Exam 11: Auditing Computer-Based Information Systems
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.
(Multiple Choice)
4.8/5
(39)
True or False: During the evidence evaluation stage of an operational audit,the auditor measures the system against generally accepted accounting principles (GAAP).
(True/False)
4.9/5
(35)
Who generally receives the findings and conclusions of an operational audit?
(Multiple Choice)
4.7/5
(39)
Increasing the effectiveness of internal controls would have the greatest effect on
(Multiple Choice)
4.9/5
(35)
Identify the activity below that the external auditor should not be involved.
(Multiple Choice)
4.7/5
(44)
An auditor sets an embedded audit module to flag questionable online transactions,display information about the transaction on the auditor's computer,and send a text message to the auditor's cell phone.The auditor is using
(Multiple Choice)
4.8/5
(37)
You are the head of the internal audit department for Apple Computer.You want to hire a person to serve as one of Apple's operational auditors.Identify the candidate below that is likely to be the most qualified person for the job.
(Multiple Choice)
4.8/5
(28)
True or False: One of the advantages of CAATS software is that it can replace the auditor's judgment in specific areas of an audit.
(True/False)
4.9/5
(35)
Which auditing technique will not assist in determining if unauthorized programming changes have been made?
(Multiple Choice)
4.9/5
(42)
A system that employs various types of advanced technology has more ________ risk than traditional batch processing.
(Multiple Choice)
4.9/5
(36)
The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as
(Multiple Choice)
4.8/5
(41)
Which of the following is an information systems audit review procedure?
(Multiple Choice)
4.8/5
(41)
The evidence collection method that considers the relationships and trends among information to detect items that should be investigated further is called
(Multiple Choice)
4.8/5
(40)
An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example of collecting audit evidence by
(Multiple Choice)
4.8/5
(36)
Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?
(Essay)
4.9/5
(24)
What is not a typical responsibility of an internal auditor?
(Multiple Choice)
4.8/5
(38)
Identify the company below that CAATS would likely provide the most value.
(Multiple Choice)
4.8/5
(41)
Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as
(Multiple Choice)
4.9/5
(30)
An auditor might use ________ to convert data from several sources into a single common format.
(Multiple Choice)
4.9/5
(34)
Showing 61 - 80 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)