Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 1
Quiz 7: Auditing Information Technology-Based Processes
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Multiple Choice
These tests of security controls analyze a company's control environment for possible weaknesses.Special software programs are available to help auditors identify weak points in a company's security measures.
Question 82
Multiple Choice
All of the following are examples of security controls except:
Question 83
Multiple Choice
Auditors may send text messages through a company's system to find out whether encryption of private information is occurring properly.In addition, special software programs are available to help auditors identify weak points in a company's security measures.These are examples of:
Question 84
Multiple Choice
A process of constant evidence gathering and analysis to provide assurance on the information as soon as it occurs or shortly thereafter is referred to as:
Question 85
Multiple Choice
The two broad categories of general controls that relate to IT systems include which of the following:
Question 86
Multiple Choice
In addition to testing system documentation, auditors should test the three main functions of computer applications.Which of the following is not one of these functions?
Question 87
Multiple Choice
Auditors should perform this type of test to determine the valid use of the company's computer system, according to the authority tables.
Question 88
Multiple Choice
The auditor's test of the accuracy of monetary amounts of transactions and account balances is known as:
Question 89
Multiple Choice
Regardless of whether the results are printed or retained electronically, auditors may perform all of the following procedures to test application outputs, except:
Question 90
Multiple Choice
This type of application control is performed to verify the correctness of information entered into software programs.Auditors are concerned about whether errors are being prevented and detected during this stage of data processing.
Question 91
Multiple Choice
This phase of auditing occurs when the auditors evaluate all the evidence that has been accumulated and makes a conclusion based on that evidence.
Question 92
Multiple Choice
Related audit tests to review the existence and communication of company policies regarding important aspects of IT administrative control include all of the following, except:
Question 93
Multiple Choice
One of the most effective ways a client can protect its computer system is to place physical controls in the computer center.Physical controls include all of the following, except:
Question 94
Multiple Choice
IT audit procedures typically include a combination of data accuracy tests where the data processed by computer applications are reviewed for correct dollar amounts or other numerical values.These procedures are referred to as:
Question 95
Multiple Choice
This law, also known as the first-digit law, was named after a physicist who discovered a specific but non-uniform pattern in the frequency of digits occurring as the first number in a list of numbers: