Exam 9: Auditing Computer-Based Informtion Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain why the auditor's role in program development and acquisition should be limited.

(Essay)
4.8/5
(36)

Regarding program modifications,which statement below is incorrect?

(Multiple Choice)
4.9/5
(40)

To document the review of source data controls,an auditor may use

(Multiple Choice)
4.8/5
(38)

One way an auditor gauges how much audit work and testing needs to be performed is through evaluating materiality and seeking reasonable assurance about the nature of the information or process.What is key to determining materiality during an audit?

(Multiple Choice)
4.8/5
(36)

The risk-based audit approach is

(Multiple Choice)
4.9/5
(40)

Auditing involves the

(Multiple Choice)
4.8/5
(29)

Discuss the collection of evidence in audits.

(Essay)
4.9/5
(36)

The auditor's role in systems development should be

(Multiple Choice)
5.0/5
(37)

What is the purpose of an AIS audit?

(Multiple Choice)
4.8/5
(46)

The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as

(Multiple Choice)
4.8/5
(34)

What is not a typical responsibility of an internal auditor?

(Multiple Choice)
4.8/5
(34)

A system that employs various types of advanced technology has more __________ risk than traditional batch processing.

(Multiple Choice)
4.8/5
(27)

What are the types of evidence-gathering activities generally used in an operational audit?

(Essay)
4.7/5
(33)

Which auditing technique will not assist in determining if unauthorized programming changes have been made?

(Multiple Choice)
4.8/5
(36)

Which of the following is not one of the three types of internal audits?

(Multiple Choice)
4.9/5
(38)

The evidence collection method that examines all supporting documents to determine the validity of a transaction is called

(Multiple Choice)
4.7/5
(35)

The __________ procedure for auditing computer process controls uses a hypothetical series of valid and invalid transactions.

(Multiple Choice)
4.9/5
(31)

List and explain the types of risk possible when conducting an audit.

(Essay)
4.8/5
(36)

The evidence collection method that considers the relationship and trends among information to detect items that should be investigated further is called

(Multiple Choice)
4.9/5
(39)

Which characteristics below is not a characteristic of auditing?

(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 94
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)