Exam 14: Auditing Information Technology
Exam 1: Accounting Information Systems: An Overview163 Questions
Exam 2: Systems Techniques and Documentation136 Questions
Exam 3: Ebusiness and Ecommerce121 Questions
Exam 4: Transaction Processing and the Internal Control Process138 Questions
Exam 5: Fraud Examination and Fraud Management134 Questions
Exam 6: Information Systems Security172 Questions
Exam 7: Electronic Data Processing Systems128 Questions
Exam 8: Revenue Cycle Processes128 Questions
Exam 9: Procurement and Human Resources Business Processes121 Questions
Exam 10: The Production Business Process130 Questions
Exam 11: Systems Planning, analysis, and Design163 Questions
Exam 12: Systems Project Management, implementation, operation, control135 Questions
Exam 13: Data Management Concepts147 Questions
Exam 14: Auditing Information Technology126 Questions
Select questions type
The verification of controls in a computer system is known as auditing
(Multiple Choice)
4.8/5
(51)
Probably the oldest (and still widely used)information systems auditing technique is
(Multiple Choice)
4.9/5
(31)
The phase of an information systems audit in which an audit program is created is the
(Multiple Choice)
4.9/5
(43)
All embedded audit routine techniques require a(n)________ level of technical expertise to set up,and at least a(n)________ level of knowledge to use them effectively.
(Short Answer)
4.8/5
(34)
Why are most audits now performed by auditing through and with the computer?
(Short Answer)
4.7/5
(34)
Using an integrated-test-facility approach,________ testing is appropriate to ________,real-time processing technology.
(Short Answer)
4.9/5
(45)
The degree of independence that auditors can maintain while developing embedded audit routines will depend largely on the level of technical expertise that they possess.
(True/False)
4.9/5
(31)
RBA provides assurances relating to the effectiveness of an organization's ________ ________ ________ processes.
(Short Answer)
4.9/5
(32)
An IT governance framework such as ________ can be a critical element in ensuring proper control and governance over information and the systems that create,store,manipulate,and retrieve that information.
(Multiple Choice)
4.9/5
(37)
IT governance has the objective of enhancing and ensuring the efficient application of IT resources as a critical success factor.
(True/False)
4.9/5
(37)
Which of the following statements is an advantage to using the test data technique in information systems auditing?
(Multiple Choice)
4.8/5
(29)
An external auditor conducts an information systems audit using the professional standards promulgated by the
(Multiple Choice)
4.7/5
(34)
How have personal computers likely affected information systems audits?
(Short Answer)
4.9/5
(27)
Which of the following statements is a disadvantage to using the integrated-test-facility (ITF)approach in information systems auditing?
(Multiple Choice)
4.7/5
(40)
Parallel simulation is appropriate where transactions are sufficiently important to require a 100 percent audit.
(True/False)
4.8/5
(41)
Snapshot technology is generally incorporated into extended records for later review by auditors.
(True/False)
4.9/5
(33)
The Public Company Accounting Oversight Board (PCAOB)has encouraged a risk-based approach to test the effectiveness of ________ as they relate to financial audits.
(Multiple Choice)
4.8/5
(34)
Showing 41 - 60 of 126
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)