Exam 14: Auditing Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Project management controls are concerned with the maintenance of application programs.

(True/False)
4.9/5
(46)
Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms.
Match the appropriate term with each definition. Each answer will be used only once.
Audit program
The second stage of a financial statement audit which uses substantive testing for direct verification of financial statement figures
System control audit review file
Software that allows the auditor to use PCs to perform audit tasks
Auditing around-the-computer
Information systems auditing approach in which the processing portion of a computer system is ignored
Correct Answer:
Verified
Premises:
Responses:
Audit program
The second stage of a financial statement audit which uses substantive testing for direct verification of financial statement figures
System control audit review file
Software that allows the auditor to use PCs to perform audit tasks
Auditing around-the-computer
Information systems auditing approach in which the processing portion of a computer system is ignored
In-line code
A detailed list of the procedures to be applied on a particular audit
Financial statement audit
Analytic documentation or other graphic techniques used to describe the controls in a system
Control flowcharting
The use of in-line code to randomly select transactions for audit analysis
Test data
Auditor-prepared input containing both valid and invalid data
Embedded audit routines
Special auditing routines included in regular computer programs so that transaction data can be subjected to audit analysis
Sample audit review file
An application program performs an embedded audit routine such as data collection at the same time as it processes data for normal use
PC software
Auditor-determined programmed edit tests for audit transaction analysis are included in a program as it is initially developed
(Matching)
4.9/5
(38)

One very common program change control is to periodically compare actual copies of object code with duplicate copies retained in the past.

(True/False)
4.9/5
(36)

The external auditor serves the firm's stockbrokers,the government,and the general public.

(True/False)
4.9/5
(40)

ITF does not involve the input of test data into the master files of the computer system being audited.

(True/False)
4.8/5
(38)

The extended record technique provides a way to reconstruct an audit trail by

(Multiple Choice)
4.8/5
(33)

PCAOB has encouraged a risk-based approach to testing the effectiveness of internal controls as they relate to financial audits.

(True/False)
4.8/5
(29)

Total audit cost is increased significantly when some audit resources are directed at reviewing and verifying the internal controls that exist in a system.

(True/False)
4.7/5
(33)

Which of the following should be developed when the related application system is developed?

(Multiple Choice)
4.9/5
(37)

COBIT has four domains that include

(Multiple Choice)
4.9/5
(32)

An interim audit

(Multiple Choice)
4.9/5
(33)

Risks associated with implementing new technologies include

(Multiple Choice)
4.9/5
(43)

Information system development audits are more common to large organizations because they often have a formal development process.

(True/False)
4.9/5
(33)

Each COBIT IT process should have its own navigation diagram.

(True/False)
4.8/5
(36)

A trace can produce thousands of output records if an excessive number of transactions are tagged.

(True/False)
4.7/5
(39)

Which of the following information system auditing technologies produces a printed audit trail of computer processing?

(Multiple Choice)
4.8/5
(36)

IT governance has the objective of enhancing and ensuring the efficient application of IT resources

(Multiple Choice)
4.8/5
(39)

The ________ ________ technique may be used to verify input transaction validation routines.

(Short Answer)
4.7/5
(40)

ITF is a powerful information system audit technology.

(True/False)
4.8/5
(33)

________ is an IT governance professional certification for individuals who manage,design,oversee,and assess an enterprise's information security program.

(Short Answer)
4.8/5
(47)
Showing 81 - 100 of 126
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)