Exam 12: The Impact of Information Technology on the Audit Process

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following controls prevent and detect errors while transaction data are processed?

(Multiple Choice)
4.9/5
(38)

Which of the following is not a risk in an IT system?

(Multiple Choice)
4.8/5
(39)

What tools do companies use to limit access to sensitive company data?

(Multiple Choice)
4.8/5
(37)

Controls that relate to a specific use of the IT system, such as the processing of sales or cash receipts, are called application controls.

(True/False)
4.8/5
(36)

Which of the following audit procedures used to obtain an understanding of the client's general controls would the auditor use to identify program changes in application software?

(Multiple Choice)
4.7/5
(32)

The audit approach in which the auditor runs his or her own program on a controlled basis to verify the client's data recorded in a machine language is:

(Multiple Choice)
4.9/5
(41)

"Auditing around the computer" is acceptable only if the auditor has access to the client's data in a machine-readable language.

(True/False)
4.8/5
(37)

Which of the following tests determines that every field in a record has been completed?

(Multiple Choice)
4.8/5
(39)

Which of the following is not a benefit of using IT-based controls?

(Multiple Choice)
4.8/5
(41)

Which of the following is a component of general controls?

(Multiple Choice)
4.8/5
(29)

"Auditing around the computer" is most appropriate when the client has not maintained detailed output or source documents in a form readable by humans.

(True/False)
4.9/5
(36)

Discuss how the integration of IT into accounting systems enhances internal control.

(Essay)
4.7/5
(36)

Which of the following is a significant risk to the auditor regarding an audit in a highly automated information environment?

(Multiple Choice)
4.8/5
(33)

Processing controls is a category of application controls.

(True/False)
4.9/5
(48)

Parallel testing is used when old and new systems are operated simultaneously in all locations.

(True/False)
4.9/5
(33)

To determine that user ID and password controls are functioning, an auditor would most likely:

(Multiple Choice)
4.8/5
(35)

When IT programs or files can be accessed from terminals, users should be required to enter a(n):

(Multiple Choice)
4.8/5
(36)

Programmers should do all but which of the following?

(Multiple Choice)
4.8/5
(35)

The most important output control is:

(Multiple Choice)
4.8/5
(30)

Discuss the advantages and benefits of using generalized audit software.

(Essay)
4.7/5
(36)
Showing 41 - 60 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)