Filters
Question type

Study Flashcards

Audits of computer service centers do not require as high a degree of technical expertise as do audits of computerized applications.

A) True
B) False

Correct Answer

verifed

verified

Listed below are five examples of auditing situations and five information systems auditing techniques. Required: First,match the letter of the information system auditing technique which best identifies the example.Then,in the space below each item,write a brief explanation of how the technique works in the situation. A.Parallel simulation B.Test data approach C.Mapping D.PC software E.Extended records ________ 1.An auditor performs an inexpensive test of a cash disbursements program without modifying the client's program. ________ 2.Audit team members communicate with each other in separate locations during an audit by exchanging Word and Excel files electronically. ________ 3.An auditor inputs test sales order data to find out whether a sales order program executes the program statements needed to produce a shipping notice document. ________ 4.An internal auditor modifies a newly designed accounts receivable program to randomly select sales transactions and save each transaction's complete processing audit trail. ________ 5.During substantive testing,an auditor tests a client's loan interest accrual program by submitting the client's data to a program running on a computer at the auditor's office.

Correct Answer

verifed

verified

1.D (or B)...

View Answer

In ________ checking,an auditor manually processes test or real program data through the logic of a program.

Correct Answer

verifed

verified

Describe three areas that an auditor could examine in an audit of a computer service center.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

An auditor could examine the following t...

View Answer

The goal of RBA to auditing is to apply audit efforts to areas in proportion to their likelihood to


A) reduce exposures in areas of high risk.
B) reduce the exposure and occurrences of fraud.
C) significantly impact the auditor's overall audit conclusions.
D) All of the above are goals of RBA.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

________ is the most recent certification programs and for individuals interested in Governance of Enterprise IT.


A) CISA
B) CISM
C) CGEIT
D) COBIT

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Information system audits to verify compliance with internal controls are performed by


A) internal auditors only.
B) external auditors only.
C) outside third-party consultants only.
D) both internal and external auditors.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Most information system audits follow a four-phase structure,which is followed by analysis and reporting of results.

A) True
B) False

Correct Answer

verifed

verified

An internal auditor conducts an information systems audit using the professional standards promulgated by the


A) Institute of Internal Auditors.
B) American Institute of Certified Public Accountants.
C) Institute of Management Accountants.
D) Information Systems Audit and Control Association.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

The technology that involves the modification of actual computer programs for audit purposes is called


A) generalized audit software (GAS) .
B) ACL.
C) embedded audit routines.
D) record extension.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

In the program change control phase of an application systems development audit,an element that may represent a major loss exposure in terms of fraud and access to sensitive data is


A) program development.
B) program auditing.
C) program testing and quality control.
D) program maintenance.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

The information system auditing technology that originated as a technique to assist in program design and testing is


A) tracing.
B) parallel simulation.
C) snapshot.
D) mapping.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

With the advances in technology today,the "around-the-computer" approach to auditing is no longer widely used.

A) True
B) False

Correct Answer

verifed

verified

One type of tracing is to verify a hash total of the object code of software to detect modifications to the software.

A) True
B) False

Correct Answer

verifed

verified

The test data technique requires minimal computer expertise and is usually inexpensive to implement.

A) True
B) False

Correct Answer

verifed

verified

Auditors with little computer expertise can use ________ to perform audit-related data processing functions.

Correct Answer

verifed

verified

GAS
genera...

View Answer

Parallel simulation processes test data through real programs.

A) True
B) False

Correct Answer

verifed

verified

Presented below is a list of terms relating to accounting information systems,followed by definitions of those terms. Required: Match the letter next to each definition with the appropriate term.Each answer will be used only once. ________ 1.Mapping ________ 2.Compliance testing ________ 3.Extended records ________ 4.Substantive testing ________ 5.Interim audit ________ 6.Snapshot ________ 7.Parallel simulation ________ 8.Audit software ________ 9.Desk checking ________10.Tracing A.Modification of programs to collect and store additional data of audit interest B.Computer programs that permit the computer to be used as an auditing tool C.Special software that is used to monitor the executing of a program D.The first stage of a financial statement audit which has the objective of establishing the degree to which the internal control system can be relied upon E.Provides a detailed audit trail of the instructions executed during a program's operation F.Modification of programs to output data of audit interest G.Direct verification of balances contained in financial statements H.The auditor manually processes test or real data through the logic of a computer program I.Testing to confirm the existence,assess the effectiveness,and check the continuity of operation of internal controls J.The processing of real data through audit programs,with the simulated output and the regular output compared for control purposes

Correct Answer

verifed

verified

1.C,2.I,3....

View Answer

An audit technique not requiring the use of the client's computer facilities is


A) the use of snapshots.
B) the test data approach.
C) the integrated test facility.
D) parallel simulation.

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is a possible benefit of using information systems technology in the conduct of an audit?


A) Increased independence from information systems personnel
B) Elimination of most manual calculations, footing, and cross-footing
C) Standardization of audit working papers and correspondence
D) All of these answers are correct.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 126

Related Exams

Show Answer