Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a disaster recovery plan? What are the key features?

(Essay)
5.0/5
(35)

Segregation of duties in the computer-based information system includes

(Multiple Choice)
5.0/5
(33)

The least important item to store off-site in case of an emergency is

(Multiple Choice)
4.8/5
(42)

What is an auditor looking for when testing computer center controls?

(Essay)
5.0/5
(34)

To fulfill the segregation of duties control objective, computer processing functions (like authorization of credit and billing) are separated.

(True/False)
4.8/5
(31)

Section 404 requires management to make a statement identifying the control framework used to conduct their assessment of internal controls. Discuss the options in selecting a control framework.

(Essay)
4.8/5
(33)

Operations fraud includes

(Multiple Choice)
4.8/5
(30)

Statements on Auditing Standards recommendations must be followed by every member of the profession unless it can be shown why a standard does not apply in a given situation.

(True/False)
4.9/5
(39)

A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster.

(True/False)
4.8/5
(41)

Which of the following is true?

(Multiple Choice)
4.9/5
(44)

Briefly outline transaction cost economics as it relates to IT outsourcing.

(Essay)
4.8/5
(29)

The major disadvantage of an empty shell solution as a second site backup is

(Multiple Choice)
4.7/5
(33)

Why should the tasks of systems development and maintenance be segregated from operations?

(Essay)
4.8/5
(44)

Both the SEC and the PCAOB require management to use the COBIT framework for assessing internal control adequacy.

(True/False)
4.9/5
(32)

Which concept is not an integral part of an audit?

(Multiple Choice)
4.7/5
(38)

Why is inadequate documentation a chronic problem?

(Essay)
4.9/5
(40)

Which of the following is true?

(Multiple Choice)
4.8/5
(41)

Changing the Hours Worked field in an otherwise legitimate payroll transaction to increase the amount of the paycheck is an example of data collection fraud.

(True/False)
4.7/5
(44)

Define database management fraud.

(Essay)
4.8/5
(37)

COSO identifies two broad groupings of information system controls. What are they?

(Short Answer)
4.8/5
(36)
Showing 61 - 80 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)