c. detection risk. (Correct. Auditors and their audit procedures will fail to detect a material
error or misstatement.)
a. planning (Correct. The first step in an operational audit is planning, during which
knowledge of business operations is developed.)
a. True (Correct. Performing calculations again to verify quantitative information. It is a
part of the collection of audit evidence.)
d. They are important in all three steps. (Correct. Materiality and reasonable assurance
are important when the auditor plans an audit and when the auditor collects and evaluates
evidence.)
5. What is the four-step approach to internal control evaluation that provides a logical framework for carrying out an audit? a. inherent risk analysis b. systems review c. tests of controls d. risk-based approach to auditing
d. risk-based approach to auditing (Correct. The risk-based audit approach is a four-step
approach to carrying out an audit. The four steps are determining threats, identifying
control procedures, evaluating control procedures, and evaluating weaknesses.)
d. reprogramming code (Correct. Reprogramming code is not used to test for unauthorized
program changes.)
c. SCARF (Correct. System control audit review file is a concurrent audit technique that
embeds audit modules into application software to monitor continuously all transaction
activity.)
d. scanning routine (Correct. Scanning routine software programs search for particular
variable names or specific characters.)
a. GAS (Correct. Generalized audit software is a software program written especially for
audit uses, such as testing data files. Examples are ACL and IDEA.)
b. all aspects of information systems management (Correct. An operational audit is concerned
with all aspects of information systems management.)