Exam 14: Auditing Information Technology
An audit of an organization's computer service center is normally undertaken before any information system application audit.
True
Below are listed four procedures typically performed during an audit of accounts payable:
Audit procedures:
a.Test the mathematical accuracy of the accounts payable subsidiary ledger.
b.Select samples of vouchers to examine in detail.
c.Determine whether cash discounts were properly applied.
d.Stratify accounts by value.
Required: Briefly state a generalized audit software technique that could be used to perform each procedure,assuming that the accounts payable application is computerized.
a.Use GAS to independently verify extensions and footing of the ledger.
b.Use GAS to select a random,stratified,or other sample of vouchers or voucher numbers (depending on how extensively the records are computerized).
c.Use GAS logic functions to determine when the company was eligible to take cash discounts; use GAS mathematical functions to recalculate discounts and net payables.
d.Use GAS logic functions to determine which accounts fall within the desired value ranges.
Because resources are usually limited,not all applications can be audited each year.What factors should an internal or external auditor consider when deciding which applications to audit?
When deciding which applications to audit, both internal and external auditors should consider several factors. These factors may include the level of risk associated with the application, the significance of the application to the organization's operations, the potential impact on financial reporting, and the regulatory requirements that apply to the application. Additionally, auditors should consider any recent changes or updates to the application, any historical issues or deficiencies, and the availability of resources and expertise to effectively audit the application. It is also important to consider the input from management and other stakeholders to ensure that the audit plan aligns with the organization's priorities and objectives. Ultimately, the goal is to prioritize audits based on the applications that pose the greatest risk and have the most significant impact on the organization.
GAS has a long history of usage because public accounting firms developed it in the 1960s.
Information technology is used to perform some audit work that otherwise would be done manually.The use of information technology by auditors is
CISA,CISM,and CGEIT are professional certifications in system security.
Which two information system auditing technologies are very similar?
________ is for IS audit,control,assurance and/or security professionals.
________ is an open standard which provides "good practices" across a domain and process framework and presents activities in a manageable and logical structure.
The primary audit technique used in an information systems development audit is the review and testing of related ________.
A comprehensive ________ ________ can be established by collecting,in an extended record,supplementary data concerning processing not normally collected.
Using information technology in auditing reduces the time spent on clerical tasks and may improve the overall morale and productivity of auditors.
The phase of an information systems audit in which effort is placed on fact-finding in the areas selected for audit is the
Which of the following procedures uses only auditor-prepared test transactions?
Test data used in ITF are identified by special ________ and must be excluded from normal system outputs.
Match the appropriate term with each definition. Each answer will be used only once.
A clear and obvious benefit is obtained from the ________ analysis capability provided by information technology.
When batch processing was the dominant method used in computerized data processing,the ________ approach provided an adequate audit.
ITF is the one universal auditing approach used in information system audits.
An audit of the computer service center is undertaken before any application audits to ensure the ________ ________ of the environment in which the application will function.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)