Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
You are the head of the internal audit department for Apple Computer.You want to hire a person to serve as one of Apple's operational auditors.Identify the candidate below that is likely to be the most qualified person for the job.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
Increasing the effectiveness of auditing software will
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
The use of a secure file library and restrictions on physical access to data files are control procedures used together to prevent
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
A
Explain why the auditor's role in program development and acquisition should be limited.
(Essay)
4.9/5
(39)
The evidence collection stage of an operational audit includes all the following activities except
(Multiple Choice)
4.8/5
(39)
An auditor creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.The auditor is using
(Multiple Choice)
5.0/5
(36)
Which type of work listed below is not typical of internal auditors?
(Multiple Choice)
4.8/5
(37)
An auditor manually calculates accumulated depreciation on a delivery van and compares her calculation with the accounting records.The auditor is performing
(Multiple Choice)
4.7/5
(39)
Which of the following is not one of the six objectives of an information systems audit?
(Multiple Choice)
4.8/5
(30)
Increasing the effectiveness of internal controls would have the greatest effect on
(Multiple Choice)
4.8/5
(34)
Who generally receives the findings and conclusions of an operational audit?
(Multiple Choice)
4.9/5
(40)
A system that employs various types of advanced technology has more ________ risk than traditional batch processing.
(Multiple Choice)
4.8/5
(29)
Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as
(Multiple Choice)
4.9/5
(43)
The information systems audit objective that pertains to source data being processed into some form of output is known as
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)