Which of the following is an output control objective?
A. Maintenance of accurate batch registers
B. Completeness of batch processing
C. Appropriate accounting for rejections and exceptions
D. Authorization of file updates
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
Exceptions and rejections are output products that must be
accounted for by appropriate output controls. Choices A, B
and D are input control objectives.
Is This Answer Correct ? | 11 Yes | 0 No |
Answer / antoine
C. Appropriate accounting for rejections and exceptions
Is This Answer Correct ? | 0 Yes | 0 No |
An IS auditor has been assigned to conduct a test that compares job run logs to computer job schedules. Which of the following observations would be of the GREATEST concern to the IS auditor? A. There are a growing number of emergency changes. B. There were instances when some jobs were not completed on time. C. There were instances when some jobs were overridden by computer operators. D. Evidence shows that only scheduled jobs were run.
Which of the following Internet security threats could compromise integrity? A. Theft of data from the client B. Exposure of network configuration information C. A trojan horse browser D. Eavesdropping on the net
The risk of an IS auditor using an inadequate test procedure and concluding that material errors do not exist when, in fact, they exist is:
Which tests is an IS auditor performing when certain program is selected to determine if the source and object versions are the same?
An IS auditor performing an access controls review should be LEAST concerned if: A. audit trails were not enabled. B. programmers have access to the live environment. C. group logons are being used for critical functions. D. the same user can initiate transactions and also change related parameters.
Creation of an electronic signature: A. encrypts the message. B. verifies where the message came from. C. cannot be compromised when using a private key. D. cannot be used with e-mail systems.
Which of the following is the basic objective of a control self-assessment program?
Which of the following techniques would provide the BEST assurance that the estimate of program development effort is reliable? A. Function point analysis B. Estimates by business area C. A computer-based project schedule D. An estimate by experienced programmer
Which of the following tasks is normally performed by a clerk in the control group? A. Maintenance of an error log B. Authorization of transactions C. Control of noninformation systems assets D. Origination of changes to master files
Which of the following is a substantive test?
Which of the following data validation edits is effective in detecting transposition and transcription errors? A. Range check B. Check digit C. Validity check D. Duplicate check
In a risk-based audit approach, an IS auditor should FIRST complete :