Exam 14: Auditing Information Technology
Exam 1: Accounting Information Systems: An Overview163 Questions
Exam 2: Systems Techniques and Documentation136 Questions
Exam 3: Ebusiness and Ecommerce121 Questions
Exam 4: Transaction Processing and the Internal Control Process138 Questions
Exam 5: Fraud Examination and Fraud Management134 Questions
Exam 6: Information Systems Security172 Questions
Exam 7: Electronic Data Processing Systems128 Questions
Exam 8: Revenue Cycle Processes128 Questions
Exam 9: Procurement and Human Resources Business Processes121 Questions
Exam 10: The Production Business Process130 Questions
Exam 11: Systems Planning, analysis, and Design163 Questions
Exam 12: Systems Project Management, implementation, operation, control135 Questions
Exam 13: Data Management Concepts147 Questions
Exam 14: Auditing Information Technology126 Questions
Select questions type
Project management controls are concerned with the maintenance of application programs.
(True/False)
4.9/5
(46)
Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms.
Match the appropriate term with each definition. Each answer will be used only once.
Match the appropriate term with each definition. Each answer will be used only once.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(38)
One very common program change control is to periodically compare actual copies of object code with duplicate copies retained in the past.
(True/False)
4.9/5
(36)
The external auditor serves the firm's stockbrokers,the government,and the general public.
(True/False)
4.9/5
(40)
ITF does not involve the input of test data into the master files of the computer system being audited.
(True/False)
4.8/5
(38)
The extended record technique provides a way to reconstruct an audit trail by
(Multiple Choice)
4.8/5
(33)
PCAOB has encouraged a risk-based approach to testing the effectiveness of internal controls as they relate to financial audits.
(True/False)
4.8/5
(29)
Total audit cost is increased significantly when some audit resources are directed at reviewing and verifying the internal controls that exist in a system.
(True/False)
4.7/5
(33)
Which of the following should be developed when the related application system is developed?
(Multiple Choice)
4.9/5
(37)
Risks associated with implementing new technologies include
(Multiple Choice)
4.9/5
(43)
Information system development audits are more common to large organizations because they often have a formal development process.
(True/False)
4.9/5
(33)
A trace can produce thousands of output records if an excessive number of transactions are tagged.
(True/False)
4.7/5
(39)
Which of the following information system auditing technologies produces a printed audit trail of computer processing?
(Multiple Choice)
4.8/5
(36)
IT governance has the objective of enhancing and ensuring the efficient application of IT resources
(Multiple Choice)
4.8/5
(39)
The ________ ________ technique may be used to verify input transaction validation routines.
(Short Answer)
4.7/5
(40)
________ is an IT governance professional certification for individuals who manage,design,oversee,and assess an enterprise's information security program.
(Short Answer)
4.8/5
(47)
Showing 81 - 100 of 126
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)