Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive more assurance that Chibuzo Incorporated is operating in an efficient,effective manner.Which type of audit would best suit the demands of the board of directors?
(Multiple Choice)
4.9/5
(40)
Which of the following is not one of the types of internal audits?
(Multiple Choice)
4.8/5
(43)
Briefly describe tests that can be used to detect unauthorized program modifications.
(Essay)
4.9/5
(32)
An auditor creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.The auditor is using
(Multiple Choice)
4.8/5
(37)
The evidence collection stage of an operational audit includes all the following activities except
(Multiple Choice)
4.7/5
(36)
Expanding a firm's operations to include a manufacturing facility in Russia will
(Multiple Choice)
4.9/5
(36)
Which of the choices below best describes a risk-based audit approach?
(Multiple Choice)
4.9/5
(33)
Strong ________ controls can partially compensate for inadequate ________ controls.
(Multiple Choice)
4.9/5
(39)
Explain why the auditor's role in program development and acquisition should be limited.
(Essay)
4.8/5
(40)
How could auditors determine if unauthorized program changes have been made?
(Multiple Choice)
4.9/5
(41)
The ________ procedure for auditing computer process controls uses a hypothetical series of valid and invalid transactions.
(Multiple Choice)
4.8/5
(45)
When doing an information systems audit,auditors must review and evaluate the program development process.What errors or fraud could occur during the program development process?
(Essay)
4.8/5
(33)
An auditor sets an embedded audit module to record all credit transactions in excess of $4,000 and stores the data in an audit log.The auditor is using
(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)