Exam 8: Consideration of Internal Control in an Information Technology Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Smith Corporation has numerous customers. Customer files are kept on disk storage. Each account in the customer file contains name, address, credit limit, and account balance. The auditor wishes to test these files to determine whether credit limits are being exceeded. The best procedure for the auditor to follow would be to:

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

B

Which of the following is an example of general computer control?

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

In their consideration of a client's IT controls, the auditors will encounter general controls and application controls. Which of the following is an application control?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

B

Auditors usually begin their consideration of IT systems with tests of application controls.

(True/False)
4.8/5
(40)

Most advanced computer systems do not have audit trails.

(True/False)
4.9/5
(35)

Various characteristics of IT systems can present special audit risks. Explain each of the following characteristics of an IT system and the special audit risks that they present. a. Database system. b. Distributive data processing. c. End user computing.

(Essay)
4.8/5
(35)

The purpose of using generalized computer programs is to test and analyze a client's computer:

(Multiple Choice)
4.8/5
(34)

The capability for computers to communicate with physically remote terminals is an important feature in the design of modern business information systems. Which of the following risks associated with the use of telecommunications systems is minimized through the use of a password control system?

(Multiple Choice)
4.7/5
(35)

General controls over IT systems are typically tested using:

(Multiple Choice)
4.8/5
(38)

Distributive data processing eliminates the need for data security.

(True/False)
4.8/5
(46)

Internal control is ineffective when computer department personnel:

(Multiple Choice)
4.8/5
(40)

The operating system is an example of system software.

(True/False)
4.8/5
(34)

The completeness of computer generated sales figures can be tested by comparing the number of items listed on the daily sales report with the number of items billed on the actual invoices. This process uses:

(Multiple Choice)
5.0/5
(40)

Internal file labels are designed to prevent errors by programmers.

(True/False)
4.9/5
(33)

In a client/server environment, the "client" is most likely to be the:

(Multiple Choice)
4.8/5
(43)

Which of the following computer related employees should not be allowed access to program listings of application programs?

(Multiple Choice)
4.9/5
(31)

Generalized audit software may be used for substantive tests or for tests of controls.

(True/False)
4.8/5
(39)

When designing the physical layout of a data processing center, which of the following would be least likely to be a necessary control that is considered?

(Multiple Choice)
4.8/5
(40)

Which of the following is likely to be of least importance to an auditor in considering the internal control in a company with computer processing?

(Multiple Choice)
4.7/5
(39)

An example of an access control is a:

(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)