Quiz 9 - 09048 Student Value CorrectAnswer Feedback 1...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
1. 09-048   The use of a secure file library and restrictions on physical access to data files is a control  procedure used in conjunction with    Student  Response Value Correct Answer Feedback A.  computer  processing  controls.      B.  data files. 100%       C.  program  modification  procedures.      D.  program  development.       Score: 4/4    2. 09-051   What is the primary purpose of computer audit software?    Score: 4/4    3. 09-035   To maintain the objectivity necessary for performing an independent evaluation function, auditors  should not be involved in 
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  Score: 4/4    4. 09-046   To document the review of source data controls, an auditor may use    Score: 4/4    5. 09-025   One way an auditor gauges how much audit work and testing needs to be performed is through  evaluating materiality and seeking reasonable assurance about the nature of the information or  process. What is key to determining materiality during an audit?    Score: 4/4 
Background image of page 2
  6. 09-038   How would auditors determine if unauthorized program changes have been made?    Score: 4/4    7. 09-022   The evidence collection method that examines all supporting documents to determine the validity  of a transaction is called    Score: 4/4    8. 09-044   When it is suspected that a particular application program contains unauthorized code or serious  errors, a detailed analysis of the program logic may be necessary. The auditor has several types of  software packages available to help in analyzing program logic. A program which identifies  unexecuted program code is 
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  Score: 4/4    9. 09-031   Using the risk-based auditing approach, when the auditor identifies a control deficiency, the auditor  should inquire about    Score: 4/4    10. 09-003   The purpose of an internal audit is    Score: 4/4   
Background image of page 4
11. 09-084   What are embedded audit modules?  Student Response: Sample Correct Answer General Feedback: Score:   12. 09-019   The ________ part of the auditing process involves (among other things) the auditors observing  the operating activities and having discussion with employees.    Score: 4/4    13. 09-065   An auditor finds that absentee rates are significantly higher on Mondays and Fridays than on other  work days. This is an example collecting audit evidence by   
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Score: 4/4    14. 09-043   Auditors have several techniques available to them to test computer-processing controls. An audit  routine that flags suspicious transactions is known as    Score: 4/4    15. 09-057
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/24/2011 for the course COB acct taught by Professor Smith during the Spring '09 term at California Coast University.

Page1 / 31

Quiz 9 - 09048 Student Value CorrectAnswer Feedback 1...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online