LU 6 Auditing General & application controls quiz

LU 6 Auditing General & application controls quiz

University

20 Qs

quiz-placeholder

Similar activities

How Ready Are You?

How Ready Are You?

University

15 Qs

Aeronautics 2

Aeronautics 2

KG - Professional Development

18 Qs

Unit 3 Government Review

Unit 3 Government Review

6th Grade - University

19 Qs

Sewing Tools

Sewing Tools

KG - University

20 Qs

Control Modes

Control Modes

University

23 Qs

Module 4 - Audit Evidences

Module 4 - Audit Evidences

University

15 Qs

Week 4_5

Week 4_5

University

25 Qs

Chapter 3- Research Design

Chapter 3- Research Design

University

15 Qs

LU 6 Auditing General & application controls quiz

LU 6 Auditing General & application controls quiz

Assessment

Quiz

Other

University

Medium

Created by

Ofentse Sindani

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

1. In a company that sells T-shirts, the online order form will only allow a customer to proceed with the transaction if they entered the correct email address in their profile. What application control is this an example of?

a. Validity check

b. Control totals

a. Field size check

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

2. Smart University has facial recognition scanners at the entrance to each department. This is an example of:

a. Physical access controls

b. Logical access controls

c. Supplementary access controls

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

3. The following could be considered application control(s):

a. Existence check

b. Batch control check

c. Sequence check

d. Arithmetic check

e. All of the above

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

4. Which one of the following examples is not considered a general IT control?

a. Security control (e.g passwords/fingerprints)

b. Software change & maintenance control

c. Batch control

d. Software system acquisition control

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

5. To ensure that data is secure & protected from unauthorized access the following controls are used:

a. Back up & recovery controls

b. Security controls (e.g fingerprints/passwords)

c. Access controls

d. All of the above

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

6. Which one of the following controls aim to ensure accuracy, completeness & validity of data in an application?

a. Access controls

b. None of the options

c. Input controls

d. Authentication controls

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

7. The following example is part of processing controls?

a. Sequential numbering/sequence check

b. Management review

c. Review of exception reports

d. Reconciliation with input

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?