Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then steal the data.

(True/False)
4.8/5
(38)

A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster.

(True/False)
4.8/5
(40)

The database administrator should be separated from systems development.

(True/False)
4.8/5
(33)

Auditors examine the physical environment of the computer center as part of their audit.Many characteristics of computer centers are of interest to auditors.What are they? Discuss.

(Essay)
4.7/5
(42)

List three pairs of system functions that should be separated in the centralized computer services organization.Describe a risk exposure if the functions are not separated. Functions to Separate Risk Exposure

(Essay)
4.7/5
(36)

Which of the following is NOT an implication of section 302 of the Sarbanes-Oxley Act?

(Multiple Choice)
5.0/5
(36)

What are the objectives of application controls?

(Essay)
4.7/5
(38)

Distinguish between inherent risk and control risk.How do internal controls and detection risk fit in?

(Essay)
4.8/5
(25)

Assurance services is an emerging field that goes beyond the auditor's traditional attestation function.

(True/False)
4.8/5
(31)

Computer fraud can take on many forms,including each of the following except

(Multiple Choice)
4.7/5
(36)

External auditors can cooperate with and use evidence gathered by internal audit departments that are organizationally independent and that report to the Audit Committee of the Board of Directors.

(True/False)
4.7/5
(32)

Some systems professionals have unrestricted access to the organization's programs and data.

(True/False)
4.7/5
(34)

Attestation services require all of the following except

(Multiple Choice)
4.8/5
(43)

An advantage of a recovery operations center is that

(Multiple Choice)
4.7/5
(33)

COSO identifies two broad groupings of information system controls.What are they?

(Short Answer)
4.9/5
(30)

Operations fraud includes

(Multiple Choice)
4.8/5
(36)

The fundamental difference between internal and external auditing is that

(Multiple Choice)
4.8/5
(30)

Audit risk is the probability that the auditor will render an unqualified opinion on financial statements that are materially misstated.

(True/False)
4.8/5
(41)

Explain how general controls impact transaction integrity and the financial reporting process.

(Essay)
4.8/5
(34)

What is scavenging?

(Essay)
4.7/5
(42)
Showing 81 - 100 of 128
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)