Deck 14: Auditing Information Technology

Full screen (f)
exit full mode
Question
With the advances in technology today,the "around-the-computer" approach to auditing is no longer widely used.
Use Space or
up arrow
down arrow
to flip the card.
Question
Using information technology in auditing reduces the time spent on clerical tasks and may improve the overall morale and productivity of auditors.
Question
Application controls are related to specific computer application systems.
Question
The external auditor serves the firm's stockbrokers,the government,and the general public.
Question
ITF does not involve the input of test data into the master files of the computer system being audited.
Question
The degree of independence that auditors can maintain while developing embedded audit routines will depend largely on the level of technical expertise that they possess.
Question
Embedded audit routines are more easily added to a program as a modification rather than being added as a program is developed.
Question
Some embedded audit routines use automated collection language (ACL)to embed specially programmed modules as in-line code with regular programs.
Question
One type of tracing is to verify a hash total of the object code of software to detect modifications to the software.
Question
ITF is a powerful information system audit technology.
Question
Snapshot technology is generally incorporated into extended records for later review by auditors.
Question
Parallel simulation is appropriate where transactions are sufficiently important to require a 100 percent audit.
Question
The test data technique requires minimal computer expertise and is usually inexpensive to implement.
Question
Parallel simulation processes test data through real programs.
Question
A trace can produce thousands of output records if an excessive number of transactions are tagged.
Question
Auditing activities undertaken during substantive testing of account balances can be described as "auditing through the computer."
Question
Basic auditing standards may be altered by the technology employed in the system to be audited.
Question
Total audit cost is increased significantly when some audit resources are directed at reviewing and verifying the internal controls that exist in a system.
Question
GAS has a long history of usage because public accounting firms developed it in the 1960s.
Question
ITF is the one universal auditing approach used in information system audits.
Question
Development standards are major general controls in computerized systems.
Question
IT governance has the objective of enhancing and ensuring the efficient application of IT resources as a critical success factor.
Question
Information system development audits are more common to large organizations because they often have a formal development process.
Question
COBIT contains 34 IT processes and organizes them into 8 domains.
Question
Each COBIT IT process should have its own navigation diagram.
Question
PCAOB has encouraged a risk-based approach to testing the effectiveness of internal controls as they relate to financial audits.
Question
An audit of an organization's computer service center is normally undertaken before any information system application audit.
Question
Maturity models are used to evaluate an organization's relative level of achievement of IT governance on a scale from 1-10.
Question
Project management controls are concerned with the maintenance of application programs.
Question
One very common program change control is to periodically compare actual copies of object code with duplicate copies retained in the past.
Question
________ auditors commonly undertake audits that are reviewed and relied upon by ________ auditors.
Question
An information systems application audit focuses almost exclusively on the testing of processing controls.
Question
Specific documentation showing the nature of application controls in a system is known as control flowcharting.
Question
An audit program is a detailed list of the audit procedures to be applied on a particular audit.
Question
COBIT is an IT governance framework that is critical in ensuring proper control and governance over information and the system that creates,stores,manipulates,and retrieves that information.
Question
In RBA,the subject of the audit is how well the management prevents fraud.
Question
Most information system audits follow a four-phase structure,which is followed by analysis and reporting of results.
Question
CISA,CISM,and CGEIT are professional certifications in system security.
Question
Audits of computer service centers do not require as high a degree of technical expertise as do audits of computerized applications.
Question
Risk-based auditing provides assurances relating to the effectiveness of an organization's enterprise risk management process.
Question
The primary audit technique used in an information systems development audit is the review and testing of related ________.
Question
"Auditing with the computer"

A) is only performed by external auditors.
B) involves activities related to compliance testing.
C) is only performed by internal auditors.
D) involves activities related to substantive testing of account balances.
Question
Documentation governing the design,development,and implementation of application systems is known as systems ________ ________.
Question
All embedded audit routine techniques require a(n)________ level of technical expertise to set up,and at least a(n)________ level of knowledge to use them effectively.
Question
Auditors with little computer expertise can use ________ to perform audit-related data processing functions.
Question
Using an integrated-test-facility approach,________ testing is appropriate to ________,real-time processing technology.
Question
The ________ ________ technique may be used to verify input transaction validation routines.
Question
In RBA,the subject of the audit is how well the management manages ________.
Question
In ________ checking,an auditor manually processes test or real program data through the logic of a program.
Question
An organization's current status compared to benchmarks and international standards,as well as an organization's strategy for improvement,is called a(n)________ model.
Question
________ is an open standard which provides "good practices" across a domain and process framework and presents activities in a manageable and logical structure.
Question
An audit of the computer service center is undertaken before any application audits to ensure the ________ ________ of the environment in which the application will function.
Question
A comprehensive ________ ________ can be established by collecting,in an extended record,supplementary data concerning processing not normally collected.
Question
When batch processing was the dominant method used in computerized data processing,the ________ approach provided an adequate audit.
Question
________ is an IT governance professional certification for individuals who manage,design,oversee,and assess an enterprise's information security program.
Question
________ can be effectively used in conjunction with a test data technique.
Question
Test data used in ITF are identified by special ________ and must be excluded from normal system outputs.
Question
RBA provides assurances relating to the effectiveness of an organization's ________ ________ ________ processes.
Question
Application controls are divided into ________ general areas.
Question
A clear and obvious benefit is obtained from the ________ analysis capability provided by information technology.
Question
The information systems auditing technique that uses special software to monitor the execution of a program is called

A) embedded audit routines.
B) mapping.
C) a snapshot.
D) tracing.
Question
The comparison of input to output is known as auditing

A) around-the-computer.
B) through the computer.
C) with the computer.
D) without the computer.
Question
A financial statement audit

A) consists only of compliance testing of account balances.
B) has the objective of verifying financial statement figures to render a professional opinion of the financial statements.
C) has the objective of establishing the degree to which the internal control system can be relied upon.
D) None of these answers is correct.
Question
Confirming the existence,assessing the effectiveness,and checking the continuity of the operation of the internal controls upon which reliance is placed is called

A) compliance testing.
B) financial statement auditing.
C) auditing "around-the-computer."
D) substantive testing.
Question
The verification of controls in a computer system is known as auditing

A) around-the-computer.
B) through the computer.
C) with the computer.
D) without the computer.
Question
Which of the following procedures uses only auditor-prepared test transactions?

A) The test data approach
B) Integrated test facility
C) Parallel simulation
D) Embedded audit routines
Question
Information system audits to verify compliance with internal controls are performed by

A) internal auditors only.
B) external auditors only.
C) outside third-party consultants only.
D) both internal and external auditors.
Question
The use of information technology to perform audit work is known as auditing

A) around-the-computer.
B) through the computer.
C) without the computer.
D) with the computer.
Question
The first (and oldest)technique used to audit through the computer is

A) the integrated test facility.
B) parallel simulation.
C) the test data approach.
D) generalized audit procedures.
Question
An internal auditor conducts an information systems audit using the professional standards promulgated by the

A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.
Question
The information systems auditing technique that uses software that has been specifically designed to allow auditors to perform audit-related data processing functions is called

A) mapping.
B) tracing.
C) generalized audit software.
D) embedded audit routines.
Question
External auditors typically conduct compliance testing because

A) the main goal of a financial statement audit is to ensure that internal controls are operating effectively.
B) compliance tests yield more reliable evidence than substantive tests.
C) compliance tests determine how much reliance can be placed on the internal controls in substantive tests.
D) compliance testing can be conducted solely by the internal auditors.
Question
Which of the following is a possible benefit of using information systems technology in the conduct of an audit?

A) Increased independence from information systems personnel
B) Elimination of most manual calculations, footing, and cross-footing
C) Standardization of audit working papers and correspondence
D) All of these answers are correct.
Question
An external auditor conducts an information systems audit using the professional standards promulgated by the

A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.
Question
Which of the following statements is an advantage to using the test data technique in information systems auditing?

A) The test can be run only on a specific program at a specific point in time.
B) The test must be announced.
C) Test data is limited to certain combinations of processing conditions.
D) The technique is used for testing programs in which calculations such as interest or depreciation are involved.
Question
"Auditing through the computer" refers to

A) substantive tests.
B) compliance tests.
C) transaction tests.
D) application control tests.
Question
Which of the following should be developed when the related application system is developed?

A) Test data approach
B) Integrated test facility
C) Parallel simulation approach
D) Artificial intelligence software
Question
Information technology is used to perform some audit work that otherwise would be done manually.The use of information technology by auditors is

A) essential.
B) mandatory under AICPA Statements of Auditing Standards.
C) optional.
D) at the sole discretion of the manager in charge of the audit.
Question
An interim audit

A) consists only of substantive testing of account balances.
B) has the objective of verifying financial statement figures to render a professional opinion of the financial statements.
C) has the objective of establishing the degree to which the internal control system can be relied upon.
D) None of these answers is correct.
Question
Which of the following statements is a disadvantage to using the integrated-test-facility (ITF)approach in information systems auditing?

A) When carefully planned, the costs of using ITF are minimal.
B) No interruption of normal computer activity is involved in using ITF.
C) Fictitious data must be excluded from output reports.
D) ITF is used in large computer application systems that use real-time processing.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/124
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Auditing Information Technology
1
With the advances in technology today,the "around-the-computer" approach to auditing is no longer widely used.
True
2
Using information technology in auditing reduces the time spent on clerical tasks and may improve the overall morale and productivity of auditors.
True
3
Application controls are related to specific computer application systems.
True
4
The external auditor serves the firm's stockbrokers,the government,and the general public.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
5
ITF does not involve the input of test data into the master files of the computer system being audited.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
6
The degree of independence that auditors can maintain while developing embedded audit routines will depend largely on the level of technical expertise that they possess.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
7
Embedded audit routines are more easily added to a program as a modification rather than being added as a program is developed.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
8
Some embedded audit routines use automated collection language (ACL)to embed specially programmed modules as in-line code with regular programs.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
9
One type of tracing is to verify a hash total of the object code of software to detect modifications to the software.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
10
ITF is a powerful information system audit technology.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
11
Snapshot technology is generally incorporated into extended records for later review by auditors.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
12
Parallel simulation is appropriate where transactions are sufficiently important to require a 100 percent audit.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
13
The test data technique requires minimal computer expertise and is usually inexpensive to implement.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
14
Parallel simulation processes test data through real programs.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
15
A trace can produce thousands of output records if an excessive number of transactions are tagged.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
16
Auditing activities undertaken during substantive testing of account balances can be described as "auditing through the computer."
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
17
Basic auditing standards may be altered by the technology employed in the system to be audited.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
18
Total audit cost is increased significantly when some audit resources are directed at reviewing and verifying the internal controls that exist in a system.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
19
GAS has a long history of usage because public accounting firms developed it in the 1960s.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
20
ITF is the one universal auditing approach used in information system audits.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
21
Development standards are major general controls in computerized systems.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
22
IT governance has the objective of enhancing and ensuring the efficient application of IT resources as a critical success factor.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
23
Information system development audits are more common to large organizations because they often have a formal development process.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
24
COBIT contains 34 IT processes and organizes them into 8 domains.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
25
Each COBIT IT process should have its own navigation diagram.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
26
PCAOB has encouraged a risk-based approach to testing the effectiveness of internal controls as they relate to financial audits.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
27
An audit of an organization's computer service center is normally undertaken before any information system application audit.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
28
Maturity models are used to evaluate an organization's relative level of achievement of IT governance on a scale from 1-10.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
29
Project management controls are concerned with the maintenance of application programs.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
30
One very common program change control is to periodically compare actual copies of object code with duplicate copies retained in the past.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
31
________ auditors commonly undertake audits that are reviewed and relied upon by ________ auditors.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
32
An information systems application audit focuses almost exclusively on the testing of processing controls.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
33
Specific documentation showing the nature of application controls in a system is known as control flowcharting.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
34
An audit program is a detailed list of the audit procedures to be applied on a particular audit.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
35
COBIT is an IT governance framework that is critical in ensuring proper control and governance over information and the system that creates,stores,manipulates,and retrieves that information.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
36
In RBA,the subject of the audit is how well the management prevents fraud.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
37
Most information system audits follow a four-phase structure,which is followed by analysis and reporting of results.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
38
CISA,CISM,and CGEIT are professional certifications in system security.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
39
Audits of computer service centers do not require as high a degree of technical expertise as do audits of computerized applications.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
40
Risk-based auditing provides assurances relating to the effectiveness of an organization's enterprise risk management process.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
41
The primary audit technique used in an information systems development audit is the review and testing of related ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
42
"Auditing with the computer"

A) is only performed by external auditors.
B) involves activities related to compliance testing.
C) is only performed by internal auditors.
D) involves activities related to substantive testing of account balances.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
43
Documentation governing the design,development,and implementation of application systems is known as systems ________ ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
44
All embedded audit routine techniques require a(n)________ level of technical expertise to set up,and at least a(n)________ level of knowledge to use them effectively.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
45
Auditors with little computer expertise can use ________ to perform audit-related data processing functions.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
46
Using an integrated-test-facility approach,________ testing is appropriate to ________,real-time processing technology.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
47
The ________ ________ technique may be used to verify input transaction validation routines.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
48
In RBA,the subject of the audit is how well the management manages ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
49
In ________ checking,an auditor manually processes test or real program data through the logic of a program.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
50
An organization's current status compared to benchmarks and international standards,as well as an organization's strategy for improvement,is called a(n)________ model.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
51
________ is an open standard which provides "good practices" across a domain and process framework and presents activities in a manageable and logical structure.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
52
An audit of the computer service center is undertaken before any application audits to ensure the ________ ________ of the environment in which the application will function.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
53
A comprehensive ________ ________ can be established by collecting,in an extended record,supplementary data concerning processing not normally collected.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
54
When batch processing was the dominant method used in computerized data processing,the ________ approach provided an adequate audit.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
55
________ is an IT governance professional certification for individuals who manage,design,oversee,and assess an enterprise's information security program.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
56
________ can be effectively used in conjunction with a test data technique.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
57
Test data used in ITF are identified by special ________ and must be excluded from normal system outputs.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
58
RBA provides assurances relating to the effectiveness of an organization's ________ ________ ________ processes.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
59
Application controls are divided into ________ general areas.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
60
A clear and obvious benefit is obtained from the ________ analysis capability provided by information technology.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
61
The information systems auditing technique that uses special software to monitor the execution of a program is called

A) embedded audit routines.
B) mapping.
C) a snapshot.
D) tracing.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
62
The comparison of input to output is known as auditing

A) around-the-computer.
B) through the computer.
C) with the computer.
D) without the computer.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
63
A financial statement audit

A) consists only of compliance testing of account balances.
B) has the objective of verifying financial statement figures to render a professional opinion of the financial statements.
C) has the objective of establishing the degree to which the internal control system can be relied upon.
D) None of these answers is correct.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
64
Confirming the existence,assessing the effectiveness,and checking the continuity of the operation of the internal controls upon which reliance is placed is called

A) compliance testing.
B) financial statement auditing.
C) auditing "around-the-computer."
D) substantive testing.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
65
The verification of controls in a computer system is known as auditing

A) around-the-computer.
B) through the computer.
C) with the computer.
D) without the computer.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following procedures uses only auditor-prepared test transactions?

A) The test data approach
B) Integrated test facility
C) Parallel simulation
D) Embedded audit routines
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
67
Information system audits to verify compliance with internal controls are performed by

A) internal auditors only.
B) external auditors only.
C) outside third-party consultants only.
D) both internal and external auditors.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
68
The use of information technology to perform audit work is known as auditing

A) around-the-computer.
B) through the computer.
C) without the computer.
D) with the computer.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
69
The first (and oldest)technique used to audit through the computer is

A) the integrated test facility.
B) parallel simulation.
C) the test data approach.
D) generalized audit procedures.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
70
An internal auditor conducts an information systems audit using the professional standards promulgated by the

A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
71
The information systems auditing technique that uses software that has been specifically designed to allow auditors to perform audit-related data processing functions is called

A) mapping.
B) tracing.
C) generalized audit software.
D) embedded audit routines.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
72
External auditors typically conduct compliance testing because

A) the main goal of a financial statement audit is to ensure that internal controls are operating effectively.
B) compliance tests yield more reliable evidence than substantive tests.
C) compliance tests determine how much reliance can be placed on the internal controls in substantive tests.
D) compliance testing can be conducted solely by the internal auditors.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is a possible benefit of using information systems technology in the conduct of an audit?

A) Increased independence from information systems personnel
B) Elimination of most manual calculations, footing, and cross-footing
C) Standardization of audit working papers and correspondence
D) All of these answers are correct.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
74
An external auditor conducts an information systems audit using the professional standards promulgated by the

A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following statements is an advantage to using the test data technique in information systems auditing?

A) The test can be run only on a specific program at a specific point in time.
B) The test must be announced.
C) Test data is limited to certain combinations of processing conditions.
D) The technique is used for testing programs in which calculations such as interest or depreciation are involved.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
76
"Auditing through the computer" refers to

A) substantive tests.
B) compliance tests.
C) transaction tests.
D) application control tests.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following should be developed when the related application system is developed?

A) Test data approach
B) Integrated test facility
C) Parallel simulation approach
D) Artificial intelligence software
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
78
Information technology is used to perform some audit work that otherwise would be done manually.The use of information technology by auditors is

A) essential.
B) mandatory under AICPA Statements of Auditing Standards.
C) optional.
D) at the sole discretion of the manager in charge of the audit.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
79
An interim audit

A) consists only of substantive testing of account balances.
B) has the objective of verifying financial statement figures to render a professional opinion of the financial statements.
C) has the objective of establishing the degree to which the internal control system can be relied upon.
D) None of these answers is correct.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following statements is a disadvantage to using the integrated-test-facility (ITF)approach in information systems auditing?

A) When carefully planned, the costs of using ITF are minimal.
B) No interruption of normal computer activity is involved in using ITF.
C) Fictitious data must be excluded from output reports.
D) ITF is used in large computer application systems that use real-time processing.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 124 flashcards in this deck.