Exam 14: Auditing Information Technology
Exam 1: Accounting Information Systems: An Overview163 Questions
Exam 2: Systems Techniques and Documentation136 Questions
Exam 3: Ebusiness and Ecommerce121 Questions
Exam 4: Transaction Processing and the Internal Control Process138 Questions
Exam 5: Fraud Examination and Fraud Management134 Questions
Exam 6: Information Systems Security172 Questions
Exam 7: Electronic Data Processing Systems128 Questions
Exam 8: Revenue Cycle Processes128 Questions
Exam 9: Procurement and Human Resources Business Processes121 Questions
Exam 10: The Production Business Process130 Questions
Exam 11: Systems Planning, analysis, and Design163 Questions
Exam 12: Systems Project Management, implementation, operation, control135 Questions
Exam 13: Data Management Concepts147 Questions
Exam 14: Auditing Information Technology126 Questions
Select questions type
Some embedded audit routines use automated collection language (ACL)to embed specially programmed modules as in-line code with regular programs.
(True/False)
4.9/5
(35)
Maturity models are used to evaluate an organization's relative level of achievement of IT governance on a scale from 1-10.
(True/False)
4.8/5
(33)
Which of the following processes real data through a test program?
(Multiple Choice)
4.7/5
(44)
Information systems application audits differ from information systems audits because application audits
(Multiple Choice)
5.0/5
(35)
________ is for individuals who manage,design,oversee,and assess an enterprise's information security program.
(Multiple Choice)
4.9/5
(33)
The use of information technology to perform audit work is known as auditing
(Multiple Choice)
4.9/5
(32)
________ can be effectively used in conjunction with a test data technique.
(Short Answer)
4.8/5
(34)
________ models are used to evaluate an organization's relative level of achievement of IT governance and shows what has to be done to improve.
(Multiple Choice)
4.8/5
(33)
COBIT contains 34 IT processes and organizes them into 8 domains.
(True/False)
4.8/5
(37)
________ auditors commonly undertake audits that are reviewed and relied upon by ________ auditors.
(Short Answer)
4.9/5
(41)
Compliance testing is the key activity performed in which phase of an information systems audit?
(Multiple Choice)
4.8/5
(34)
Using embedded audit routine technology,an auditor may program a module so that the test limits can be altered as desired.This approach has been termed
(Multiple Choice)
4.8/5
(45)
Development standards are major general controls in computerized systems.
(True/False)
4.7/5
(45)
The information systems auditing technique that uses special software to monitor the execution of a program is called
(Multiple Choice)
4.8/5
(31)
An information systems application audit focuses almost exclusively on the testing of processing controls.
(True/False)
4.7/5
(36)
________ provides assurances relating to the effectiveness of an organization's enterprise risk management processes.
(Multiple Choice)
4.8/5
(36)
Showing 61 - 80 of 126
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)