Deck 14: Auditing Information Technology

ملء الشاشة (f)
exit full mode
سؤال
With the advances in technology today,the "around-the-computer" approach to auditing is no longer widely used.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Using information technology in auditing reduces the time spent on clerical tasks and may improve the overall morale and productivity of auditors.
سؤال
Application controls are related to specific computer application systems.
سؤال
The external auditor serves the firm's stockbrokers,the government,and the general public.
سؤال
ITF does not involve the input of test data into the master files of the computer system being audited.
سؤال
The degree of independence that auditors can maintain while developing embedded audit routines will depend largely on the level of technical expertise that they possess.
سؤال
Embedded audit routines are more easily added to a program as a modification rather than being added as a program is developed.
سؤال
Some embedded audit routines use automated collection language (ACL)to embed specially programmed modules as in-line code with regular programs.
سؤال
One type of tracing is to verify a hash total of the object code of software to detect modifications to the software.
سؤال
ITF is a powerful information system audit technology.
سؤال
Snapshot technology is generally incorporated into extended records for later review by auditors.
سؤال
Parallel simulation is appropriate where transactions are sufficiently important to require a 100 percent audit.
سؤال
The test data technique requires minimal computer expertise and is usually inexpensive to implement.
سؤال
Parallel simulation processes test data through real programs.
سؤال
A trace can produce thousands of output records if an excessive number of transactions are tagged.
سؤال
Auditing activities undertaken during substantive testing of account balances can be described as "auditing through the computer."
سؤال
Basic auditing standards may be altered by the technology employed in the system to be audited.
سؤال
Total audit cost is increased significantly when some audit resources are directed at reviewing and verifying the internal controls that exist in a system.
سؤال
GAS has a long history of usage because public accounting firms developed it in the 1960s.
سؤال
ITF is the one universal auditing approach used in information system audits.
سؤال
Development standards are major general controls in computerized systems.
سؤال
IT governance has the objective of enhancing and ensuring the efficient application of IT resources as a critical success factor.
سؤال
Information system development audits are more common to large organizations because they often have a formal development process.
سؤال
COBIT contains 34 IT processes and organizes them into 8 domains.
سؤال
Each COBIT IT process should have its own navigation diagram.
سؤال
PCAOB has encouraged a risk-based approach to testing the effectiveness of internal controls as they relate to financial audits.
سؤال
An audit of an organization's computer service center is normally undertaken before any information system application audit.
سؤال
Maturity models are used to evaluate an organization's relative level of achievement of IT governance on a scale from 1-10.
سؤال
Project management controls are concerned with the maintenance of application programs.
سؤال
One very common program change control is to periodically compare actual copies of object code with duplicate copies retained in the past.
سؤال
________ auditors commonly undertake audits that are reviewed and relied upon by ________ auditors.
سؤال
An information systems application audit focuses almost exclusively on the testing of processing controls.
سؤال
Specific documentation showing the nature of application controls in a system is known as control flowcharting.
سؤال
An audit program is a detailed list of the audit procedures to be applied on a particular audit.
سؤال
COBIT is an IT governance framework that is critical in ensuring proper control and governance over information and the system that creates,stores,manipulates,and retrieves that information.
سؤال
In RBA,the subject of the audit is how well the management prevents fraud.
سؤال
Most information system audits follow a four-phase structure,which is followed by analysis and reporting of results.
سؤال
CISA,CISM,and CGEIT are professional certifications in system security.
سؤال
Audits of computer service centers do not require as high a degree of technical expertise as do audits of computerized applications.
سؤال
Risk-based auditing provides assurances relating to the effectiveness of an organization's enterprise risk management process.
سؤال
The primary audit technique used in an information systems development audit is the review and testing of related ________.
سؤال
"Auditing with the computer"

A) is only performed by external auditors.
B) involves activities related to compliance testing.
C) is only performed by internal auditors.
D) involves activities related to substantive testing of account balances.
سؤال
Documentation governing the design,development,and implementation of application systems is known as systems ________ ________.
سؤال
All embedded audit routine techniques require a(n)________ level of technical expertise to set up,and at least a(n)________ level of knowledge to use them effectively.
سؤال
Auditors with little computer expertise can use ________ to perform audit-related data processing functions.
سؤال
Using an integrated-test-facility approach,________ testing is appropriate to ________,real-time processing technology.
سؤال
The ________ ________ technique may be used to verify input transaction validation routines.
سؤال
In RBA,the subject of the audit is how well the management manages ________.
سؤال
In ________ checking,an auditor manually processes test or real program data through the logic of a program.
سؤال
An organization's current status compared to benchmarks and international standards,as well as an organization's strategy for improvement,is called a(n)________ model.
سؤال
________ is an open standard which provides "good practices" across a domain and process framework and presents activities in a manageable and logical structure.
سؤال
An audit of the computer service center is undertaken before any application audits to ensure the ________ ________ of the environment in which the application will function.
سؤال
A comprehensive ________ ________ can be established by collecting,in an extended record,supplementary data concerning processing not normally collected.
سؤال
When batch processing was the dominant method used in computerized data processing,the ________ approach provided an adequate audit.
سؤال
________ is an IT governance professional certification for individuals who manage,design,oversee,and assess an enterprise's information security program.
سؤال
________ can be effectively used in conjunction with a test data technique.
سؤال
Test data used in ITF are identified by special ________ and must be excluded from normal system outputs.
سؤال
RBA provides assurances relating to the effectiveness of an organization's ________ ________ ________ processes.
سؤال
Application controls are divided into ________ general areas.
سؤال
A clear and obvious benefit is obtained from the ________ analysis capability provided by information technology.
سؤال
The information systems auditing technique that uses special software to monitor the execution of a program is called

A) embedded audit routines.
B) mapping.
C) a snapshot.
D) tracing.
سؤال
The comparison of input to output is known as auditing

A) around-the-computer.
B) through the computer.
C) with the computer.
D) without the computer.
سؤال
A financial statement audit

A) consists only of compliance testing of account balances.
B) has the objective of verifying financial statement figures to render a professional opinion of the financial statements.
C) has the objective of establishing the degree to which the internal control system can be relied upon.
D) None of these answers is correct.
سؤال
Confirming the existence,assessing the effectiveness,and checking the continuity of the operation of the internal controls upon which reliance is placed is called

A) compliance testing.
B) financial statement auditing.
C) auditing "around-the-computer."
D) substantive testing.
سؤال
The verification of controls in a computer system is known as auditing

A) around-the-computer.
B) through the computer.
C) with the computer.
D) without the computer.
سؤال
Which of the following procedures uses only auditor-prepared test transactions?

A) The test data approach
B) Integrated test facility
C) Parallel simulation
D) Embedded audit routines
سؤال
Information system audits to verify compliance with internal controls are performed by

A) internal auditors only.
B) external auditors only.
C) outside third-party consultants only.
D) both internal and external auditors.
سؤال
The use of information technology to perform audit work is known as auditing

A) around-the-computer.
B) through the computer.
C) without the computer.
D) with the computer.
سؤال
The first (and oldest)technique used to audit through the computer is

A) the integrated test facility.
B) parallel simulation.
C) the test data approach.
D) generalized audit procedures.
سؤال
An internal auditor conducts an information systems audit using the professional standards promulgated by the

A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.
سؤال
The information systems auditing technique that uses software that has been specifically designed to allow auditors to perform audit-related data processing functions is called

A) mapping.
B) tracing.
C) generalized audit software.
D) embedded audit routines.
سؤال
External auditors typically conduct compliance testing because

A) the main goal of a financial statement audit is to ensure that internal controls are operating effectively.
B) compliance tests yield more reliable evidence than substantive tests.
C) compliance tests determine how much reliance can be placed on the internal controls in substantive tests.
D) compliance testing can be conducted solely by the internal auditors.
سؤال
Which of the following is a possible benefit of using information systems technology in the conduct of an audit?

A) Increased independence from information systems personnel
B) Elimination of most manual calculations, footing, and cross-footing
C) Standardization of audit working papers and correspondence
D) All of these answers are correct.
سؤال
An external auditor conducts an information systems audit using the professional standards promulgated by the

A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.
سؤال
Which of the following statements is an advantage to using the test data technique in information systems auditing?

A) The test can be run only on a specific program at a specific point in time.
B) The test must be announced.
C) Test data is limited to certain combinations of processing conditions.
D) The technique is used for testing programs in which calculations such as interest or depreciation are involved.
سؤال
"Auditing through the computer" refers to

A) substantive tests.
B) compliance tests.
C) transaction tests.
D) application control tests.
سؤال
Which of the following should be developed when the related application system is developed?

A) Test data approach
B) Integrated test facility
C) Parallel simulation approach
D) Artificial intelligence software
سؤال
Information technology is used to perform some audit work that otherwise would be done manually.The use of information technology by auditors is

A) essential.
B) mandatory under AICPA Statements of Auditing Standards.
C) optional.
D) at the sole discretion of the manager in charge of the audit.
سؤال
An interim audit

A) consists only of substantive testing of account balances.
B) has the objective of verifying financial statement figures to render a professional opinion of the financial statements.
C) has the objective of establishing the degree to which the internal control system can be relied upon.
D) None of these answers is correct.
سؤال
Which of the following statements is a disadvantage to using the integrated-test-facility (ITF)approach in information systems auditing?

A) When carefully planned, the costs of using ITF are minimal.
B) No interruption of normal computer activity is involved in using ITF.
C) Fictitious data must be excluded from output reports.
D) ITF is used in large computer application systems that use real-time processing.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/124
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Auditing Information Technology
1
With the advances in technology today,the "around-the-computer" approach to auditing is no longer widely used.
True
2
Using information technology in auditing reduces the time spent on clerical tasks and may improve the overall morale and productivity of auditors.
True
3
Application controls are related to specific computer application systems.
True
4
The external auditor serves the firm's stockbrokers,the government,and the general public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
5
ITF does not involve the input of test data into the master files of the computer system being audited.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
6
The degree of independence that auditors can maintain while developing embedded audit routines will depend largely on the level of technical expertise that they possess.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
7
Embedded audit routines are more easily added to a program as a modification rather than being added as a program is developed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
8
Some embedded audit routines use automated collection language (ACL)to embed specially programmed modules as in-line code with regular programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
9
One type of tracing is to verify a hash total of the object code of software to detect modifications to the software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
10
ITF is a powerful information system audit technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
11
Snapshot technology is generally incorporated into extended records for later review by auditors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
12
Parallel simulation is appropriate where transactions are sufficiently important to require a 100 percent audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
13
The test data technique requires minimal computer expertise and is usually inexpensive to implement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
14
Parallel simulation processes test data through real programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
15
A trace can produce thousands of output records if an excessive number of transactions are tagged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
16
Auditing activities undertaken during substantive testing of account balances can be described as "auditing through the computer."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
17
Basic auditing standards may be altered by the technology employed in the system to be audited.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
18
Total audit cost is increased significantly when some audit resources are directed at reviewing and verifying the internal controls that exist in a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
19
GAS has a long history of usage because public accounting firms developed it in the 1960s.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
20
ITF is the one universal auditing approach used in information system audits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
21
Development standards are major general controls in computerized systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
22
IT governance has the objective of enhancing and ensuring the efficient application of IT resources as a critical success factor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
23
Information system development audits are more common to large organizations because they often have a formal development process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
24
COBIT contains 34 IT processes and organizes them into 8 domains.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
25
Each COBIT IT process should have its own navigation diagram.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
26
PCAOB has encouraged a risk-based approach to testing the effectiveness of internal controls as they relate to financial audits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
27
An audit of an organization's computer service center is normally undertaken before any information system application audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
28
Maturity models are used to evaluate an organization's relative level of achievement of IT governance on a scale from 1-10.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
29
Project management controls are concerned with the maintenance of application programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
30
One very common program change control is to periodically compare actual copies of object code with duplicate copies retained in the past.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
31
________ auditors commonly undertake audits that are reviewed and relied upon by ________ auditors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
32
An information systems application audit focuses almost exclusively on the testing of processing controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
33
Specific documentation showing the nature of application controls in a system is known as control flowcharting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
34
An audit program is a detailed list of the audit procedures to be applied on a particular audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
35
COBIT is an IT governance framework that is critical in ensuring proper control and governance over information and the system that creates,stores,manipulates,and retrieves that information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
36
In RBA,the subject of the audit is how well the management prevents fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
37
Most information system audits follow a four-phase structure,which is followed by analysis and reporting of results.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
38
CISA,CISM,and CGEIT are professional certifications in system security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
39
Audits of computer service centers do not require as high a degree of technical expertise as do audits of computerized applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
40
Risk-based auditing provides assurances relating to the effectiveness of an organization's enterprise risk management process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
41
The primary audit technique used in an information systems development audit is the review and testing of related ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
42
"Auditing with the computer"

A) is only performed by external auditors.
B) involves activities related to compliance testing.
C) is only performed by internal auditors.
D) involves activities related to substantive testing of account balances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
43
Documentation governing the design,development,and implementation of application systems is known as systems ________ ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
44
All embedded audit routine techniques require a(n)________ level of technical expertise to set up,and at least a(n)________ level of knowledge to use them effectively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
45
Auditors with little computer expertise can use ________ to perform audit-related data processing functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
46
Using an integrated-test-facility approach,________ testing is appropriate to ________,real-time processing technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
47
The ________ ________ technique may be used to verify input transaction validation routines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
48
In RBA,the subject of the audit is how well the management manages ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
49
In ________ checking,an auditor manually processes test or real program data through the logic of a program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
50
An organization's current status compared to benchmarks and international standards,as well as an organization's strategy for improvement,is called a(n)________ model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
51
________ is an open standard which provides "good practices" across a domain and process framework and presents activities in a manageable and logical structure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
52
An audit of the computer service center is undertaken before any application audits to ensure the ________ ________ of the environment in which the application will function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
53
A comprehensive ________ ________ can be established by collecting,in an extended record,supplementary data concerning processing not normally collected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
54
When batch processing was the dominant method used in computerized data processing,the ________ approach provided an adequate audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
55
________ is an IT governance professional certification for individuals who manage,design,oversee,and assess an enterprise's information security program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
56
________ can be effectively used in conjunction with a test data technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
57
Test data used in ITF are identified by special ________ and must be excluded from normal system outputs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
58
RBA provides assurances relating to the effectiveness of an organization's ________ ________ ________ processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
59
Application controls are divided into ________ general areas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
60
A clear and obvious benefit is obtained from the ________ analysis capability provided by information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
61
The information systems auditing technique that uses special software to monitor the execution of a program is called

A) embedded audit routines.
B) mapping.
C) a snapshot.
D) tracing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
62
The comparison of input to output is known as auditing

A) around-the-computer.
B) through the computer.
C) with the computer.
D) without the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
63
A financial statement audit

A) consists only of compliance testing of account balances.
B) has the objective of verifying financial statement figures to render a professional opinion of the financial statements.
C) has the objective of establishing the degree to which the internal control system can be relied upon.
D) None of these answers is correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
64
Confirming the existence,assessing the effectiveness,and checking the continuity of the operation of the internal controls upon which reliance is placed is called

A) compliance testing.
B) financial statement auditing.
C) auditing "around-the-computer."
D) substantive testing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
65
The verification of controls in a computer system is known as auditing

A) around-the-computer.
B) through the computer.
C) with the computer.
D) without the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which of the following procedures uses only auditor-prepared test transactions?

A) The test data approach
B) Integrated test facility
C) Parallel simulation
D) Embedded audit routines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
67
Information system audits to verify compliance with internal controls are performed by

A) internal auditors only.
B) external auditors only.
C) outside third-party consultants only.
D) both internal and external auditors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
68
The use of information technology to perform audit work is known as auditing

A) around-the-computer.
B) through the computer.
C) without the computer.
D) with the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
69
The first (and oldest)technique used to audit through the computer is

A) the integrated test facility.
B) parallel simulation.
C) the test data approach.
D) generalized audit procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
70
An internal auditor conducts an information systems audit using the professional standards promulgated by the

A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
71
The information systems auditing technique that uses software that has been specifically designed to allow auditors to perform audit-related data processing functions is called

A) mapping.
B) tracing.
C) generalized audit software.
D) embedded audit routines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
72
External auditors typically conduct compliance testing because

A) the main goal of a financial statement audit is to ensure that internal controls are operating effectively.
B) compliance tests yield more reliable evidence than substantive tests.
C) compliance tests determine how much reliance can be placed on the internal controls in substantive tests.
D) compliance testing can be conducted solely by the internal auditors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following is a possible benefit of using information systems technology in the conduct of an audit?

A) Increased independence from information systems personnel
B) Elimination of most manual calculations, footing, and cross-footing
C) Standardization of audit working papers and correspondence
D) All of these answers are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
74
An external auditor conducts an information systems audit using the professional standards promulgated by the

A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which of the following statements is an advantage to using the test data technique in information systems auditing?

A) The test can be run only on a specific program at a specific point in time.
B) The test must be announced.
C) Test data is limited to certain combinations of processing conditions.
D) The technique is used for testing programs in which calculations such as interest or depreciation are involved.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
76
"Auditing through the computer" refers to

A) substantive tests.
B) compliance tests.
C) transaction tests.
D) application control tests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following should be developed when the related application system is developed?

A) Test data approach
B) Integrated test facility
C) Parallel simulation approach
D) Artificial intelligence software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
78
Information technology is used to perform some audit work that otherwise would be done manually.The use of information technology by auditors is

A) essential.
B) mandatory under AICPA Statements of Auditing Standards.
C) optional.
D) at the sole discretion of the manager in charge of the audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
79
An interim audit

A) consists only of substantive testing of account balances.
B) has the objective of verifying financial statement figures to render a professional opinion of the financial statements.
C) has the objective of establishing the degree to which the internal control system can be relied upon.
D) None of these answers is correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following statements is a disadvantage to using the integrated-test-facility (ITF)approach in information systems auditing?

A) When carefully planned, the costs of using ITF are minimal.
B) No interruption of normal computer activity is involved in using ITF.
C) Fictitious data must be excluded from output reports.
D) ITF is used in large computer application systems that use real-time processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 124 في هذه المجموعة.