筛选结果 共找出50

Which of the following would be classed as a contingency control in an information system?

A

Password-only access to the system

B

System recovery procedures

C

Audit trails

All of the following, with one exception, are inherent limitations of internal control systems. Which is the exception?

A

The costs of control

B

Potential for human error and deliberate override

C

The types of transactions controls are designed to cope with

D

The independence of controls from the method of data processing

Which of the following statements about external auditors is not correct?

A

External auditors are appointed by the shareholders of a company

B

The primary responsibility of external auditors is to investigate financial irregularities and report

them to shareholders

C

External auditors may rely on the work of internal auditors, if they first assess its worth

D

External auditors are concerned with the financial records and statements of the organisation

In the context of audit, what are 'substantive tests' designed to accomplish?

A

To establish whether internal controls are being applied as prescribed

B

To identify errors and omissions in financial records

C

To establish the causes of errors or omissions in financial records

D

To establish an audit trail

Backing up computer files and storing copies of software in separate locations to the main system are examples of which type of controls?

A

Prevent

B

Detect

C

Correct

In the context of data security controls, are records showing who has accessed a computer system and what operations he or she has performed.Which word or phrase correctly completes this definition?

A

Passwords

B

Audit trails

C

Archives

Which type of audit is concerned with the monitoring of management's performance, concentrating on the outputs of the

system and the efficiency of the organisation?

A

Systems audit

B

Operational audit

C

Probity audit

D

Social audit

Which of the following circumstances would cast doubt on the external auditor's ability to rely on the work of internal auditors?

A

There is evidence that management and directors consistently act on internal audit

recommendations

B

The internal audit function has a direct line of communication to the audit committee

C

No audit manuals or working papers are available for inspection

D

Internal auditors are recruited on technical qualifications and demonstrated proficiency

What is the term given to a method of fraud in the accounts receivable area, by which cash or cheque receipts are stolen, and the theft concealed by setting subsequent receipts against the outstanding debt?

A

Collusion

B

Misrepresentation

C

Teeming and lading

Which of the following activities create vulnerability to fraud?

(i) Calculating payslips

(ii) Preparing delivery notes

(iii) Paying supplier invoices

(iv) Meeting budgets and performance targets

A

(iii) only

B

(i) and (iii)only

C

(i) and (ii) only(i)

D

(i), (ii), (iii) and (iv)