Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing122 Questions
Exam 3: Ethics,fraud,and Internal Control161 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures110 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting,and Management Reporting Systems100 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems95 Questions
Exam 12: Electronic Commerce Systems109 Questions
Exam 13: Managing the Systems Development Life Cycle94 Questions
Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 15: Auditing It Controls Part II: Security and Access95 Questions
Exam 16: Auditing It Controls Part III: Systems Development, program Changes, and Application Auditing66 Questions
Select questions type
External auditing is an independent appraisal function established within an organization to examine and evaluate its activities as a service to the organization.
(True/False)
4.8/5
(51)
List three pairs of system functions that should be separated in the centralized computer services organization.Describe a risk exposure if the functions are not separated.


(Essay)
4.8/5
(40)
The same internal control objectives apply to manual and computer-based information systems.
(True/False)
4.9/5
(42)
The distributed data processing approach carries some control implications of which accountants should be aware.Discuss two.
(Essay)
4.8/5
(32)
IT auditing is a small part of most external and internal audits.
(True/False)
4.7/5
(34)
The least important item to store off-site in case of an emergency is
(Multiple Choice)
4.8/5
(40)
Changing the Hours Worked field in an otherwise legitimate payroll transaction to increase the amount of the paycheck is an example of data collection fraud.
(True/False)
4.9/5
(29)
Distinguish between inherent risk and control risk.How do internal controls and detection risk fit in?
(Essay)
4.9/5
(35)
Corporate management (including the CEO)must certify monthly and annually their organization's internal controls over financial reporting.
(True/False)
4.8/5
(36)
For most companies,which of the following is the least critical application for disaster recovery purposes?
(Multiple Choice)
4.9/5
(40)
Discuss the advantages and disadvantages of the second site backup options.
(Essay)
4.7/5
(32)
Statements on Auditing Standards recommendations must be followed by every member of the profession unless it can be shown why a standard does not apply in a given situation.
(True/False)
4.8/5
(42)
Adequate backups will protect against all of the following except
(Multiple Choice)
4.9/5
(38)
Supervision in a computerized environment is more complex than in a manual environment for all of the following reasons except
(Multiple Choice)
5.0/5
(39)
A strong internal control system will reduce the amount of substantive testing that must be performed.
(True/False)
5.0/5
(30)
Why should new systems development activities be segregated from the program change (maintenance)function?
(Essay)
4.8/5
(34)
External auditors can cooperate with and use evidence gathered by internal audit departments that are organizationally independent and that report to the audit committee of the board of directors.
(True/False)
4.7/5
(42)
Showing 61 - 80 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)