Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control161 Questions
Exam 4: The Revenue Cycle119 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures111 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects92 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 16: IT Controls Part II: Security and Access96 Questions
Exam 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls67 Questions
Select questions type
Which of the following is NOT a requirement in management's report on the effectiveness of internal controls over financial reporting?
(Multiple Choice)
4.8/5
(34)
Which of the following is not a generally accepted auditing standard general standard?
(Multiple Choice)
4.8/5
(42)
Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then steal the data.
(True/False)
4.7/5
(40)
IT auditing is a small part of most external and internal audits.
(True/False)
4.9/5
(42)
Internal control in a computerized environment can be divided into two broad categories. What are they? Explain each.
(Essay)
4.8/5
(38)
The financial statements of an organization reflect a set of management assertions about the financial health of the business. All of the following describe types of assertions except
(Multiple Choice)
4.8/5
(31)
Compare and contrast the following disaster recovery options: empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as most costly to least costly.
(Essay)
4.8/5
(46)
For disaster recovery purposes, what criteria are used to identify an application or data as critical?
(Essay)
4.8/5
(28)
Both the SEC and the PCAOB require management to use the COSO framework for assessing internal control adequacy.
(True/False)
4.8/5
(29)
To ensure sound internal control, program coding and program processing should be separated.
(True/False)
4.8/5
(43)
What fraud detection responsibilities (if any) are imposed on auditors by the Sarbanes-Oxley Act?
(Essay)
4.9/5
(38)
External auditors can cooperate with and use evidence gathered by internal audit departments that are organizationally independent and that report to the Audit Committee of the Board of Directors.
(True/False)
4.9/5
(35)
Showing 21 - 40 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)