Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which statement below is incorrect regarding program modifications?

(Multiple Choice)
4.8/5
(37)

The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.

(Multiple Choice)
4.9/5
(39)

Verifying the accuracy of certain information,often through communication with third parties,is known as

(Multiple Choice)
4.9/5
(32)

Consideration of risk factors and materiality is most associated with which audit stage?

(Multiple Choice)
4.8/5
(39)

Organizing the audit team and the physical examination of assets are components of which two separate audit stages?

(Multiple Choice)
5.0/5
(43)

You are the head of the IT department at Panther Designs,Inc.A systems review reveals that your firm has poor control procedures for preventing inadvertent programming errors.However,you are not concerned because you feel Panther Designs has strong compensating controls.What control likely exists to give you this confidence?

(Multiple Choice)
4.8/5
(33)

Identify the activity below that the external auditor should not be involved.

(Multiple Choice)
4.8/5
(42)

Describe the risk-based audit approach.

(Essay)
4.8/5
(37)

Briefly describe tests that can be used to detect unauthorized program modifications.

(Essay)
4.8/5
(39)

Which of the following is not an information systems audit test of controls?

(Multiple Choice)
4.7/5
(28)

The ________ audit examines the reliability and integrity of accounting records.

(Multiple Choice)
4.9/5
(33)

The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as

(Multiple Choice)
4.8/5
(34)

Explain the differences between each type of audit risk.

(Essay)
4.9/5
(38)
Showing 81 - 93 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)