Multiple Choice
To obtain evidence that controls over access to computer programs are properly functioning,audit teams most likely would
A) create checkpoints at periodic intervals after data processing to test for unauthorized use of the system.
B) examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction.
C) enter invalid identification numbers or passwords to ascertain whether the system rejects them.
D) vouch a random sample of processed transactions to assure proper authorization.
Correct Answer:

Verified
Correct Answer:
Verified
Q11: Which of the following controls most likely
Q19: Why is it important that the organization
Q20: Which of the following is not a
Q22: Which of the following categories of general
Q23: Audit teams would least likely use computer-assisted
Q25: Tests of controls in an advanced computerized
Q26: The reprocessing of actual data using programs
Q27: Computer operations controls are typically implemented for
Q31: The purpose of test data is to
Q32: Each of the following automated application controls