Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance
Exam 1: The Information System: an Accountants Perspective95 Questions
Exam 2: Introduction to Transaction Processing113 Questions
Exam 3: Ethics,fraud,and Internal Control158 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures107 Questions
Exam 6: The Expenditure Cycle Part Ii: Payroll Processing and Fixed Asset Procedures92 Questions
Exam 7: The Conversion Cycle100 Questions
Exam 8: General Ledger,financial Reporting,and Management Reporting Systems93 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle92 Questions
Exam 14: Construct,deliver,and Maintain Systems Projects93 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance128 Questions
Exam 16: IT Controls Part II: Security and Access94 Questions
Exam 17: IT Controls Part III: Systems Development, program Changes, and Application Controls67 Questions
Select questions type
Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then steal the data.
(True/False)
4.8/5
(38)
A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster.
(True/False)
4.8/5
(40)
The database administrator should be separated from systems development.
(True/False)
4.8/5
(33)
Auditors examine the physical environment of the computer center as part of their audit.Many characteristics of computer centers are of interest to auditors.What are they? Discuss.
(Essay)
4.7/5
(42)
List three pairs of system functions that should be separated in the centralized computer services organization.Describe a risk exposure if the functions are not separated.
Functions to Separate Risk Exposure
(Essay)
4.7/5
(36)
Which of the following is NOT an implication of section 302 of the Sarbanes-Oxley Act?
(Multiple Choice)
5.0/5
(36)
Distinguish between inherent risk and control risk.How do internal controls and detection risk fit in?
(Essay)
4.8/5
(25)
Assurance services is an emerging field that goes beyond the auditor's traditional attestation function.
(True/False)
4.8/5
(31)
Computer fraud can take on many forms,including each of the following except
(Multiple Choice)
4.7/5
(36)
External auditors can cooperate with and use evidence gathered by internal audit departments that are organizationally independent and that report to the Audit Committee of the Board of Directors.
(True/False)
4.7/5
(32)
Some systems professionals have unrestricted access to the organization's programs and data.
(True/False)
4.7/5
(34)
COSO identifies two broad groupings of information system controls.What are they?
(Short Answer)
4.9/5
(30)
The fundamental difference between internal and external auditing is that
(Multiple Choice)
4.8/5
(30)
Audit risk is the probability that the auditor will render an unqualified opinion on financial statements that are materially misstated.
(True/False)
4.8/5
(41)
Explain how general controls impact transaction integrity and the financial reporting process.
(Essay)
4.8/5
(34)
Showing 81 - 100 of 128
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)