Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems
Quiz 7: Auditing Information Technology Bases Processes
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Multiple Choice
Auditors may send text messages through a company's system to find out whether encryption of private information is occurring properly.In addition, special software programs are available to help auditors identify weak points in a company's security measures.These are examples of:
Question 82
Multiple Choice
This piece of audit evidence is often considered to be the most important because it is a signed acknowledgment of management's responsibility for the fair presentation of the financial statements and a declaration that they have provided complete and accurate information to the auditors during all phases of the audit.
Question 83
Multiple Choice
Controls meant to prevent the destruction of information as the result of unauthorized access to the IT system are referred to as:
Question 84
Multiple Choice
This type of processing control test involves a comparison of different items that are expected to have the same values, such as comparing two batches or comparing actual data against a predetermined control total.
Question 85
Multiple Choice
In addition to testing system documentation, auditors should test the three main functions of computer applications.Which of the following is not one of these functions?
Question 86
Multiple Choice
These tests of security controls analyze a company's control environment for possible weaknesses.Special software programs are available to help auditors identify weak points in their company's security measures.
Question 87
Multiple Choice
This phase of auditing occurs when the auditors evaluate all the evidence that has been accumulated and makes a conclusion based on that evidence.
Question 88
Multiple Choice
One of the most effective ways a client can protect its computer system is to place physical controls in the computer center.Physical controls include all of the following, except:
Question 89
Multiple Choice
This type of application control is performed to verify the correctness of information entered into software programs.Auditors are concerned about whether errors are being prevented and detected during this stage of data processing.
Question 90
Multiple Choice
Auditors should perform this type of test to determine the valid use of the company's computer system, according to the authority tables.
Question 91
Multiple Choice
This is one of the computer-assisted audit techniques related to processing controls that involves processing company data through a controlled program designed to resemble the company's application.This test is run to find out whether the same results are achieved under different systems.
Question 92
Multiple Choice
These tests of the security controls involve various methods of entering the company's system to determine whether controls are working as intended.
Question 93
Multiple Choice
A process of constant evidence gathering and analysis to provide assurance on the information as soon as it occurs, or shortly thereafter, is referred to as:
Question 94
Multiple Choice
One of the most effective ways a client can protect its computer system is to place environmental controls in the computer center.Environmental controls include:
Question 95
Multiple Choice
This law, also known as the first-digit law, was named after a physicist who discovered a specific, but non-uniform pattern in the frequency of digits occurring as the first number in a list of numbers: