Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
Identify the company below that CAATS would likely provide the most value.
(Multiple Choice)
4.7/5
(39)
Which of the choices below best describes a risk-based audit approach?
(Multiple Choice)
4.8/5
(39)
What type of data does CAATS use to produce an auditing program?
(Multiple Choice)
4.9/5
(45)
A type of software that auditors can use to analyze program logic and detect unexecuted program code is
(Multiple Choice)
4.8/5
(35)
The evidence collection method that examines all supporting documents to determine the validity of a transaction is called
(Multiple Choice)
4.8/5
(33)
Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?
(Essay)
4.7/5
(44)
An audit software program that generates programs that perform certain audit functions,based on auditor specifications,is referred to as a(n)
(Multiple Choice)
4.9/5
(37)
With regards to an accounting information system,a financial audit is most concerned with
(Multiple Choice)
4.8/5
(38)
Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?
(Essay)
4.9/5
(38)
How is a financial audit different from an information systems audit?
(Essay)
4.9/5
(35)
An auditor sets an embedded audit module to selectively monitor transactions.Selected transactions are then reprocessed independently,and the results are compared with those obtained by the normal system processing.The auditor is using
(Multiple Choice)
4.9/5
(35)
The scope of a(n)________ audit encompasses all aspects of systems management.
(Multiple Choice)
4.8/5
(39)
During the evidence evaluation stage of an operational audit,the auditor measures the system against generally accepted accounting principles (GAAP).
(True/False)
4.9/5
(35)
Which auditing technique will not assist in determining if unauthorized programming changes have been made?
(Multiple Choice)
4.9/5
(37)
You are an internal auditor for Ron Burgandy Suits.The CEO has asked you to perform an audit of the program modifications process.Identify one procedure you might use to test controls surrounding the program modification process.
(Multiple Choice)
4.7/5
(34)
Expanding a firm's operations to include a manufacturing facility in Russia will
(Multiple Choice)
4.8/5
(27)
Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive independent assurance regarding the financial statements,which are generated using an accounting information system.Which type of audit would best suit the demands of the board of directors?
(Multiple Choice)
4.9/5
(31)
An auditor sets an embedded audit module to flag questionable online transactions,display information about the transaction on the auditor's computer,and send a text message to the auditor's cell phone.The auditor is using
(Multiple Choice)
4.9/5
(38)
Showing 61 - 80 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)