Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
________ is one tool used to document source data controls.
(Multiple Choice)
4.9/5
(51)
a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?
(Essay)
4.8/5
(35)
What type of data does CAATS use to produce an auditing program?
(Multiple Choice)
4.7/5
(40)
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that blocks of code are superseded by other blocks of code.Blocks of code that are not executed by the program can be identified by
(Multiple Choice)
4.9/5
(34)
Which type of work listed below is not typical of internal auditors?
(Multiple Choice)
4.8/5
(40)
Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive independent assurance regarding the financial statements,which are generated using an accounting information system.Which type of audit would best suit the demands of the board of directors?
(Multiple Choice)
4.8/5
(39)
A(n)________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.
(Multiple Choice)
4.9/5
(42)
A type of software that auditors can use to analyze program logic and detect unexecuted program code is
(Multiple Choice)
4.8/5
(35)
Assessing the quality of internal controls,the reliability of information,and operating performance are all part of
(Multiple Choice)
4.7/5
(31)
The ________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.
(Multiple Choice)
4.8/5
(29)
How has the U.S.government deployed computer-assisted audit techniques to reduce the budget?
(Multiple Choice)
4.9/5
(36)
Verifying the accuracy of certain information,often through communication with third parties,is known as
(Multiple Choice)
4.8/5
(44)
________can determine whether the necessary control procedures are in place.
(Multiple Choice)
4.8/5
(34)
In the ________ stage of an operational audit,the auditor measures the actual system against an ideal standard.
(Multiple Choice)
4.8/5
(32)
True or False: Embedded audit molecules can be used to continually monitor the system and collect audit evidence.
(True/False)
4.7/5
(33)
The scope of a(n)________ audit encompasses all aspects of systems management.
(Multiple Choice)
4.7/5
(41)
Which statement below is incorrect regarding program modifications?
(Multiple Choice)
4.9/5
(32)
An auditor sets an embedded audit module to flag all credit transactions in excess of $3,000.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using
(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)