Exam 14: Auditing Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An audit of an organization's computer service center is normally undertaken before any information system application audit.

Free
(True/False)
4.9/5
(27)
Correct Answer:
Verified

True

Below are listed four procedures typically performed during an audit of accounts payable: Audit procedures: a.Test the mathematical accuracy of the accounts payable subsidiary ledger. b.Select samples of vouchers to examine in detail. c.Determine whether cash discounts were properly applied. d.Stratify accounts by value. Required: Briefly state a generalized audit software technique that could be used to perform each procedure,assuming that the accounts payable application is computerized.

Free
(Essay)
4.7/5
(42)
Correct Answer:
Verified

a.Use GAS to independently verify extensions and footing of the ledger.
b.Use GAS to select a random,stratified,or other sample of vouchers or voucher numbers (depending on how extensively the records are computerized).
c.Use GAS logic functions to determine when the company was eligible to take cash discounts; use GAS mathematical functions to recalculate discounts and net payables.
d.Use GAS logic functions to determine which accounts fall within the desired value ranges.

Because resources are usually limited,not all applications can be audited each year.What factors should an internal or external auditor consider when deciding which applications to audit?

Free
(Essay)
4.9/5
(36)
Correct Answer:
Answered by Examlex AI Copilot

When deciding which applications to audit, both internal and external auditors should consider several factors. These factors may include the level of risk associated with the application, the significance of the application to the organization's operations, the potential impact on financial reporting, and the regulatory requirements that apply to the application. Additionally, auditors should consider any recent changes or updates to the application, any historical issues or deficiencies, and the availability of resources and expertise to effectively audit the application. It is also important to consider the input from management and other stakeholders to ensure that the audit plan aligns with the organization's priorities and objectives. Ultimately, the goal is to prioritize audits based on the applications that pose the greatest risk and have the most significant impact on the organization.

GAS has a long history of usage because public accounting firms developed it in the 1960s.

(True/False)
5.0/5
(32)

Information technology is used to perform some audit work that otherwise would be done manually.The use of information technology by auditors is

(Multiple Choice)
4.7/5
(30)

CISA,CISM,and CGEIT are professional certifications in system security.

(True/False)
4.9/5
(35)

Which two information system auditing technologies are very similar?

(Multiple Choice)
4.8/5
(29)

________ is for IS audit,control,assurance and/or security professionals.

(Multiple Choice)
4.9/5
(37)

________ is an open standard which provides "good practices" across a domain and process framework and presents activities in a manageable and logical structure.

(Short Answer)
4.9/5
(39)

The primary audit technique used in an information systems development audit is the review and testing of related ________.

(Short Answer)
4.9/5
(33)

A comprehensive ________ ________ can be established by collecting,in an extended record,supplementary data concerning processing not normally collected.

(Short Answer)
4.9/5
(41)

Using information technology in auditing reduces the time spent on clerical tasks and may improve the overall morale and productivity of auditors.

(True/False)
4.7/5
(37)

The phase of an information systems audit in which effort is placed on fact-finding in the areas selected for audit is the

(Multiple Choice)
4.9/5
(37)

Which of the following procedures uses only auditor-prepared test transactions?

(Multiple Choice)
4.9/5
(34)

Test data used in ITF are identified by special ________ and must be excluded from normal system outputs.

(Short Answer)
4.8/5
(40)
Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms.
Match the appropriate term with each definition. Each answer will be used only once.
Mapping
Modification of programs to collect and store additional data of audit interest
Compliance testing
Computer programs that permit the computer to be used as an auditing tool
Extended records
Special software that is used to monitor the executing of a program
Correct Answer:
Verified
Premises:
Responses:
Mapping
Modification of programs to collect and store additional data of audit interest
Compliance testing
Computer programs that permit the computer to be used as an auditing tool
Extended records
Special software that is used to monitor the executing of a program
Substantive testing
The first stage of a financial statement audit which has the objective of establishing the degree to which the internal control system can be relied upon
Interim audit
Provides a detailed audit trail of the instructions executed during a program's operation
Snapshot
Modification of programs to output data of audit interest
Parallel simulation
Direct verification of balances contained in financial statements
Audit software
The auditor manually processes test or real data through the logic of a computer program
Desk checking
Testing to confirm the existence, assess the effectiveness, and check the continuity of operation of internal controls
Tracing
The processing of real data through audit programs, with the simulated output and the regular output compared for control purposes
(Matching)
4.9/5
(48)

A clear and obvious benefit is obtained from the ________ analysis capability provided by information technology.

(Short Answer)
4.9/5
(43)

When batch processing was the dominant method used in computerized data processing,the ________ approach provided an adequate audit.

(Short Answer)
4.9/5
(35)

ITF is the one universal auditing approach used in information system audits.

(True/False)
4.8/5
(31)

An audit of the computer service center is undertaken before any application audits to ensure the ________ ________ of the environment in which the application will function.

(Short Answer)
4.9/5
(39)
Showing 1 - 20 of 126
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)