Filters
Question type

Study Flashcards

If an auditor were to audit a payroll application using around-the-computer auditing techniques, the individual would:


A) Use test data
B) Verify that the output from the computerized processing was correct for the input data used to generate it
C) Never use a surprise audit because of the amount of time and work involved
D) Prepare a profile of a computer file and check the processed data with the profile thus obtained

Correct Answer

verifed

verified

Three common techniques auditors use to test computer programs are:


A) Test data, integrated test facilities, and parallel simulation
B) Test data, edit checks, and integrated test facilities
C) Test data, program change control, and parallel simulation
D) Program change control, edit checks, and parallel simulation

Correct Answer

verifed

verified

It is relatively easy to prevent hackers from unauthorized access to data and programs.

Correct Answer

verifed

verified

Which section of SOX requires CEOs and CFOs to "sign off" on their company's financial statements?


A) Section 404
B) Section 201
C) Section 103
D) Section 302

Correct Answer

verifed

verified

An auditing around the computer approach pays little or no attention to the control procedures within an IT environment.

Correct Answer

verifed

verified

?Renumber all questions below and adjust solutions accordingly An information systems risk assessment is as concerned with errors and accidents as it is with fraud. Renumber all questions below and adjust solutions accordingly

Correct Answer

verifed

verified

Information Technology governance includes all of the following except:


A) A decentralized approach to IT acquisition
B) Using IT strategically to carry out the objectives of an organization
C) Ensuring effective management of an organization's IT resources
D) Control over IT-related risks

Correct Answer

verifed

verified

The scope of an internal audit function includes all of the following except:


A) efficiency and effectiveness of operations
B) compliance with laws and regulations
C) reliability of internal and external reporting
D) managing day to day operations of business units

Correct Answer

verifed

verified

All of the following are reasons why SOX was enacted, except:


A) Enron's CEO, Jeffrey Skilling, claimed he did not know about the company's financial shenanigans because he was not involved in their accounting
B) Public perception was that auditors were having conflicts of interest with respect to the auditing and consulting services they provided
C) The FASB has long been thought to be ineffective
D) Congress wanted to restore investor confidence in the wake of a rash of corporate scandals

Correct Answer

verifed

verified

SAS No.99 - Consideration of Fraud in a Financial Statement Audit guides auditors in being more proactive in detecting fraud than did the predecessor standard, SAS No.82.

Correct Answer

verifed

verified

One purpose of generalized auditing packages is to enable an auditor to examine the contents of computer files of interest without having to write a computer program himself/herself. Renumber all questions below and adjust solutions accordingly

Correct Answer

verifed

verified

Many of the assurance services auditors offer today involve information technology.

Correct Answer

verifed

verified

The impetus for IT auditing can be traced to the adoption of computerized accounting systems, migration of business processes to computerized platforms, and enforcement of data security.

Correct Answer

verifed

verified

An integrated test facility is used to:


A) Test only the computer programs of an AIS
B) Test only the manual operations of an AIS
C) Test both the programs and the manual operations of an AIS in an operational setting
D) Test the computer programs, the manual operations, and the auditing procedures of a company using a computerized AIS

Correct Answer

verifed

verified

A computerized AIS is harder to audit than a manual system for all of the following reasons except:


A) The file information is not human readable
B) The volume of transaction records and master file records is usually much larger in computerized systems than in manual systems
C) An audit trail does not exist in a computerized AIS
D) Computerized systems often use remote real-time data processing, thus complicating the tracing of transaction records to their sources

Correct Answer

verifed

verified

The CISSP is the most widely recognized and respected certification for IT auditors.

Correct Answer

verifed

verified

Computer assisted audit techniques are used primarily when auditing around the computer.

Correct Answer

verifed

verified

Controls over access to IT systems are particularly important because:


A) Weak access controls prevent unauthorized use of systems
B) Access controls allow auditors to employ continuous auditing techniques
C) Access controls make test data more effective
D) Weak access controls can allow users to bypass many other controls

Correct Answer

verifed

verified

Prewritten computer programs used for audit purposes are called:


A) Sequential access program systems
B) Positive confirmation audit systems
C) Embedded audit modules
D) Generalized auditing packages

Correct Answer

verifed

verified

Through-the-computer auditing uses all of the following except:


A) Confirmation sampling
B) Test data
C) Tests of program authorization
D) Embedded audit modules

Correct Answer

verifed

verified

Showing 21 - 40 of 67

Related Exams

Show Answer