Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control161 Questions
Exam 4: The Revenue Cycle119 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures111 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects92 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 16: IT Controls Part II: Security and Access96 Questions
Exam 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls67 Questions
Select questions type
Computer fraud can take on many forms, including each of the following except
(Multiple Choice)
5.0/5
(34)
The most common access point for perpetrating computer fraud is at the data collection stage.
(True/False)
4.9/5
(37)
Application controls apply to a wide range of exposures that threaten the integrity of all programs processed within the computer environment.
(True/False)
4.9/5
(32)
The database administrator should be separated from systems development.
(True/False)
4.7/5
(36)
List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated.
Functions to Separate
Risk Exposure
__________________________
__________________________
__________________________
__________________________
__________________________
__________________________
(Essay)
4.9/5
(33)
For most companies, which of the following is the least critical application for disaster recovery purposes?
(Multiple Choice)
4.8/5
(33)
Prior to SOX, external auditors were required to be familiar with the client organization's internal controls, but not test them. Explain.
(Essay)
4.9/5
(34)
The same internal control objectives apply to manual and computer-based information systems.
(True/False)
4.8/5
(38)
Which organizational structure is most likely to result in good documentation procedures?
(Multiple Choice)
4.7/5
(37)
Briefly explain how a SSAE 16 report is used in assessing internal controls of outsourced facilities.
(Essay)
4.8/5
(33)
The PCAOB's standard No. 5 specifically requires auditors to understand transaction flows in designing their test of controls. What steps does this entail?
(Essay)
4.8/5
(31)
All of the following are recommended features of a fire protection system for a computer center except
(Multiple Choice)
4.8/5
(35)
Showing 41 - 60 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)