect unexecuted program code is
(Multiple Choice)
4.9/5
(42)
An auditor might use which of the following to convert data from several sources into a single common format?
(Multiple Choice)
4.9/5
(39)
An auditor must be willing to accept some degree of risk that the audit conclusion is incorrect.Accordingly,the auditor's objective is to seek ________ that no material error exists in the information audited.
(Multiple Choice)
4.8/5
(49)
What is not a typical responsibility of an internal auditor?
(Multiple Choice)
4.8/5
(39)
According to the risk-based auditing approach,when a control deficiency is identified,the auditor should inquire about
(Multiple Choice)
4.9/5
(31)
How is a financial audit different from an information systems audit?
(Essay)
4.8/5
(33)
Showing 41 - 60 of 72
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)