Multiple Choice
An IT application control will be ineffective _______.
A) if the entity is hacked or experiences some form of phishing
B) if it lists an appropriate transaction on an exception report
C) if it fails to put an invalid transaction on an exception report
D) if it is consistently used
Correct Answer:

Verified
Correct Answer:
Verified
Q77: A material weakness is a deficiency where
Q78: The procedure that relies on the auditor
Q79: An example of a purely manual control
Q80: Working paper documentation for test of controls
Q81: When performing an integrated audit (to issue
Q83: If the audit firm is performing an
Q84: The procedure that relies on the auditor
Q85: Important information obtained through inquiry _.<br>A)should be
Q86: Which of the following refers to a
Q87: An audit testing strategy that can be