Exam 16: Auditing It Controls Part III: Systems Development, program Changes, and Application Auditing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are program version numbers and how are they used?

(Essay)
4.9/5
(33)

Use of the integrated test facility poses no threat to organizational data files.

(True/False)
4.7/5
(36)

What is meant by auditing around the computer versus auditing through the computer? Why is this so important?

(Essay)
4.8/5
(34)

Which control ensures that production files cannot be accessed without specific permission?

(Multiple Choice)
4.7/5
(34)

Routine maintenance activities require all of the following controls except

(Multiple Choice)
4.9/5
(38)

All of the following are advantages of the test data technique except

(Multiple Choice)
4.7/5
(37)

The programmer's authority table will specify the libraries a programmer may access.

(True/False)
4.7/5
(31)

Identify six controllable activities that distinguish an effective systems development process.

(Essay)
4.8/5
(36)

What are CAATS? Identify five of them.

(Essay)
4.9/5
(43)

Which control is not associated with new systems development activities?

(Multiple Choice)
4.9/5
(47)

The results of a parallel simulation are compared to the results of a production run in order to judge the quality of the application processes and controls.

(True/False)
4.8/5
(31)

All of the following are disadvantages of the test data technique except

(Multiple Choice)
4.9/5
(37)

All of the following concepts are associated with the black box approach to auditing computer applications except

(Multiple Choice)
4.8/5
(35)

When the auditor reconciles the program version numbers,which audit objective is being tested?

(Multiple Choice)
4.8/5
(32)

What is ITF?

(Essay)
4.8/5
(42)

What distinguishing a salami fraud?

(Essay)
4.8/5
(39)

The technical design activities translate a system's set of detailed technical specifications into user specifications.

(True/False)
4.7/5
(39)

Name two methods used to control the source program library.

(Essay)
4.9/5
(45)

Which test of controls will provide evidence that the system as originally implemented was free from material errors and free from fraud?

(Multiple Choice)
4.8/5
(32)

All program modules must be thoroughly tested before they are implemented.

(True/False)
4.8/5
(37)
Showing 21 - 40 of 66
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)