Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Tests of controls include

(Multiple Choice)
4.9/5
(42)

What primary IT functions must be separated in a centralized firm?

(Essay)
5.0/5
(34)

Computer fraud can take on many forms, including each of the following except

(Multiple Choice)
5.0/5
(34)

The most common access point for perpetrating computer fraud is at the data collection stage.

(True/False)
4.9/5
(37)

Application controls apply to a wide range of exposures that threaten the integrity of all programs processed within the computer environment.

(True/False)
4.9/5
(32)

The database administrator should be separated from systems development.

(True/False)
4.7/5
(36)

What are commodity IT assets?

(Essay)
4.9/5
(38)

Discuss the key features of Section 302 of the Sarbanes-Oxley Act.

(Essay)
4.8/5
(35)

List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated. Functions to Separate Risk Exposure __________________________ __________________________ __________________________ __________________________ __________________________ __________________________

(Essay)
4.9/5
(33)

Name three forms of computer fraud.

(Essay)
4.9/5
(38)

For most companies, which of the following is the least critical application for disaster recovery purposes?

(Multiple Choice)
4.8/5
(33)

Prior to SOX, external auditors were required to be familiar with the client organization's internal controls, but not test them. Explain.

(Essay)
4.9/5
(34)

The same internal control objectives apply to manual and computer-based information systems.

(True/False)
4.8/5
(38)

Which organizational structure is most likely to result in good documentation procedures?

(Multiple Choice)
4.7/5
(37)

Which of the following is not true?

(Multiple Choice)
4.8/5
(34)

What is program fraud?

(Essay)
4.7/5
(37)

Briefly explain how a SSAE 16 report is used in assessing internal controls of outsourced facilities.

(Essay)
4.8/5
(33)

The PCAOB's standard No. 5 specifically requires auditors to understand transaction flows in designing their test of controls. What steps does this entail?

(Essay)
4.8/5
(31)

All of the following are recommended features of a fire protection system for a computer center except

(Multiple Choice)
4.8/5
(35)

Explain how IT outsourcing can lead to loss of strategic advantage.

(Essay)
4.8/5
(35)
Showing 41 - 60 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)