Exam 11: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.

(Multiple Choice)
4.8/5
(39)

True or False: During the evidence evaluation stage of an operational audit,the auditor measures the system against generally accepted accounting principles (GAAP).

(True/False)
4.9/5
(35)

Who generally receives the findings and conclusions of an operational audit?

(Multiple Choice)
4.7/5
(39)

Increasing the effectiveness of internal controls would have the greatest effect on

(Multiple Choice)
4.9/5
(35)

Identify the activity below that the external auditor should not be involved.

(Multiple Choice)
4.7/5
(44)

An auditor sets an embedded audit module to flag questionable online transactions,display information about the transaction on the auditor's computer,and send a text message to the auditor's cell phone.The auditor is using

(Multiple Choice)
4.8/5
(37)

You are the head of the internal audit department for Apple Computer.You want to hire a person to serve as one of Apple's operational auditors.Identify the candidate below that is likely to be the most qualified person for the job.

(Multiple Choice)
4.8/5
(28)

True or False: One of the advantages of CAATS software is that it can replace the auditor's judgment in specific areas of an audit.

(True/False)
4.9/5
(35)

Which auditing technique will not assist in determining if unauthorized programming changes have been made?

(Multiple Choice)
4.9/5
(42)

A system that employs various types of advanced technology has more ________ risk than traditional batch processing.

(Multiple Choice)
4.9/5
(36)

The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as

(Multiple Choice)
4.8/5
(41)

How and to whom does an auditor communicate the audit results?

(Essay)
4.9/5
(30)

Which of the following is an information systems audit review procedure?

(Multiple Choice)
4.8/5
(41)

The evidence collection method that considers the relationships and trends among information to detect items that should be investigated further is called

(Multiple Choice)
4.8/5
(40)

An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example of collecting audit evidence by

(Multiple Choice)
4.8/5
(36)

Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?

(Essay)
4.9/5
(24)

What is not a typical responsibility of an internal auditor?

(Multiple Choice)
4.8/5
(38)

Identify the company below that CAATS would likely provide the most value.

(Multiple Choice)
4.8/5
(41)

Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as

(Multiple Choice)
4.9/5
(30)

An auditor might use ________ to convert data from several sources into a single common format.

(Multiple Choice)
4.9/5
(34)
Showing 61 - 80 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)