Filters
Question type

Study Flashcards

A comprehensive ________ ________ can be established by collecting,in an extended record,supplementary data concerning processing not normally collected.

Correct Answer

verifed

verified

Which of the following procedures uses only auditor-prepared test transactions?


A) The test data approach
B) Integrated test facility
C) Parallel simulation
D) Embedded audit routines

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

GAS has a long history of usage because public accounting firms developed it in the 1960s.

A) True
B) False

Correct Answer

verifed

verified

An audit of the computer service center is undertaken before any application audits to ensure the ________ ________ of the environment in which the application will function.

Correct Answer

verifed

verified

The phase of an information systems audit in which effort is placed on fact-finding in the areas selected for audit is the


A) first phase.
B) second phase.
C) third phase.
D) fourth phase.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Test data used in ITF are identified by special ________ and must be excluded from normal system outputs.

Correct Answer

verifed

verified

________ is for IS audit,control,assurance and/or security professionals.


A) CISA
B) CISM
C) CGEIT
D) COBIT

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The primary audit technique used in an information systems development audit is the review and testing of related ________.

Correct Answer

verifed

verified

When batch processing was the dominant method used in computerized data processing,the ________ approach provided an adequate audit.

Correct Answer

verifed

verified

Information technology is used to perform some audit work that otherwise would be done manually.The use of information technology by auditors is


A) essential.
B) mandatory under AICPA Statements of Auditing Standards.
C) optional.
D) at the sole discretion of the manager in charge of the audit.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

________ is an open standard which provides "good practices" across a domain and process framework and presents activities in a manageable and logical structure.

Correct Answer

verifed

verified

CISA,CISM,and CGEIT are professional certifications in system security.

A) True
B) False

Correct Answer

verifed

verified

Which two information system auditing technologies are very similar?


A) Snapshot and extended records
B) ITF and ACL
C) Snapshot and ACL
D) Extended records and ITF

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

An audit of an organization's computer service center is normally undertaken before any information system application audit.

A) True
B) False

Correct Answer

verifed

verified

True

A clear and obvious benefit is obtained from the ________ analysis capability provided by information technology.

Correct Answer

verifed

verified

ITF is the one universal auditing approach used in information system audits.

A) True
B) False

Correct Answer

verifed

verified

Using information technology in auditing reduces the time spent on clerical tasks and may improve the overall morale and productivity of auditors.

A) True
B) False

Correct Answer

verifed

verified

Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms. Match the appropriate term with each definition. Each answer will be used only once.

Premises
Mapping
Compliance testing
Extended records
Substantive testing
Interim audit
Snapshot
Parallel simulation
Audit software
Desk checking
Tracing
Responses
Modification of programs to collect and store additional data of audit interest
Computer programs that permit the computer to be used as an auditing tool
Special software that is used to monitor the executing of a program
The first stage of a financial statement audit which has the objective of establishing the degree to which the internal control system can be relied upon
Provides a detailed audit trail of the instructions executed during a program's operation
Modification of programs to output data of audit interest
Direct verification of balances contained in financial statements
The auditor manually processes test or real data through the logic of a computer program
Testing to confirm the existence, assess the effectiveness, and check the continuity of operation of internal controls
The processing of real data through audit programs, with the simulated output and the regular output compared for control purposes

Correct Answer

Mapping
Compliance testing
Extended records
Substantive testing
Interim audit
Snapshot
Parallel simulation
Audit software
Desk checking
Tracing

Because resources are usually limited,not all applications can be audited each year.What factors should an internal or external auditor consider when deciding which applications to audit?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

When deciding which applications to audit, both internal and external auditors should consider several factors. These factors may include the level of risk associated with the application, the significance of the application to the organization's operations, the potential impact on financial reporting, and the regulatory requirements that apply to the application. Additionally, auditors should consider any recent changes or updates to the application, any historical issues or deficiencies, and the availability of resources and expertise to effectively audit the application. It is also important to consider the input from management and other stakeholders to ensure that the audit plan aligns with the organization's priorities and objectives. Ultimately, the goal is to prioritize audits based on the applications that pose the greatest risk and have the most significant impact on the organization.

Below are listed four procedures typically performed during an audit of accounts payable: Audit procedures: a.Test the mathematical accuracy of the accounts payable subsidiary ledger. b.Select samples of vouchers to examine in detail. c.Determine whether cash discounts were properly applied. d.Stratify accounts by value. Required: Briefly state a generalized audit software technique that could be used to perform each procedure,assuming that the accounts payable application is computerized.

Correct Answer

verifed

verified

a.Use GAS to independently verify extensions and footing of the ledger. b.Use GAS to select a random,stratified,or other sample of vouchers or voucher numbers (depending on how extensively the records are computerized). c.Use GAS logic functions to determine when the company was eligible to take cash discounts; use GAS mathematical functions to recalculate discounts and net payables. d.Use GAS logic functions to determine which accounts fall within the desired value ranges.

Showing 1 - 20 of 126

Related Exams

Show Answer