Exam 9: Auditing Computer-Based Informtion Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Using the risk-based auditing approach,when the auditor identifies a control deficiency,the auditor should inquire about

(Multiple Choice)
4.8/5
(32)

The type of audit in which the primary responsibility of the auditors is the management of the organization is

(Multiple Choice)
4.8/5
(36)

Much of the effort spent in an audit entails the collection of evidence.Verifying the accuracy of certain information,often through communication with certain third parties,is known in the language of the auditor as

(Multiple Choice)
4.7/5
(31)

The scope of a(n)__________ audit encompasses all aspects of information systems management.

(Multiple Choice)
4.9/5
(30)

Why are audit tests and procedures performed on a sample basis?

(Essay)
4.8/5
(36)

The auditor seeks ____________ that no _______________ exist in the audited process.

(Multiple Choice)
4.7/5
(32)

The __________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.

(Multiple Choice)
4.8/5
(28)

Reference to the operational policies manual indicate that all visitors to the production facility should produce photo identification and be signed in and out with the times noted.Observation indicates that guards often wave people through if they are accompanied by a known employee.This is an application of which of the following five internal audit scope standards?

(Multiple Choice)
4.9/5
(32)

One function of CAS is to review data files to retrieve records meeting a specified criteria.What is this function called?

(Multiple Choice)
4.8/5
(40)

An auditor examining a firm's accounting information system creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.This is an example collecting audit evidence using

(Multiple Choice)
4.8/5
(36)

An internal auditor has set the firm's information system to flag questionable online transactions,The system then displays information about the transaction on the auditor's computer system and sends a text message to the auditor's cell phone.This is an example of collecting audit evidence using

(Multiple Choice)
4.9/5
(38)

An auditor examines documents related to the acquisition and disposal of a firm's delivery van and manually calculates accumulated depreciation for comparison with accounting records.This is an example collecting audit evidence by

(Multiple Choice)
4.9/5
(34)

Name the different types of audits.

(Essay)
4.8/5
(31)

The auditor has various software programs available to help in the audit effort.A program that,based on auditor specifications,generates programs that perform certain audit functions is referred to a(n)

(Multiple Choice)
4.7/5
(36)
Showing 81 - 94 of 94
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)