Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing122 Questions
Exam 3: Ethics,fraud,and Internal Control161 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures110 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting,and Management Reporting Systems100 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems95 Questions
Exam 12: Electronic Commerce Systems109 Questions
Exam 13: Managing the Systems Development Life Cycle94 Questions
Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 15: Auditing It Controls Part II: Security and Access95 Questions
Exam 16: Auditing It Controls Part III: Systems Development, program Changes, and Application Auditing66 Questions
Select questions type
All of the following are recommended features of a fire protection system for a computer center except
(Multiple Choice)
4.8/5
(33)
All of the following tests of controls will provide evidence about the adequacy of the disaster recovery plan except
(Multiple Choice)
4.7/5
(36)
An IT auditor expresses an opinion on the fairness of the financial statements.
(True/False)
4.8/5
(38)
Auditors examine the physical environment of the computer center as part of their audit.Many characteristics of computer centers are of interest to auditors.What are they? Discuss.
(Essay)
4.7/5
(45)
Application controls apply to a wide range of exposures that threaten the integrity of all programs processed within the computer environment.
(True/False)
4.8/5
(44)
Some systems professionals have unrestricted access to the organization's programs and data.
(True/False)
4.8/5
(28)
The most common access point for perpetrating computer fraud is at the data collection stage.
(True/False)
4.9/5
(34)
All of the following tests of controls will provide evidence about the physical security of the computer center except
(Multiple Choice)
4.7/5
(34)
Commodity IT assets are easily acquired in the marketplace and should be outsourced under the core competency theory.
(True/False)
4.8/5
(34)
Explain the role of an SSAE 16 report in reviewing internal controls.
(Essay)
4.8/5
(35)
Explain the relationship between internal controls and substantive testing.
(Essay)
4.9/5
(37)
Audit risk is the probability that the auditor will render an unqualified opinion on financial statements that are materially misstated.
(True/False)
5.0/5
(28)
Showing 81 - 100 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)