Deck 11: Auditing Computer-Based Information Systems

ملء الشاشة (f)
exit full mode
سؤال
Verifying the accuracy of certain information,often through communication with third parties,is known as

A) reperformance.
B) confirmation.
C) substantiation.
D) documentation.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Assessing the quality of internal controls,the reliability of information,and operating performance are all part of which stage of the auditing process?

A) audit planning
B) collection of audit evidence
C) evaluation of audit evidence
D) communication of audit results
سؤال
The purpose of ________ is to determine why,how,when,and who will perform the audit.

A) audit planning
B) the collection of audit evidence
C) the communication of audit results
D) the evaluation of audit evidence
سؤال
Control risk is defined as the

A) susceptibility to material risk in the absence of controls.
B) risk that a material misstatement will get through the internal control structure and into the financial statements.
C) risk that auditors and their audit procedures will not detect a material error or misstatement.
D) risk auditors will not be given the appropriate documents and records by management who wants to control audit activities and procedures.
سؤال
Which type of work listed below is not typical of internal auditors?

A) operational and management audits
B) information system audits
C) financial statement audit
D) financial audit of accounting records
سؤال
The evidence collection method that considers the relationships and trends among information to detect items that should be investigated further is called

A) review of the documentation.
B) vouching.
C) physical examination.
D) analytical review.
سؤال
Auditing involves the

A) collection, review, and documentation of audit evidence.
B) planning and verification of economic events.
C) collection of audit evidence and approval of economic events.
D) testing, documentation, and certification of audit evidence.
سؤال
One type of audit that is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives is known as a(n)________ audit.

A) financial
B) information systems
C) internal control
D) operational or management
سؤال
A system that employs various types of advanced technology has more ________ risk than traditional batch processing.

A) control
B) detection
C) inherent
D) investing
سؤال
With which stage in the auditing process are the consideration of risk factors and materiality most associated?

A) audit planning
B) collection of audit evidence
C) communication of audit results
D) evaluation of audit evidence
سؤال
What is not a typical responsibility of an internal auditor?

A) helping management to improve organizational effectiveness
B) assisting in the design and implementation of an AIS
C) preparation of the company's financial statements
D) implementing and monitoring of internal controls
سؤال
Organizing the audit team and the physical examination of assets are components of which two separate audit stages?

A) planning; evaluating audit evidence
B) planning; collecting audit evidence
C) collecting audit evidence; communicating audit results
D) communicating audit results; evaluating audit evidence
سؤال
An auditor must be willing to accept some degree of risk that the audit conclusion is incorrect.Accordingly,the auditor's objective is to seek ________ that no material error exists in the information audited.

A) absolute reliability
B) reasonable evidence
C) reasonable assurance
D) reasonable objectivity
سؤال
The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.

A) financial
B) informational
C) information systems
D) operational
سؤال
The evidence collection method that examines all supporting documents to determine the validity of a transaction is called

A) review of documentation.
B) vouching.
C) physical examination.
D) analytical review.
سؤال
The ________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.

A) financial
B) information systems
C) management
D) internal control
سؤال
The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as

A) control risk.
B) detection risk.
C) inherent risk.
D) investigating risk.
سؤال
The ________ audit examines the reliability and integrity of accounting records.

A) financial
B) informational
C) information systems
D) operational
سؤال
The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.

A) audit planning
B) collection of audit evidence
C) communication of audit results
D) evaluation of audit evidence
سؤال
The risk-based audit approach is

A) a four-step approach to internal control evaluation.
B) a four-step approach to financial statement review and recommendations.
C) a three-step approach to internal control evaluation.
D) a three-step approach to financial statement review and recommendations.
سؤال
The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures.

A) risk-based approach
B) risk-adjusted approach
C) financial audit approach
D) information systems approach
سؤال
Which auditing technique will not assist in determining if unauthorized programming changes have been made?

A) Use of a source code comparison program
B) Use of the reprocessing technique to compare program output
C) Interviewing and making inquiries of the programming staff
D) Use of parallel simulation to compare program output
سؤال
Determining whether the necessary control procedures are in place is accomplished by conducting

A) a systems overhaul.
B) a systems review.
C) tests of controls.
D) both B and C
سؤال
An audit software program that generates programs that perform certain audit functions,based on auditor specifications,is referred to as a(n)

A) input controls matrix.
B) CAATS.
C) embedded audit module.
D) mapping program.
سؤال
The information systems audit objective that pertains to source data being processed into some form of output is known as

A) overall security.
B) program development.
C) program modifications.
D) processing.
سؤال
To maintain the objectivity necessary for performing an independent evaluation function,auditors should not be involved in

A) making recommendations to management for improvement of existing internal controls.
B) examining system access logs.
C) examining logical access policies and procedures.
D) developing the information system.
سؤال
Which of the following is the first step in the risk-based audit approach?

A) Identify the control procedures that should be in place.
B) Evaluate the control procedures.
C) Determine the threats facing the AIS.
D) Evaluate weaknesses to determine their effect on the audit procedures.
سؤال
What is the purpose of an information systems audit?

A) To determine the inherent risk factors found in the system
B) To review and evaluate the internal controls that protect the system
C) To examine the reliability and integrity of accounting records
D) To examine whether resources have been used in an economical and efficient manner in keeping with organization goals and objectives
سؤال
One tool used to document the review of source data controls is

A) a flowchart generator program.
B) a mapping program.
C) an input control matrix.
D) a program algorithm matrix.
سؤال
A type of software that auditors can use to analyze program logic and detect unexecuted program code is

A) a mapping program.
B) an audit log.
C) a scanning routine.
D) program tracing.
سؤال
Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as

A) a SCARF.
B) an audit hook.
C) an audit sinker.
D) the snapshot technique.
سؤال
Regarding program modifications,which statement below is incorrect?

A) Only material program changes should be thoroughly tested and documented.
B) When a program change is submitted for approval, a list of all required updates should be compiled and then approved by management and program users.
C) During the change process, the developmental version of the program must be kept separate from the production version.
D) After the modified program has received final approval, the change is implemented by replacing the developmental version with the production version.
سؤال
According to the risk-based auditing approach,when a control deficiency is identified,the auditor should inquire about

A) tests of controls.
B) the feasibility of a systems review.
C) materiality and inherent risk factors.
D) compensating controls.
سؤال
The use of a secure file library and restrictions on physical access to data files are control procedures used together to prevent

A) an employee or outsider obtaining data about an important client.
B) a data entry clerk from introducing data entry errors into the system.
C) a computer operator from losing or corrupting files or data during transaction processing.
D) programmers making unauthorized modifications to programs.
سؤال
An auditor might use which of the following to convert data from several sources into a single common format?

A) computer assisted audit techniques software
B) Windows Media Converter
C) concurrent audit technique
D) Adobe Professional
سؤال
How could auditors determine if unauthorized program changes have been made?

A) By interviewing and making inquiries of the programming staff
B) By examining the systems design and programming documentation
C) By using a source code comparison program
D) By interviewing and making inquiries of recently terminated programming staff
سؤال
The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.

A) test data processing
B) parallel simulation
C) concurrent audit techniques
D) analysis of program logic
سؤال
The auditor's role in systems development should be as

A) an advisor and developer of internal control specifications.
B) a developer of internal controls.
C) an independent reviewer only.
D) A and B above
سؤال
Strong ________ controls can partially compensate for inadequate ________ controls.

A) development; processing
B) processing; development
C) operational; internal
D) internal; operational
سؤال
The ________ procedure for auditing computer process controls uses a hypothetical series of valid and invalid transactions.

A) concurrent audit techniques
B) test data processing
C) integrated test facility
D) dual process
سؤال
An auditor sets an embedded audit module to selectively monitor transactions.Selected transactions are then reprocessed independently,and the results are compared with those obtained by the normal system processing.The auditor is using

A) an integrated test facility.
B) the snapshot technique.
C) a system control audit review file.
D) continuous and intermittent simulation.
سؤال
An auditor sets an embedded audit module to flag questionable online transactions,display information about the transaction on the auditor's computer,and send a text message to the auditor's cell phone.The auditor is using

A) the snapshot technique.
B) a system control audit review file.
C) audit hooks.
D) continuous and intermittent simulation.
سؤال
Explain the differences between each type of audit risk.
سؤال
Which of the following is not one of the types of internal audits?

A) reviewing corporate organizational structure and reporting hierarchies
B) examining procedures for reporting and disposing of hazardous waste
C) reviewing source documents and general ledger accounts to determine integrity of recorded transactions
D) comparing estimates and analysis made before purchase of a major capital asset to actual numbers and results achieved
سؤال
An auditor sets an embedded audit module to record all credit transactions in excess of $1,500 and store the data in an audit log.The auditor is using

A) the snapshot technique.
B) a system control audit review file.
C) audit hooks.
D) continuous and intermittent simulation.
سؤال
An auditor manually calculates accumulated depreciation on a delivery van and compares her calculation with accounting records.This is an example collecting audit evidence by

A) confirmation.
B) reperformance.
C) vouching.
D) analytical review.
سؤال
An auditor sets an embedded audit module to flag all credit transactions in excess of $1,500.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using

A) an integrated test facility.
B) the snapshot technique.
C) a system control audit review file.
D) audit hooks.
سؤال
An increase in the effectiveness of auditing software will have the effect of

A) increasing detection risk.
B) reducing detection risk.
C) increasing control risk.
D) reducing control risk.
سؤال
An increase in the effectiveness of internal controls would have the greatest effect on

A) reducing control risk.
B) reducing detection risk.
C) reducing inherent risk.
D) reducing audit risk.
سؤال
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that blocks of code are superseded by other blocks of code.Blocks of code that are not executed by the program can be identified by

A) embedded audit modules.
B) scanning routines.
C) mapping programs.
D) automated flow charting programs.
سؤال
An expansion of a firm's operations to include production in Russia and China will have the effect of

A) increasing inherent risk.
B) reducing inherent risk.
C) increasing control risk.
D) reducing control risk.
سؤال
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that variables defined during the early part of development become irrelevant.The occurrences of variables that are not used by the program can be found using

A) program tracing.
B) scanning routines.
C) mapping programs.
D) embedded audit modules.
سؤال
Evaluating effectiveness,efficiency,and goal achievement are objectives of ________ audits.

A) financial
B) operational
C) information systems
D) all of the above
سؤال
In the ________ stage of an operational audit,the auditor measures the actual system against an ideal standard.

A) evidence collection
B) evidence evaluation
C) testing
D) internal control
سؤال
An auditor finds that employee absentee rates are significantly higher on Mondays and Fridays than on other work days.This is an example collecting audit evidence by

A) confirmation.
B) reperformance.
C) vouching.
D) analytical review.
سؤال
The scope of a(n)________ audit encompasses all aspects of systems management.

A) operational
B) information systems
C) financial
D) internal control
سؤال
What is the primary purpose of computer audit software?

A) eliminate auditor judgment errors
B) assist the auditor in retrieving and reviewing information
C) detect unauthorized modifications to system program code
D) recheck all mathematical calculations, cross-foot, reprocess financial statements and compare to originals
سؤال
An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example of collecting audit evidence by

A) confirmation.
B) reperformance.
C) vouching.
D) analytical review.
سؤال
Explain why the auditor's role in program development and acquisition should be limited.
سؤال
An auditor creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.The auditor is using

A) an integrated test facility.
B) the snapshot technique.
C) a system control audit review file.
D) continuous and intermittent simulation.
سؤال
Describe the risk-based audit approach.
سؤال
How and to whom does an auditor communicate the audit results?
سؤال
Define and give examples of embedded audit modules.
سؤال
Describe the disadvantages of test data processing.
سؤال
Briefly describe tests that can be used to detect unauthorized program modifications.
سؤال
How is a financial audit different from an information systems audit?
سؤال
Name and describe the different types of audits.
سؤال
Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?
سؤال
a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?
سؤال
Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?
سؤال
When doing an information systems audit,auditors must review and evaluate the program development process.What errors or fraud could occur during the program development process?
سؤال
Describe how audit evidence can be collected.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Auditing Computer-Based Information Systems
1
Verifying the accuracy of certain information,often through communication with third parties,is known as

A) reperformance.
B) confirmation.
C) substantiation.
D) documentation.
B
2
Assessing the quality of internal controls,the reliability of information,and operating performance are all part of which stage of the auditing process?

A) audit planning
B) collection of audit evidence
C) evaluation of audit evidence
D) communication of audit results
C
3
The purpose of ________ is to determine why,how,when,and who will perform the audit.

A) audit planning
B) the collection of audit evidence
C) the communication of audit results
D) the evaluation of audit evidence
A
4
Control risk is defined as the

A) susceptibility to material risk in the absence of controls.
B) risk that a material misstatement will get through the internal control structure and into the financial statements.
C) risk that auditors and their audit procedures will not detect a material error or misstatement.
D) risk auditors will not be given the appropriate documents and records by management who wants to control audit activities and procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which type of work listed below is not typical of internal auditors?

A) operational and management audits
B) information system audits
C) financial statement audit
D) financial audit of accounting records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
6
The evidence collection method that considers the relationships and trends among information to detect items that should be investigated further is called

A) review of the documentation.
B) vouching.
C) physical examination.
D) analytical review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
7
Auditing involves the

A) collection, review, and documentation of audit evidence.
B) planning and verification of economic events.
C) collection of audit evidence and approval of economic events.
D) testing, documentation, and certification of audit evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
8
One type of audit that is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives is known as a(n)________ audit.

A) financial
B) information systems
C) internal control
D) operational or management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
9
A system that employs various types of advanced technology has more ________ risk than traditional batch processing.

A) control
B) detection
C) inherent
D) investing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
10
With which stage in the auditing process are the consideration of risk factors and materiality most associated?

A) audit planning
B) collection of audit evidence
C) communication of audit results
D) evaluation of audit evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is not a typical responsibility of an internal auditor?

A) helping management to improve organizational effectiveness
B) assisting in the design and implementation of an AIS
C) preparation of the company's financial statements
D) implementing and monitoring of internal controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
12
Organizing the audit team and the physical examination of assets are components of which two separate audit stages?

A) planning; evaluating audit evidence
B) planning; collecting audit evidence
C) collecting audit evidence; communicating audit results
D) communicating audit results; evaluating audit evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
13
An auditor must be willing to accept some degree of risk that the audit conclusion is incorrect.Accordingly,the auditor's objective is to seek ________ that no material error exists in the information audited.

A) absolute reliability
B) reasonable evidence
C) reasonable assurance
D) reasonable objectivity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
14
The ________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.

A) financial
B) informational
C) information systems
D) operational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
15
The evidence collection method that examines all supporting documents to determine the validity of a transaction is called

A) review of documentation.
B) vouching.
C) physical examination.
D) analytical review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
16
The ________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.

A) financial
B) information systems
C) management
D) internal control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
17
The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as

A) control risk.
B) detection risk.
C) inherent risk.
D) investigating risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ________ audit examines the reliability and integrity of accounting records.

A) financial
B) informational
C) information systems
D) operational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
19
The ________ stage of the auditing process involves (among other things)the auditors observing the operating activities and having discussions with employees.

A) audit planning
B) collection of audit evidence
C) communication of audit results
D) evaluation of audit evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
20
The risk-based audit approach is

A) a four-step approach to internal control evaluation.
B) a four-step approach to financial statement review and recommendations.
C) a three-step approach to internal control evaluation.
D) a three-step approach to financial statement review and recommendations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
21
The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures.

A) risk-based approach
B) risk-adjusted approach
C) financial audit approach
D) information systems approach
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which auditing technique will not assist in determining if unauthorized programming changes have been made?

A) Use of a source code comparison program
B) Use of the reprocessing technique to compare program output
C) Interviewing and making inquiries of the programming staff
D) Use of parallel simulation to compare program output
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
23
Determining whether the necessary control procedures are in place is accomplished by conducting

A) a systems overhaul.
B) a systems review.
C) tests of controls.
D) both B and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
24
An audit software program that generates programs that perform certain audit functions,based on auditor specifications,is referred to as a(n)

A) input controls matrix.
B) CAATS.
C) embedded audit module.
D) mapping program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
25
The information systems audit objective that pertains to source data being processed into some form of output is known as

A) overall security.
B) program development.
C) program modifications.
D) processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
26
To maintain the objectivity necessary for performing an independent evaluation function,auditors should not be involved in

A) making recommendations to management for improvement of existing internal controls.
B) examining system access logs.
C) examining logical access policies and procedures.
D) developing the information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following is the first step in the risk-based audit approach?

A) Identify the control procedures that should be in place.
B) Evaluate the control procedures.
C) Determine the threats facing the AIS.
D) Evaluate weaknesses to determine their effect on the audit procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is the purpose of an information systems audit?

A) To determine the inherent risk factors found in the system
B) To review and evaluate the internal controls that protect the system
C) To examine the reliability and integrity of accounting records
D) To examine whether resources have been used in an economical and efficient manner in keeping with organization goals and objectives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
29
One tool used to document the review of source data controls is

A) a flowchart generator program.
B) a mapping program.
C) an input control matrix.
D) a program algorithm matrix.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
30
A type of software that auditors can use to analyze program logic and detect unexecuted program code is

A) a mapping program.
B) an audit log.
C) a scanning routine.
D) program tracing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
31
Auditors have several techniques available to them to test computer-processing controls.An audit technique that immediately alerts auditors of suspicious transactions is known as

A) a SCARF.
B) an audit hook.
C) an audit sinker.
D) the snapshot technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
32
Regarding program modifications,which statement below is incorrect?

A) Only material program changes should be thoroughly tested and documented.
B) When a program change is submitted for approval, a list of all required updates should be compiled and then approved by management and program users.
C) During the change process, the developmental version of the program must be kept separate from the production version.
D) After the modified program has received final approval, the change is implemented by replacing the developmental version with the production version.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
33
According to the risk-based auditing approach,when a control deficiency is identified,the auditor should inquire about

A) tests of controls.
B) the feasibility of a systems review.
C) materiality and inherent risk factors.
D) compensating controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
34
The use of a secure file library and restrictions on physical access to data files are control procedures used together to prevent

A) an employee or outsider obtaining data about an important client.
B) a data entry clerk from introducing data entry errors into the system.
C) a computer operator from losing or corrupting files or data during transaction processing.
D) programmers making unauthorized modifications to programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
35
An auditor might use which of the following to convert data from several sources into a single common format?

A) computer assisted audit techniques software
B) Windows Media Converter
C) concurrent audit technique
D) Adobe Professional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
36
How could auditors determine if unauthorized program changes have been made?

A) By interviewing and making inquiries of the programming staff
B) By examining the systems design and programming documentation
C) By using a source code comparison program
D) By interviewing and making inquiries of recently terminated programming staff
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
37
The auditor uses ________ to continuously monitor the system and collect audit evidence while live data are processed.

A) test data processing
B) parallel simulation
C) concurrent audit techniques
D) analysis of program logic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
38
The auditor's role in systems development should be as

A) an advisor and developer of internal control specifications.
B) a developer of internal controls.
C) an independent reviewer only.
D) A and B above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
39
Strong ________ controls can partially compensate for inadequate ________ controls.

A) development; processing
B) processing; development
C) operational; internal
D) internal; operational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
40
The ________ procedure for auditing computer process controls uses a hypothetical series of valid and invalid transactions.

A) concurrent audit techniques
B) test data processing
C) integrated test facility
D) dual process
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
41
An auditor sets an embedded audit module to selectively monitor transactions.Selected transactions are then reprocessed independently,and the results are compared with those obtained by the normal system processing.The auditor is using

A) an integrated test facility.
B) the snapshot technique.
C) a system control audit review file.
D) continuous and intermittent simulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
42
An auditor sets an embedded audit module to flag questionable online transactions,display information about the transaction on the auditor's computer,and send a text message to the auditor's cell phone.The auditor is using

A) the snapshot technique.
B) a system control audit review file.
C) audit hooks.
D) continuous and intermittent simulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
43
Explain the differences between each type of audit risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following is not one of the types of internal audits?

A) reviewing corporate organizational structure and reporting hierarchies
B) examining procedures for reporting and disposing of hazardous waste
C) reviewing source documents and general ledger accounts to determine integrity of recorded transactions
D) comparing estimates and analysis made before purchase of a major capital asset to actual numbers and results achieved
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
45
An auditor sets an embedded audit module to record all credit transactions in excess of $1,500 and store the data in an audit log.The auditor is using

A) the snapshot technique.
B) a system control audit review file.
C) audit hooks.
D) continuous and intermittent simulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
46
An auditor manually calculates accumulated depreciation on a delivery van and compares her calculation with accounting records.This is an example collecting audit evidence by

A) confirmation.
B) reperformance.
C) vouching.
D) analytical review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
47
An auditor sets an embedded audit module to flag all credit transactions in excess of $1,500.The flag causes the system state to be recorded before and after each transaction is processed.The auditor is using

A) an integrated test facility.
B) the snapshot technique.
C) a system control audit review file.
D) audit hooks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
48
An increase in the effectiveness of auditing software will have the effect of

A) increasing detection risk.
B) reducing detection risk.
C) increasing control risk.
D) reducing control risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
49
An increase in the effectiveness of internal controls would have the greatest effect on

A) reducing control risk.
B) reducing detection risk.
C) reducing inherent risk.
D) reducing audit risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
50
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that blocks of code are superseded by other blocks of code.Blocks of code that are not executed by the program can be identified by

A) embedded audit modules.
B) scanning routines.
C) mapping programs.
D) automated flow charting programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
51
An expansion of a firm's operations to include production in Russia and China will have the effect of

A) increasing inherent risk.
B) reducing inherent risk.
C) increasing control risk.
D) reducing control risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
52
When programmers are working with program code,they often employ utilities that are also used in auditing.For example,as program code evolves,it is often the case that variables defined during the early part of development become irrelevant.The occurrences of variables that are not used by the program can be found using

A) program tracing.
B) scanning routines.
C) mapping programs.
D) embedded audit modules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
53
Evaluating effectiveness,efficiency,and goal achievement are objectives of ________ audits.

A) financial
B) operational
C) information systems
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
54
In the ________ stage of an operational audit,the auditor measures the actual system against an ideal standard.

A) evidence collection
B) evidence evaluation
C) testing
D) internal control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
55
An auditor finds that employee absentee rates are significantly higher on Mondays and Fridays than on other work days.This is an example collecting audit evidence by

A) confirmation.
B) reperformance.
C) vouching.
D) analytical review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
56
The scope of a(n)________ audit encompasses all aspects of systems management.

A) operational
B) information systems
C) financial
D) internal control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is the primary purpose of computer audit software?

A) eliminate auditor judgment errors
B) assist the auditor in retrieving and reviewing information
C) detect unauthorized modifications to system program code
D) recheck all mathematical calculations, cross-foot, reprocess financial statements and compare to originals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
58
An auditor examines all documents related to the acquisition,repair history,and disposal of a firm's delivery van.This is an example of collecting audit evidence by

A) confirmation.
B) reperformance.
C) vouching.
D) analytical review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
59
Explain why the auditor's role in program development and acquisition should be limited.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
60
An auditor creates a fictitious customer in the system and then creates several fictitious sales to the customer.The records are then tracked as they are processed by the system.The auditor is using

A) an integrated test facility.
B) the snapshot technique.
C) a system control audit review file.
D) continuous and intermittent simulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
61
Describe the risk-based audit approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
62
How and to whom does an auditor communicate the audit results?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
63
Define and give examples of embedded audit modules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
64
Describe the disadvantages of test data processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
65
Briefly describe tests that can be used to detect unauthorized program modifications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
66
How is a financial audit different from an information systems audit?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
67
Name and describe the different types of audits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
68
Audit tests and procedures traditionally have been performed on a sample basis.Do options exist for auditors to test significantly more (or all)transactions?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
69
a)What is test data processing? b)How is it done? c)What are the sources that an auditor can use to generate test data?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
70
Why do all audits follow a sequence of events that can be divided into four stages,and what are the four stages?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
71
When doing an information systems audit,auditors must review and evaluate the program development process.What errors or fraud could occur during the program development process?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
72
Describe how audit evidence can be collected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.