
Information Technology in Internal Auditing

Quiz
•
Business
•
University
•
Medium
Hui Mei Tan
Used 6+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CAAT tools are used by the Auditor to perform substantive testing. CAAT stands for
Computer Aided Audit Technique
Computer Aided Audit Tools
Computer Assisted Audit Technique
Computer Accounting and Auditing Technique
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
All of these are types of IT audits, EXCEPT:
Information security
Business continuity
Website color scheme
Access controls
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The essential aspect to be understood about the organisation subject to IT audit is
Organisation’s business and its strategic goals and objectives
Significant application supporting operations
Major pending projects in progress
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Application controls includes
IT operational controls
Control over processing
Physical controls
Policy and procedure controls
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does IT audit support governance and risk management?
By developing information security policies for organizations
By evaluating controls and minimizing risks in IT environments
By implementing IT systems to support organizational objectives
By providing financial statements for IT operations
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key benefit of Electronic Working Papers (EWPs)?
Reduced need for cybersecurity measures
Improved accessibility through cloud-based systems
Elimination of IT-specific audit tasks
Decentralisation of audit documentation
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common risk associated with e-commerce?
Reduced overhead costs
Faster buying process
Unauthorised modifications to websites
Enhanced marketing opportunities
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a recommended strategy for improving e-commerce security?
Allow unrestricted access to sensitive data
Use SSL encryption for secure transactions
Rely solely on antivirus software for protection
Avoid training staff on security protocols
Similar Resources on Wayground
9 questions
Group 9: Ice Breaker

Quiz
•
University
10 questions
Kuis Sekolah Audit 2023

Quiz
•
University
10 questions
Kuis Audit Internal

Quiz
•
University
10 questions
Pertemuan 8 - Pengumpulan Barang Bukti Audit

Quiz
•
University
12 questions
Quiz Pengaudit 5

Quiz
•
University
8 questions
Kuis Auditing 1

Quiz
•
University
10 questions
AUDIT - SESI 1

Quiz
•
University
12 questions
toeic

Quiz
•
1st Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade