d. All of the above are characteristics of auditing. (Correct. Auditing is a
systematic step- by-step process that involves the collection and review of
evidence and uses established criteria to evaluate evidence.)
b. It eliminates the need for testing controls during regular audits. (Correct.
Even if the auditor participates in internal control reviews, the auditor will
still have to test controls to determine whether they are in place and working
as intended.)
a. information systems audit (Correct. An information systems audit reviews
general and application controls, with a focus on determining whether there is
compliance with policies and adequate safeguarding of assets.)
d. They are important in all three steps. (Correct. Materiality and reasonable
assurance are important when the auditor plans an audit and when the auditor
collects and evaluates evidence.)
d. risk-based approach to auditing (Correct. The risk-based audit approach is
a four-step approach to carrying out an audit. The four steps are determining
threats, identifying control procedures, evaluating control procedures, and
evaluating weaknesses.)
6.Which of the following procedures is NOT used to detect unauthorized program changes? a. source code comparison b. parallel simulation c. reprocessing d. reprogramming code
d. reprogramming code (Correct. Reprogramming code is not used to test for
unauthorized program changes.)
c. SCARF (Correct. System control audit review file is a concurrent audit
technique that embeds audit modules into application software to
monitor continuously all transaction activity.)
d. scanning routine (Correct. Scanning routine software programs search for
particular variable names or specific characters.)
9. Which of the following is a computer program written especially for audit use? a. GAS b. CATAS c. ITF d. CIS
a. GAS (Correct. Generalized audit software is a software program written
especially for audit uses, such as testing data files. Examples are ACL and
IDEA.)
b. all aspects of information systems management (Correct. An operational
audit is concerned with all aspects of information systems management.)