Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.
(Multiple Choice)
4.8/5
(40)
The ________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.
(Multiple Choice)
4.8/5
(32)
When a control deficiency is identified,the auditor should inquire about
(Multiple Choice)
4.9/5
(35)
Which of the following is not a control procedure for preventing inadvertent programming errors?
(Multiple Choice)
4.9/5
(32)
How has the U.S.government deployed computer-assisted audit techniques to reduce the budget?
(Multiple Choice)
4.9/5
(39)
Strong ________ controls can partially compensate for inadequate ________ controls.
(Multiple Choice)
4.7/5
(34)
An auditor sets an embedded audit module to record all credit transactions in excess of $4,000 and stores the data in an audit log.The auditor is using
(Multiple Choice)
4.8/5
(39)
An auditor finds that employee absentee rates are significantly higher on Mondays and Fridays than on other work days.This is an example collecting audit evidence by
(Multiple Choice)
4.9/5
(33)
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that blocks of code are superseded by other blocks of code.Blocks of code that are not executed by the program can be identified by
(Multiple Choice)
4.8/5
(37)
When doing an information systems audit,auditors must review and evaluate the program development process.What errors or fraud could occur during the program development process?
(Essay)
4.8/5
(38)
________can determine whether the necessary control procedures are in place.
(Multiple Choice)
4.9/5
(47)
The auditor's objective is to seek ________ that no material error exists in the information audited.
(Multiple Choice)
4.8/5
(36)
The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.
(Multiple Choice)
4.8/5
(36)
Evaluating effectiveness,efficiency,and goal achievement are objectives of ________ audits.
(Multiple Choice)
4.9/5
(48)
Which of the following is not one of the types of internal audits?
(Multiple Choice)
4.8/5
(39)
An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example of collecting audit evidence by
(Multiple Choice)
4.8/5
(36)
a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?
(Essay)
4.8/5
(40)
Which of the following is an information systems audit review procedure?
(Multiple Choice)
4.9/5
(45)
An auditor sets an embedded audit module to flag all credit transactions in excess of $3,000.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using
(Multiple Choice)
4.8/5
(41)
Showing 41 - 60 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)