IT Audit by Otero Chapters 1 and 2

IT Audit by Otero Chapters 1 and 2

12th Grade

30 Qs

quiz-placeholder

Similar activities

VCE Lead Beater's Possum

VCE Lead Beater's Possum

11th Grade - University

26 Qs

Greek Language

Greek Language

6th - 12th Grade

28 Qs

Muscle Functionality

Muscle Functionality

9th - 12th Grade

27 Qs

SEM I Unit 3 Post test

SEM I Unit 3 Post test

9th Grade - University

35 Qs

Nondispensing Duties

Nondispensing Duties

10th - 12th Grade

30 Qs

Introduction to Government

Introduction to Government

9th - 12th Grade

30 Qs

Probation & Parole

Probation & Parole

9th - 12th Grade

25 Qs

Occupiers' Liability

Occupiers' Liability

12th Grade

26 Qs

IT Audit by Otero Chapters 1 and 2

IT Audit by Otero Chapters 1 and 2

Assessment

Quiz

Other

12th Grade

Hard

Created by

Leyson Juan

Used 9+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The components of an Information System include the following except:

People

Process

Price

Technology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are well known ERPs today except:

SAP

Oracle

Microsoft Dynamics

Gemini

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This was a major accounting scandal in the US discovered in the summer of 2002 that led to the downfall of financial markets.

Enron

WorldCom

Lehman Brothers

Watergate

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are Big 4 Accounting Firms except

EY

PwC

KPMG

DFT

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ITGCs may involve review of the following:

Sequence checks

Data input validation

Mathematical accuracy check

Access termination

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When processing information, one of the characteristics of data integrity is:

Security

Availability

Confidentiality

Completeness

7.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

Which of the following are top reasons to conduct an IT audit?

I.                     To support financial statement audits

II.                   To control and monitor the significant growth of corporate hackers

III.                 To audit large amounts of data

I only

I and II only

I and III only

I, II and III

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?