Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are control risks associated with the distributed data processing structure except

(Multiple Choice)
4.8/5
(38)

Explain how general controls impact transaction integrity and the financial reporting process.

(Essay)
4.8/5
(45)

Inherent risk

(Multiple Choice)
4.9/5
(39)

Which of the following is not a generally accepted auditing standard?

(Multiple Choice)
4.8/5
(34)

Which of the following is true?

(Multiple Choice)
4.8/5
(37)

Does a qualified opinion on management's assessment of internal controls over the financial reporting system necessitate a qualified opinion on the financial statements? Explain.

(Essay)
4.8/5
(38)

What is a disaster recovery plan?

(Essay)
4.8/5
(37)

What are the components of audit risk?

(Essay)
5.0/5
(42)

The PCAOB's Auditing Standard No.5 specifically requires auditors to understand transaction flows in designing their test of controls.What steps does this entail?

(Essay)
5.0/5
(40)

Compare and contrast the following disaster recovery options: empty shell,recovery operations center,and internally provided backup.Rank them from most risky to least risky,as well as most costly to least costly.

(Essay)
4.9/5
(38)

Discuss the key features of Section 404 of the Sarbanes-Oxley Act.

(Essay)
4.9/5
(45)

What are the objectives of application controls?

(Essay)
4.8/5
(37)

Briefly outline transaction cost economics as it relates to IT outsourcing.

(Essay)
4.8/5
(35)

Which of the following is not true?

(Multiple Choice)
4.9/5
(34)

Name three types of program fraud.

(Essay)
4.9/5
(41)

What fraud detection responsibilities are imposed on auditors by the Sarbanes-Oxley Act?

(Essay)
4.9/5
(29)

What is a mirrored data center?

(Essay)
4.8/5
(46)

What approach to the design and assessment of controls is recommended by PCAOB Auditing Standard No.5?

(Essay)
4.9/5
(32)

Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then steal the data.

(True/False)
5.0/5
(29)

Transaction cost economics (TCE)theory suggests that firms should outsource specific noncore IT assets.

(True/False)
4.8/5
(39)
Showing 101 - 120 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)