Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 5
Exam 11: Auditing Computer-Based Information Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
The first step in a risk-based audit approach is to
Question 62
Multiple Choice
An auditor sets an embedded audit module to selectively monitor transactions.Selected transactions are then reprocessed independently,and the results are compared with those obtained by the normal system processing.The auditor is using
Question 63
Essay
Describe the difference between concurrent audit techniques and embedded audit modules.
Question 64
Multiple Choice
Who generally receives the findings and conclusions of an operational audit?
Question 65
Multiple Choice
Which of the following is not one of the types of internal audits?
Question 66
True/False
Auditors have the ability to change inherent risk.
Question 67
Essay
Describe the five commonly used concurrent audit techniques.
Question 68
Multiple Choice
The ________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.
Question 69
Multiple Choice
The scope of a(n) ________ audit encompasses all aspects of systems management.
Question 70
Essay
Define and give examples of embedded audit modules.
Question 71
Multiple Choice
Using embedded audit modules to continuously monitor transactions,collect data on transactions with special audit significance,and store the data to later identify and investigate questionable transactions is an example of
Question 72
Multiple Choice
An auditor sets an embedded audit module to flag all credit transactions in excess of $5,000.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using