Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Identify the company below that CAATS would likely provide the most value.

(Multiple Choice)
4.7/5
(39)

Which of the choices below best describes a risk-based audit approach?

(Multiple Choice)
4.8/5
(39)

What type of data does CAATS use to produce an auditing program?

(Multiple Choice)
4.9/5
(45)

A type of software that auditors can use to analyze program logic and detect unexecuted program code is

(Multiple Choice)
4.8/5
(35)

The evidence collection method that examines all supporting documents to determine the validity of a transaction is called

(Multiple Choice)
4.8/5
(33)

Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?

(Essay)
4.7/5
(44)

An audit software program that generates programs that perform certain audit functions,based on auditor specifications,is referred to as a(n)

(Multiple Choice)
4.9/5
(37)

With regards to an accounting information system,a financial audit is most concerned with

(Multiple Choice)
4.8/5
(38)

Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?

(Essay)
4.9/5
(38)

Describe the disadvantages of test data processing.

(Essay)
5.0/5
(37)

How is a financial audit different from an information systems audit?

(Essay)
4.9/5
(35)

An auditor sets an embedded audit module to selectively monitor transactions.Selected transactions are then reprocessed independently,and the results are compared with those obtained by the normal system processing.The auditor is using

(Multiple Choice)
4.9/5
(35)

The scope of a(n)________ audit encompasses all aspects of systems management.

(Multiple Choice)
4.8/5
(39)

During the evidence evaluation stage of an operational audit,the auditor measures the system against generally accepted accounting principles (GAAP).

(True/False)
4.9/5
(35)

Which auditing technique will not assist in determining if unauthorized programming changes have been made?

(Multiple Choice)
4.9/5
(37)

You are an internal auditor for Ron Burgandy Suits.The CEO has asked you to perform an audit of the program modifications process.Identify one procedure you might use to test controls surrounding the program modification process.

(Multiple Choice)
4.7/5
(34)

Name and describe the different types of audits.

(Essay)
4.9/5
(40)

Expanding a firm's operations to include a manufacturing facility in Russia will

(Multiple Choice)
4.8/5
(27)

Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive independent assurance regarding the financial statements,which are generated using an accounting information system.Which type of audit would best suit the demands of the board of directors?

(Multiple Choice)
4.9/5
(31)

An auditor sets an embedded audit module to flag questionable online transactions,display information about the transaction on the auditor's computer,and send a text message to the auditor's cell phone.The auditor is using

(Multiple Choice)
4.9/5
(38)
Showing 61 - 80 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)