Deck 12: Information Technology Auditing

ملء الشاشة (f)
exit full mode
سؤال
The main objective of information technology auditing is to evaluate the IT's role in achieving audit and control objectives.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
If control procedures over a company's computerized financial accounting system are particularly strong,auditors will not need to perform any substantive testing.
سؤال
Normal transactions rather than exception transactions are of most interest to auditors.
سؤال
The focus in an internal audit should be primarily on business risk rather than on internal control.
سؤال
When the costs of protecting against a business risk exceed the cost of the risk multiplied by its probability,an auditor will generally recommend against installing the specific control.
سؤال
Many of the assurance services auditors offer today involve information technology.
سؤال
The greatest advantage of an integrated test facility is that it enables an auditor to examine both manual and computerized steps companies take to process business transactions.
سؤال
An ideal program change control process includes required documentation of every request for application program changes as well as the use of a test environment for development and implementation of program changes.
سؤال
Both the internal audit and the external audit have the same primary objective (i.e.,to verify that the financial records of the company have been prepared according to generally accepted accounting principles).
سؤال
An auditing around the computer approach pays little or no attention to the control procedures within an IT environment.
سؤال
Embedded audit modules or audit hooks are examples of continuous auditing techniques.
سؤال
One problem with internal auditing is that it is akin to self-regulation (i.e.,the auditor cannot be impartial because both the auditor and the subsystem being audited work for the same company).
سؤال
In auditing through the computer,auditors will want to review systems software documentation.
سؤال
An information systems risk assessment is as concerned with errors and accidents as it is with fraud.
سؤال
Public companies are required to adopt the Control Objectives for Information and Related Technology framework under SOX.
سؤال
The Electronic Systems Assurance and Control model provides a framework for evaluating controls over email systems.
سؤال
Computer assisted audit techniques are used primarily when auditing around the computer.
سؤال
Use of test data is not recommended when evaluating integrated online systems.
سؤال
Certified Information System Auditors must have an accounting degree.
سؤال
A career in information technology auditing requires both specialized skills and a broad-based set of technical knowledge.
سؤال
Which of the following is not one of the groups of SOX compliance requirements?

A)Requirements to use an IT auditor to evaluate controls
B)Regulations governing executive reporting and conduct
C)Rules about financial statement reporting
D)Audit committee/corporate governance requirements
سؤال
Section 404 of SOX requires that the information technology auditor "sign off" that the financial statements are reliable.
سؤال
Computer assisted audit techniques:

A)Are never used in compliance testing
B)May be used for substantive and compliance testing
C)Are used primarily when auditing around the computer
D)Are good tools for auditors who are lacking in technical computer skills
سؤال
The best educational background for a Certified Information Systems Auditor is:

A)A degree in information systems or technology
B)A degree which combines the study of accounting with the study of information systems
C)No college degree,but work experience in information systems
D)An accounting degree
سؤال
Information technology governance:

A)Is a component of IT auditing
B)Has one objective - to ensure that IT is used strategically to fulfill an organization's mission
C)Is intended to ensure both the strategic use of IT and control over IT resources
D)Is primarily intended to deter IT fraud
سؤال
The three conditions for fraud in the fraud triangle include incentive/pressure,rationalization,and opportunity.
سؤال
A computerized AIS is harder to audit than a manual system for all of the following reasons except:

A)The file information is not human readable
B)The volume of transaction records and master file records is usually much larger in computerized systems than in manual systems
C)An audit trail does not exist in a computerized AIS
D)Computerized systems often use remote real-time data processing,thus complicating the tracing of transaction records to their sources
سؤال
One purpose of generalized audit software packages is to enable an auditor to examine the contents of computer files of interest without having to write a computer program himself/herself.
سؤال
Auditors may use transaction tagging to verify how a system processes certain transactions.
سؤال
The primary purpose of an internal audit is:

A)To verify the accuracy of a firm's financial statements
B)To punish employees for inefficient performance
C)To meet the requirements of the accounting profession
D)To ascertain employee adherence to organizational policies and procedures
سؤال
It is relatively easy to prevent hackers from unauthorized access to data and programs.
سؤال
SAS No.99 - Consideration of Fraud in a Financial Statement Audit guides auditors in being more proactive in detecting fraud than did the predecessor standard,SAS No.82.
سؤال
Test of program length is one approach to detecting the existence of a Trojan Horse.
سؤال
Through-the-computer auditing uses all of the following except:

A)Confirmation sampling
B)Test data
C)Tests of program authorization
D)Embedded audit modules
سؤال
If an auditor were to audit a payroll application using around-the-computer auditing techniques,the individual would:

A)Use test data
B)Verify that the output from the computerized processing was correct for the input data used to generate it
C)Never use a surprise audit because of the amount of time and work involved
D)Prepare a profile of a computer file and check the processed data with the profile thus obtained
سؤال
Which of the following is not true?

A)An internal audit is never performed by external auditors
B)The primary goals of an internal audit and an external audit are somewhat different
C)Both internal and external audits are similar in their insistence upon objectivity in the performance of the audit evaluation
D)Both the internal audit and the external audit rely heavily upon the audit trail of transactions in an accounting system
سؤال
The most important skills needed by information technology auditors are people skills.
سؤال
The advantages of around-the-computer auditing include:

A)The emphasis which is placed on testing data processing exceptions
B)Use of live data
C)The minimal disturbance of a company's records
D)both b and c
سؤال
The AICPA has decided to drop its WebTrust services and replace SysTrust with a general Trust assurance service.
سؤال
Information Technology (IT)governance includes using IT responsibly and efficiently,but not necessarily strategically.
سؤال
Information Technology governance includes all of the following except:

A)A decentralized approach to IT acquisition
B)Using IT strategically to carry out the objectives of an organization
C)Ensuring effective management of an organization's IT resources
D)Control over IT-related risks
سؤال
The most important advantage of an integrated test facility is that it:

A)Allows auditors to evaluate transactions in an operational setting
B)Can test every exception transaction as opposed to test data which includes only a limited set of such transactions
C)Works best at evaluating input controls
D)Has no disadvantages
سؤال
Which of the following is not typically checked by an auditor in a review of a responsibility system of computer program development and maintenance?

A)Documentation of all program changes on proper change-request forms
B)Proper costing of all program change requests
C)A review of each program change request by an internal auditor
D)Matches between program documentation and the production version of a computer program
سؤال
Which section of SOX requires CEOs and CFOs to "sign off" on their company's financial statements?

A)Section 404
B)Section 201
C)Section 103
D)Section 302
سؤال
All of the following are true concerning embedded audit modules except:

A)They provide for continuous auditing of application processing
B)The auditor does not have to be involved in the development of these programs
C)Once implemented,the system can capture information that is useful to the auditor on an ongoing basis
D)With this approach,the application program incorporates subroutines for audit purposes
سؤال
The greatest drawback of an integrated test facility is that:

A)It requires the construction of a high volume of test data
B)It introduces artificial transactions into the transaction stream
C)It produces overkill in the audit function
D)It is not broad enough to cover the entire spectrum of activities involved in the AIS
سؤال
Three common techniques auditors use to test computer programs are:

A)Test data,integrated test facilities,and parallel simulation
B)Test data,edit checks,and integrated test facilities
C)Test data,program change control,and parallel simulation
D)Program change control,edit checks,and parallel simulation
سؤال
Which of the following audit techniques is likely to require the most technical expertise on the part of an auditor?

A)Test data
B)Integrated test facility
C)Evaluation of program change control
D)Parallel simulation
سؤال
Which of the following statements is not true regarding people skills for IT auditors?

A)People skills are more important than technical skills
B)An example of people skills would be the ability to work as a team
C)In the case of protecting against computer viruses,technical skills matter more than people skills
D)Many internal controls evaluated by auditors concern human behavior
سؤال
When an auditor audits with the computer,the auditor:

A)Uses the computer to process transaction data under normal processing conditions
B)Uses the computer as a tool to assist in various other auditing tasks
C)Relies heavily upon test data to evaluate the presence or absence of specific computer controls
D)Must also use an integrated test facility
سؤال
All of the following are examples of parameters that might be used to set passwords except:

A)A minimum password length of six digits
B)Restriction of passwords to alphanumeric characters only
C)Required use of words that can be found in a dictionary
D)A requirement for a minimum interval (such as one day)before a password may be changed
سؤال
An integrated test facility is used to:

A)Test only the computer programs of an AIS
B)Test only the manual operations of an AIS
C)Test both the programs and the manual operations of an AIS in an operational setting
D)Test the computer programs,the manual operations,and the auditing procedures of a company using a computerized AIS
سؤال
Which of the following is not a condition for fraud as identified in the fraud triangle?

A)Incentives or pressures
B)Greed
C)Opportunity
D)Rationalization
سؤال
SQL is:

A)An example of an integrated test facility
B)A generalized audit software program
C)A tool used for continuous auditing
D)A tool used by auditors to retrieve and manipulate data
سؤال
Prewritten computer programs used for audit purposes are called:

A)Sequential access program systems
B)Positive confirmation audit systems
C)Embedded audit modules
D)Generalized audit software packages
سؤال
Which of the following services is not prevented by SOX for an auditor to perform for their own client?

A)Internal auditing outsourcing services
B)Expert services related to the audit
C)Actuarial services
D)Implementation of a financial information system
سؤال
The term "test data" is associated with:

A)Auditing through-the-computer
B)Auditing around-the-computer
C)Auditing of manual accounting systems
D)Non-auditing procedures performed by a firm's accounting subsystem employees
سؤال
Under which audit technique is the way transactions are processed examined?

A)Exception reporting technique
B)Transaction tagging technique
C)Snapshot technique
D)Parallel simulation technique
سؤال
The four approaches to through-the-computer auditing include all but which of the following:

A)Use of embedded audit modules
B)Testing of outputs to verify processing
C)Computer program testing
D)Validation of computer programs
سؤال
The auditor's role in reviewing the system of computer program development:

A)Does not include checking to see that all program changes are properly documented
B)Does not include a check of librarian functions
C)Does not include checking to see that program change requests are properly costed
D)Includes a cross-check of program changes against in-use programs
سؤال
Controls over access to IT systems are particularly important because:

A)Weak access controls prevent unauthorized use of systems
B)Access controls allow auditors to employ continuous auditing techniques
C)Access controls make test data more effective
D)Weak access controls can allow users to bypass many other controls
سؤال
Which of the following is not a principle of the AICPA's Trust Services?

A)Maintainability
B)Availability
C)Online privacy
D)Processing integrity
سؤال
All of the following are reasons why SOX was enacted,except:

A)Enron's CEO,Jeffrey Skilling,claimed he did not know about the company's financial shenanigans because he was not involved in their accounting
B)Public perception was that auditors were having conflicts of interest with respect to the auditing and consulting services they provided
C)The FASB has long been thought to be ineffective
D)Congress wanted to restore investor confidence in the wake of a rash of corporate scandals
سؤال
Continuous audit techniques can improve the effectiveness of the audit by:

A)Focusing most of the audit effort near the year-end
B)Alerting auditors to potential problems when the problems occur
C)Protecting the privacy of the auditors
D)Facilitating parallel simulation
سؤال
Risks of using an integrated test facility include:

A)Failure to remove fake transactions from the client's system
B)High costs of building the facility
C)Discovery of many control weaknesses
D)none of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/65
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Information Technology Auditing
1
The main objective of information technology auditing is to evaluate the IT's role in achieving audit and control objectives.
True
2
If control procedures over a company's computerized financial accounting system are particularly strong,auditors will not need to perform any substantive testing.
False
3
Normal transactions rather than exception transactions are of most interest to auditors.
False
4
The focus in an internal audit should be primarily on business risk rather than on internal control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
5
When the costs of protecting against a business risk exceed the cost of the risk multiplied by its probability,an auditor will generally recommend against installing the specific control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
6
Many of the assurance services auditors offer today involve information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
7
The greatest advantage of an integrated test facility is that it enables an auditor to examine both manual and computerized steps companies take to process business transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
8
An ideal program change control process includes required documentation of every request for application program changes as well as the use of a test environment for development and implementation of program changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
9
Both the internal audit and the external audit have the same primary objective (i.e.,to verify that the financial records of the company have been prepared according to generally accepted accounting principles).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
10
An auditing around the computer approach pays little or no attention to the control procedures within an IT environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
11
Embedded audit modules or audit hooks are examples of continuous auditing techniques.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
12
One problem with internal auditing is that it is akin to self-regulation (i.e.,the auditor cannot be impartial because both the auditor and the subsystem being audited work for the same company).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
13
In auditing through the computer,auditors will want to review systems software documentation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
14
An information systems risk assessment is as concerned with errors and accidents as it is with fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
15
Public companies are required to adopt the Control Objectives for Information and Related Technology framework under SOX.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
16
The Electronic Systems Assurance and Control model provides a framework for evaluating controls over email systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
17
Computer assisted audit techniques are used primarily when auditing around the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
18
Use of test data is not recommended when evaluating integrated online systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
19
Certified Information System Auditors must have an accounting degree.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
20
A career in information technology auditing requires both specialized skills and a broad-based set of technical knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is not one of the groups of SOX compliance requirements?

A)Requirements to use an IT auditor to evaluate controls
B)Regulations governing executive reporting and conduct
C)Rules about financial statement reporting
D)Audit committee/corporate governance requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
22
Section 404 of SOX requires that the information technology auditor "sign off" that the financial statements are reliable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
23
Computer assisted audit techniques:

A)Are never used in compliance testing
B)May be used for substantive and compliance testing
C)Are used primarily when auditing around the computer
D)Are good tools for auditors who are lacking in technical computer skills
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
24
The best educational background for a Certified Information Systems Auditor is:

A)A degree in information systems or technology
B)A degree which combines the study of accounting with the study of information systems
C)No college degree,but work experience in information systems
D)An accounting degree
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
25
Information technology governance:

A)Is a component of IT auditing
B)Has one objective - to ensure that IT is used strategically to fulfill an organization's mission
C)Is intended to ensure both the strategic use of IT and control over IT resources
D)Is primarily intended to deter IT fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
26
The three conditions for fraud in the fraud triangle include incentive/pressure,rationalization,and opportunity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
27
A computerized AIS is harder to audit than a manual system for all of the following reasons except:

A)The file information is not human readable
B)The volume of transaction records and master file records is usually much larger in computerized systems than in manual systems
C)An audit trail does not exist in a computerized AIS
D)Computerized systems often use remote real-time data processing,thus complicating the tracing of transaction records to their sources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
28
One purpose of generalized audit software packages is to enable an auditor to examine the contents of computer files of interest without having to write a computer program himself/herself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
29
Auditors may use transaction tagging to verify how a system processes certain transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
30
The primary purpose of an internal audit is:

A)To verify the accuracy of a firm's financial statements
B)To punish employees for inefficient performance
C)To meet the requirements of the accounting profession
D)To ascertain employee adherence to organizational policies and procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
31
It is relatively easy to prevent hackers from unauthorized access to data and programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
32
SAS No.99 - Consideration of Fraud in a Financial Statement Audit guides auditors in being more proactive in detecting fraud than did the predecessor standard,SAS No.82.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
33
Test of program length is one approach to detecting the existence of a Trojan Horse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
34
Through-the-computer auditing uses all of the following except:

A)Confirmation sampling
B)Test data
C)Tests of program authorization
D)Embedded audit modules
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
35
If an auditor were to audit a payroll application using around-the-computer auditing techniques,the individual would:

A)Use test data
B)Verify that the output from the computerized processing was correct for the input data used to generate it
C)Never use a surprise audit because of the amount of time and work involved
D)Prepare a profile of a computer file and check the processed data with the profile thus obtained
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is not true?

A)An internal audit is never performed by external auditors
B)The primary goals of an internal audit and an external audit are somewhat different
C)Both internal and external audits are similar in their insistence upon objectivity in the performance of the audit evaluation
D)Both the internal audit and the external audit rely heavily upon the audit trail of transactions in an accounting system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
37
The most important skills needed by information technology auditors are people skills.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
38
The advantages of around-the-computer auditing include:

A)The emphasis which is placed on testing data processing exceptions
B)Use of live data
C)The minimal disturbance of a company's records
D)both b and c
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
39
The AICPA has decided to drop its WebTrust services and replace SysTrust with a general Trust assurance service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
40
Information Technology (IT)governance includes using IT responsibly and efficiently,but not necessarily strategically.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
41
Information Technology governance includes all of the following except:

A)A decentralized approach to IT acquisition
B)Using IT strategically to carry out the objectives of an organization
C)Ensuring effective management of an organization's IT resources
D)Control over IT-related risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
42
The most important advantage of an integrated test facility is that it:

A)Allows auditors to evaluate transactions in an operational setting
B)Can test every exception transaction as opposed to test data which includes only a limited set of such transactions
C)Works best at evaluating input controls
D)Has no disadvantages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following is not typically checked by an auditor in a review of a responsibility system of computer program development and maintenance?

A)Documentation of all program changes on proper change-request forms
B)Proper costing of all program change requests
C)A review of each program change request by an internal auditor
D)Matches between program documentation and the production version of a computer program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which section of SOX requires CEOs and CFOs to "sign off" on their company's financial statements?

A)Section 404
B)Section 201
C)Section 103
D)Section 302
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
45
All of the following are true concerning embedded audit modules except:

A)They provide for continuous auditing of application processing
B)The auditor does not have to be involved in the development of these programs
C)Once implemented,the system can capture information that is useful to the auditor on an ongoing basis
D)With this approach,the application program incorporates subroutines for audit purposes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
46
The greatest drawback of an integrated test facility is that:

A)It requires the construction of a high volume of test data
B)It introduces artificial transactions into the transaction stream
C)It produces overkill in the audit function
D)It is not broad enough to cover the entire spectrum of activities involved in the AIS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
47
Three common techniques auditors use to test computer programs are:

A)Test data,integrated test facilities,and parallel simulation
B)Test data,edit checks,and integrated test facilities
C)Test data,program change control,and parallel simulation
D)Program change control,edit checks,and parallel simulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following audit techniques is likely to require the most technical expertise on the part of an auditor?

A)Test data
B)Integrated test facility
C)Evaluation of program change control
D)Parallel simulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following statements is not true regarding people skills for IT auditors?

A)People skills are more important than technical skills
B)An example of people skills would be the ability to work as a team
C)In the case of protecting against computer viruses,technical skills matter more than people skills
D)Many internal controls evaluated by auditors concern human behavior
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
50
When an auditor audits with the computer,the auditor:

A)Uses the computer to process transaction data under normal processing conditions
B)Uses the computer as a tool to assist in various other auditing tasks
C)Relies heavily upon test data to evaluate the presence or absence of specific computer controls
D)Must also use an integrated test facility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
51
All of the following are examples of parameters that might be used to set passwords except:

A)A minimum password length of six digits
B)Restriction of passwords to alphanumeric characters only
C)Required use of words that can be found in a dictionary
D)A requirement for a minimum interval (such as one day)before a password may be changed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
52
An integrated test facility is used to:

A)Test only the computer programs of an AIS
B)Test only the manual operations of an AIS
C)Test both the programs and the manual operations of an AIS in an operational setting
D)Test the computer programs,the manual operations,and the auditing procedures of a company using a computerized AIS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following is not a condition for fraud as identified in the fraud triangle?

A)Incentives or pressures
B)Greed
C)Opportunity
D)Rationalization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
54
SQL is:

A)An example of an integrated test facility
B)A generalized audit software program
C)A tool used for continuous auditing
D)A tool used by auditors to retrieve and manipulate data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
55
Prewritten computer programs used for audit purposes are called:

A)Sequential access program systems
B)Positive confirmation audit systems
C)Embedded audit modules
D)Generalized audit software packages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following services is not prevented by SOX for an auditor to perform for their own client?

A)Internal auditing outsourcing services
B)Expert services related to the audit
C)Actuarial services
D)Implementation of a financial information system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
57
The term "test data" is associated with:

A)Auditing through-the-computer
B)Auditing around-the-computer
C)Auditing of manual accounting systems
D)Non-auditing procedures performed by a firm's accounting subsystem employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
58
Under which audit technique is the way transactions are processed examined?

A)Exception reporting technique
B)Transaction tagging technique
C)Snapshot technique
D)Parallel simulation technique
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
59
The four approaches to through-the-computer auditing include all but which of the following:

A)Use of embedded audit modules
B)Testing of outputs to verify processing
C)Computer program testing
D)Validation of computer programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
60
The auditor's role in reviewing the system of computer program development:

A)Does not include checking to see that all program changes are properly documented
B)Does not include a check of librarian functions
C)Does not include checking to see that program change requests are properly costed
D)Includes a cross-check of program changes against in-use programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
61
Controls over access to IT systems are particularly important because:

A)Weak access controls prevent unauthorized use of systems
B)Access controls allow auditors to employ continuous auditing techniques
C)Access controls make test data more effective
D)Weak access controls can allow users to bypass many other controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following is not a principle of the AICPA's Trust Services?

A)Maintainability
B)Availability
C)Online privacy
D)Processing integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
63
All of the following are reasons why SOX was enacted,except:

A)Enron's CEO,Jeffrey Skilling,claimed he did not know about the company's financial shenanigans because he was not involved in their accounting
B)Public perception was that auditors were having conflicts of interest with respect to the auditing and consulting services they provided
C)The FASB has long been thought to be ineffective
D)Congress wanted to restore investor confidence in the wake of a rash of corporate scandals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
64
Continuous audit techniques can improve the effectiveness of the audit by:

A)Focusing most of the audit effort near the year-end
B)Alerting auditors to potential problems when the problems occur
C)Protecting the privacy of the auditors
D)Facilitating parallel simulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
65
Risks of using an integrated test facility include:

A)Failure to remove fake transactions from the client's system
B)High costs of building the facility
C)Discovery of many control weaknesses
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.