Home
Mcqs
Quizes
Q&A
Past Paper
blog
Spaces
Join Now
Sign in
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What is the main focus of a general controls review in an IS audit?
A. Data accuracy.
B. System functionality.
C. User access.
D. Control environment.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
Which type of audit evidence is considered most reliable?
A. Oral testimony.
B. Documentary evidence.
C. Physical observation.
D. Reperformance.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What is the primary purpose of performing a risk assessment in an IS audit?
A. Determine audit fees.
B. Identify high-risk areas.
C. Ensure compliance.
D. Allocate resources.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
Which audit technique involves following a transaction through the entire processing cycle?
A. Parallel testing.
B. Walkthrough.
C. Compliance testing.
D. Substantive testing.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What does the acronym COBIT stand for in the context of IS auditing?
A. Control Objectives for Information and Related Technology.
B. Comprehensive Objectives for IT.
C. Centralized Operations and Business IT.
D. Compliance Objectives for Business and IT.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
Which of the following is the first step in the information systems audit process?
A. Planning.
B. Testing controls.
C. Reporting.
D. Collecting evidence.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Information Systems Auditing Process
What is the primary objective of an information systems audit?
A. Detect fraud.
B. Improve efficiency.
C. Evaluate controls.
D. Reduce costs.
‹
1
2
3
›
COMPUTER SCIENCE & IT
Web Design & Development
Database Management Systems
Computer Networks & Security
Operating Systems
Data Structures & Algorithms
Information Systems Auditing Process
Governance and Management of Information Technology
Information Systems Acquisition Development & Implementation
Information Systems Operations and Business Resilience
Protection of Information Assets
Programming
Cybersecurity
Software Engineering