Question: _______ is using computerized techniques to perpetually audit the processing of business transactions. Sampling Benchmarking Generalized auditing Continuous auditing The internal audit activity should evaluate
- _______ is using computerized techniques to perpetually audit the processing of business transactions.
- Sampling
- Benchmarking
- Generalized auditing
- Continuous auditing
- The internal audit activity should evaluate risk exposures relating to the organizations governance, operations, and information systems regarding the
- Reliability and integrity of financial and operational information
- Effectiveness and efficiency of operations
- Compliance with laws, regulations, and contracts
- All of the above
- Internal audit can do little to help with the following risk
- A computer systems or network failure at one or several locations
- The failure to complete several key information systems planned upgrades
- The failure of an audit based on International Organization for Standardization (ISO) procedures or some other standards audit
- A loss in stock market capitalization value due to reported operating losses
- Internal auditing involves many varied activities such as
- Efficiency and reliability of operations
- Deterring and investigating fraud
- Safeguarding assets
- Compliance with laws and regulations
- All of the above
- ________ are computer tools that assist auditors in their tasks.
- SCM systems
- SAS systems
- XBRL audit templates
- Computer-assisted audit tools and techniques (CAATTs)
- Under the attribute standard for due professional care in IIAs International Standards for the Professional Practice of Internal Auditing, internal auditors must
- Take an annual exam
- Consider the use of technology-based audit and other data analysis techniques
- Provide an annual report to the SEC
- Perform continuous risk assessment and report results to outside investors
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
