Exam 14: Auditing Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The auditor performs a review of systems documentation

(Multiple Choice)
4.9/5
(38)

Tracing of a program's execution provides

(Multiple Choice)
4.8/5
(39)

Some embedded audit routines use automated collection language (ACL)to embed specially programmed modules as in-line code with regular programs.

(True/False)
4.9/5
(35)

Maturity models are used to evaluate an organization's relative level of achievement of IT governance on a scale from 1-10.

(True/False)
4.8/5
(33)

Which of the following processes real data through a test program?

(Multiple Choice)
4.7/5
(44)

Information systems application audits differ from information systems audits because application audits

(Multiple Choice)
5.0/5
(35)

________ is for individuals who manage,design,oversee,and assess an enterprise's information security program.

(Multiple Choice)
4.9/5
(33)

The use of information technology to perform audit work is known as auditing

(Multiple Choice)
4.9/5
(32)

________ can be effectively used in conjunction with a test data technique.

(Short Answer)
4.8/5
(34)

________ models are used to evaluate an organization's relative level of achievement of IT governance and shows what has to be done to improve.

(Multiple Choice)
4.8/5
(33)

COBIT contains 34 IT processes and organizes them into 8 domains.

(True/False)
4.8/5
(37)

________ auditors commonly undertake audits that are reviewed and relied upon by ________ auditors.

(Short Answer)
4.9/5
(41)

Compliance testing is the key activity performed in which phase of an information systems audit?

(Multiple Choice)
4.8/5
(34)

Using embedded audit routine technology,an auditor may program a module so that the test limits can be altered as desired.This approach has been termed

(Multiple Choice)
4.8/5
(45)

A financial statement audit

(Multiple Choice)
4.8/5
(33)

Development standards are major general controls in computerized systems.

(True/False)
4.7/5
(45)

The comparison of input to output is known as auditing

(Multiple Choice)
4.7/5
(39)

The information systems auditing technique that uses special software to monitor the execution of a program is called

(Multiple Choice)
4.8/5
(31)

An information systems application audit focuses almost exclusively on the testing of processing controls.

(True/False)
4.7/5
(36)

________ provides assurances relating to the effectiveness of an organization's enterprise risk management processes.

(Multiple Choice)
4.8/5
(36)
Showing 61 - 80 of 126
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)