Question

In: Accounting

An auditor sets an embedded audit module to flag all credit transactions in excess of $5,000....

An auditor sets an embedded audit module to flag all credit transactions in excess of $5,000. The flag causes the system state to be recorded before and after each transaction is processed. The auditor is using

a

audit hooks.

b

an integrated test facility.

c

the snapshot technique.

d

a system control audit review file.

Which of the following is  not one of the six objectives of an information systems audit?

a

Security provisions exist to protect data from unauthorized access, modification, or destruction.

b

Obtaining evidence to provide reasonable assurance the financial statements are not materially misstated

c

Program modifications have received management's authorization and approval.

d

Programs have been developed and acquired in accordance with management's authorization.

Solutions

Expert Solution

1. c. The Snapshot technique.

Explanation: Snapshot technique is an audit technique which is automated and is used to track a specific transaction by using the software program. For this to happen, certain specific codes are provided to the system on the basis of which system prepares the report for further analysis.

Under Audit Hooks, auditors tag a transaction and in case of recurrance of similar transaction, notification is generated.

Under Integrated test facility, a sample transaction is entered into the system on the basis of which the system generates the output.

Under system control audit review file, the software is embedded on the basis of which monitoring of transactions are done by the auditor.

2. b. Obtaining evidence to provide reasonable assurance the financial statements are not materially misstated.

Explanation: Obtaining of evidence to provide reasonable assurance the financial statements are not materially misstated is an audit of internal financials controls over Financial Reporting. All the other mentioned options (except the option in answer) are the objectives of Information system audit.


Related Solutions

"Audit Considerations" Please respond to the following: Explain how an embedded audit module works and why...
"Audit Considerations" Please respond to the following: Explain how an embedded audit module works and why auditors may choose not to use it. Determine the approach an auditor should consider instead. Explain your answer. Discuss why auditors should be familiar with the principle of data normalization and if auditors should be required to specialize in IT. Justify your answer.
Unless otherwise noted, all sets in this module are finite. Prove the following statements... 1. If...
Unless otherwise noted, all sets in this module are finite. Prove the following statements... 1. If A and B are sets then (a) |A ∪ B| = |A| + |B| − |A ∩ B| and (b) |A × B| = |A||B|. 2. If the function f : A→B is (a) injective then |A| ≤ |B|. (b) surjective then |A| ≥ |B|. 3. For each part below, there is a function f : R→R that is (a) injective and surjective. (b)...
Jeffrey Wang, a CPA and an auditor, makes the following comment, “The audit process is all...
Jeffrey Wang, a CPA and an auditor, makes the following comment, “The audit process is all about gathering evidence. A key part of the process is to gather evidence efficiently and effectively.” What exactly does Jeffrey mean by this comment? Question 2 You have been asked by the accounting teacher at the local high school to explain to students interested in accounting why society needs auditors. Briefly outline your response. Question 3 Required For each of the following independent situations,...
What audit area should the company be prepared for the auditor to review all purchases?
What audit area should the company be prepared for the auditor to review all purchases?
Unless otherwise noted, all sets in this module are finite. Prove the following statements... 1. Let...
Unless otherwise noted, all sets in this module are finite. Prove the following statements... 1. Let S = {0, 1, . . . , 23} and define f : Z→S by f(k) = r when 24|(k−r). If g : S→S is defined by (a) g(m) = f(7m) then g is injective and (b) g(m) = f(15m) then g is not injective. 2. Let f : A→B and g : B→C be injective. Then g ◦f : A→C is injective. 3....
JUNE JOURNAL TRANSACTIONS June 1 Purchased 5,000 Fish Finder units on Credit from Raydar Marine for...
JUNE JOURNAL TRANSACTIONS June 1 Purchased 5,000 Fish Finder units on Credit from Raydar Marine for $42.00 per unit. June 1 Issued 10,000 shares of common stock for $20 per share (Refer to the Chart of Accounts for description of common stock). June 1 Signed a one-year 15%, $216,000 note payable with Boat US Bank. June 1 Sold 4,000 Propellers on account to Chris Craft for $85 per units, Invoice #5555. June 2 Rented part of the warehouse to a...
Prepare the journal entries for the transactions below: Credit terms for all sales on account are...
Prepare the journal entries for the transactions below: Credit terms for all sales on account are 2/10, n/30. Huff Fitness uses a perpetual inventory system and therefore records the cost of merchandise sold as well as the sale. Apr 2     Received a check for $14,406.00 from Extreme Fitness Club in payment of our invoice of March 27 for $14,700 less discount. Apr 2     Issued Check # 2202 for $6,720.00 to Harvey Insurance Company as a prepayment of insurance for a...
Prepare the journal entries for the transactions below: Credit terms for all sales on account are...
Prepare the journal entries for the transactions below: Credit terms for all sales on account are 2/10, n/30. Huff Fitness uses a perpetual inventory system and therefore records the cost of merchandise sold as well as the sale. Apr 25   Received a credit memo from Iker Enterprises for merchandise returned, $400. Apr 25   Sold merchandise on acct, Inv #308 to Ana’s Gym in the Grove, $9,262.50. COGS is $5,928. Apr 26   Issued Check #2214 for $13,000 to Payroll for biweekly...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT