Exam 12: The Impact of Information Technology on the Audit Process
Exam 1: The Demand for Audit and Other Assurance Services47 Questions
Exam 2: The CPA Profession67 Questions
Exam 3: Audit Reports139 Questions
Exam 4: Professional Ethics114 Questions
Exam 5: Legal Liability113 Questions
Exam 6: The CPA Profession114 Questions
Exam 7: Audit Evidence94 Questions
Exam 8: Audit Planning and Analytical Procedures95 Questions
Exam 9: Materiality and Risk102 Questions
Exam 10: Section 404 Audits of Internal Control and Control Risk116 Questions
Exam 11: Fraud Auditing83 Questions
Exam 12: The Impact of Information Technology on the Audit Process106 Questions
Exam 13: Overall Audit Plan and Audit Program94 Questions
Exam 14: Audit of the Sales and Collection Cycle: Tests of Controls and Substantive Tests of Transactions108 Questions
Exam 15: Audit Sampling for Tests of Controls and Substantive Tests of Transactions117 Questions
Exam 16: Completing the Tests in the Sales and Collection Cycle: Accounts Receivable96 Questions
Exam 17: Audit Sampling for Tests of Details and Balances114 Questions
Exam 18: Audit of the Acquisition and Payment Cycle: Tests of Controls and Substantive Tests of Transactions, and Accounts Payable114 Questions
Exam 19: Completing the Tests in the Acquisition and Payment Cycle: Verification of Selected Accounts101 Questions
Exam 20: Audit of the Payroll and Personnel Cycle113 Questions
Exam 21: Audit of the Inventory and Warehousing Cycle115 Questions
Exam 22: Audit of the Capital Acquisition and Repayment Cycle91 Questions
Exam 23: Audit of Cash Balances92 Questions
Exam 24: Completing the Audit116 Questions
Exam 25: Other Assurance Services100 Questions
Exam 26: Internal and Governmental Financial Auditing and Operational Auditing73 Questions
Select questions type
The audit procedure which is least useful in gathering evidence on significant computer processes is:
(Multiple Choice)
4.9/5
(29)
The objective of the computer audit technique known as the test data approach is to determine whether the client's computer programs can correctly process valid and invalid transactions.
(True/False)
4.8/5
(41)
Controls which are designed to assure that the information processed by the computer is authorized, complete, and accurate are called:
(Multiple Choice)
4.9/5
(35)
The test data approach requires the auditor to insert an audit module in the client's application system to test how transaction data is processed.
(True/False)
4.8/5
(38)
Identify the six categories of general controls and give one example of each.
(Essay)
4.8/5
(33)
One common use of generalized audit software is to help the auditor identify weaknesses in the client's IT control procedures.
(True/False)
5.0/5
(32)
Identify the three categories of application controls, and give one example of each.
(Essay)
4.9/5
(38)
In IT systems, if general controls are effective, it increases the auditor's ability to rely on application controls to reduce control risk.
(True/False)
4.8/5
(46)
In an IT-intensive environment, most processing controls are:
(Multiple Choice)
4.7/5
(41)
One category of general controls is physical and online security. Describe the control and give at least three examples of implementation of the control.
(Essay)
4.9/5
(36)
When performing a parallel simulation the auditor may use generalized audit software (GAS). Which of the following is not seen as an advantage to using GAS?
(Multiple Choice)
4.9/5
(28)
Application controls vary across the IT system. To gain an understanding of internal control for a private company, the auditor must evaluate the application controls for every:
(Multiple Choice)
4.9/5
(40)
When auditing a client whose information is processed by an outside service provider, it is not acceptable for the auditor to rely on the audit report of another independent auditor who has previously tested the internal controls of the service provider, rather than testing the service provider's controls himself or herself.
(True/False)
4.9/5
(36)
A control that relates to all parts of the IT system is called a(n):
(Multiple Choice)
4.9/5
(44)
Which of the following computer-assisted auditing techniques inserts an audit module in the client's application system to identify specific types of transactions?
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)