Multiple Choice
To obtain evidence that controls over access to computer programs are properly functioning,audit teams most likely would
A) Create checkpoints at periodic intervals after data processing to test for unauthorized use of the system.
B) Examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction.
C) Enter invalid identification numbers or passwords to ascertain whether the system rejects them.
D) Vouch a random sample of processed transactions to assure proper authorization.
Correct Answer:

Verified
Correct Answer:
Verified
Q19: Why is it important that the organization
Q20: Which of the following is not a
Q21: When audit teams test a computerized processing
Q22: Which of the following categories of general
Q23: Tests of controls in an advanced computerized
Q25: Computer controls that are pervasive and apply
Q26: Which of the following is a category
Q27: Audit teams would least likely use computer-assisted
Q28: Which of the following organizational positions would
Q29: Which of the following computer controls would