A manufacturing firm wants to automate its invoice payment
system. Objectives state that the system should require
considerably less time for review and authorization and the
system should be capable of identifying errors that require
follow up. Which of the following would BEST meet these
objectives?
A. Establishing an inter-networked system of client servers
with suppliers for increased efficiencies
B. Outsourcing the function to a firm specializing in
automated payments and accounts receivable/invoice processing
C. Establishing an EDI system of electronic business
documents and transactions with key suppliers, computer to
computer, in a standard format
D. Reengineering the existing processing and redesigning the
existing system
Answer / guest
Answer: C
EDI is the best answer. Properly implemented (e.g.,
agreements with trading partners transaction standards,
controls over network security mechanisms in conjunction
with application controls) EDI is best suited to identify
and follow up on errors more quickly, given reduced
opportunities for review and authorization.
| Is This Answer Correct ? | 8 Yes | 1 No |
The BEST time to perform a control self-assessment involving line management, line staff and the audit department is at the time of: A. compliance testing. B. the preliminary survey. C. substantive testing. D. the preparation of the audit report.
Which of the following is a detective control? A. Physical access controls B. Segregation of duties C. Backup procedures D. Audit trails
An enterprisewide network security architecture of public key infrastructure (PKI) would be comprised of: A. A public key cryptosystem, private key cryptosystem and digital certificate B. A public key cryptosystem, symmetric encryption and certificate authorities C. A symmetric encryption, digital certificate and kerberos authentication D. A public key cryptosystem, digital certificate and certificate authorities
The document used by the top management of organizations to delegate authority to the IS audit function is the: A. long-term audit plan. B. audit charter. C. audit planning methodology. D. steering committee minutes.
An IS auditor's MAJOR concern as a result of reviewing a business process reengineering (BPR) project should be whether the: A. newly designed business process has key controls in place. B. changed process will affect organization structure, finances and personnel. C. roles for suppliers have been redefined. D. process has been documented before and after reengineering.
To review access to ceratin data base to determine whether the "new user" forms were correctly authorized. This is an example of:
An IS auditor when reviewing a network used for Internet communications, will FIRST examine the: A. validity of passwords change occurrences. B. architecture of the client-server application. C. network architecture and design. D. firewall protection and proxy servers.
A key element in a risk analysis is/are: A. audit planning. B. controls. C. vulnerabilities. D. liabilities.
A network diagnostic tool that monitors and records network information is a/an: A. online monitor. B. downtime report. C. help desk report. D. protocol analyzer.
A retail company recently installed data warehousing client software at geographically diverse sites. Due to time zone differences between the sites, updates to the warehouse are not synchronized. Which of the following will be affected the MOST? A. Data availability B. Data completeness C. Data redundancy D. Data inaccuracy
In planning a software development project, which of the following is the MOST difficult to determine? A. Project slack times B. The project's critical path C. Time and resource requirements for individual tasks D. Relationships that preclude the start of an activity before others are complete
Which of the following is a management technique that enables organizations to develop strategically important systems faster while reducing development costs and maintaining quality? A. Function point analysis B. Critical path methodology C. Rapid application development D. Program evaluation review technique