1. The document contains an identification section that requires the respondent to identify 10 terms related to information technology auditing.
2. An enumeration section asks the respondent to list 3 common IT problems, 2 categories of IT controls, 3 responsibilities of an IT auditor regarding irregular and illegal acts, and 2 examples of generalized audit software.
3. A definition section defines the terms "IT Audit" and "Computer-assisted audit techniques (CAATs)."
4. An essay section asks the respondent to explain why keeping electronic work papers on a centralized audit file or database is important and to answer another unspecified question. The document appears to be a quiz or test covering key concepts in IT auditing.
1. The document contains an identification section that requires the respondent to identify 10 terms related to information technology auditing.
2. An enumeration section asks the respondent to list 3 common IT problems, 2 categories of IT controls, 3 responsibilities of an IT auditor regarding irregular and illegal acts, and 2 examples of generalized audit software.
3. A definition section defines the terms "IT Audit" and "Computer-assisted audit techniques (CAATs)."
4. An essay section asks the respondent to explain why keeping electronic work papers on a centralized audit file or database is important and to answer another unspecified question. The document appears to be a quiz or test covering key concepts in IT auditing.
1. The document contains an identification section that requires the respondent to identify 10 terms related to information technology auditing.
2. An enumeration section asks the respondent to list 3 common IT problems, 2 categories of IT controls, 3 responsibilities of an IT auditor regarding irregular and illegal acts, and 2 examples of generalized audit software.
3. A definition section defines the terms "IT Audit" and "Computer-assisted audit techniques (CAATs)."
4. An essay section asks the respondent to explain why keeping electronic work papers on a centralized audit file or database is important and to answer another unspecified question. The document appears to be a quiz or test covering key concepts in IT auditing.
1. The document contains an identification section that requires the respondent to identify 10 terms related to information technology auditing.
2. An enumeration section asks the respondent to list 3 common IT problems, 2 categories of IT controls, 3 responsibilities of an IT auditor regarding irregular and illegal acts, and 2 examples of generalized audit software.
3. A definition section defines the terms "IT Audit" and "Computer-assisted audit techniques (CAATs)."
4. An essay section asks the respondent to explain why keeping electronic work papers on a centralized audit file or database is important and to answer another unspecified question. The document appears to be a quiz or test covering key concepts in IT auditing.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 2
Name: Score:
Year & Section: Date:
I. Identification. Write your answers before each number.
1. The fraudulent act of acquiring private and sensitive information, usually provides a link to a bogus website where the end-user is required to enter sensitive account information. 2. A collection of information that is organized so that it can be easily accessed, managed and updated 3. An independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices. 4. An ongoing process of acquiring, analyzing and reporting of business data to identify and respond to operational business risk. 5. It is a tool in applying Computer Assisted Auditing Techniques. It refers to a software designed to read, process and write data. 6. It is an agreement from the employee about not to enter into or start a similar business in competition against the employer 7. Their stated mission is to provide "dynamic leadership" for the global profession of internal auditing 8. Separation of data into smaller, more defined strata based on a predetermined set of criteria. 9. This framework’s primary function is to monitor transactions across different applications, networks and partners and use analytics to identify anomalies that are indicative of fraud. 10. Differentiate Irregular acts from Illegal acts. _______________________________________________________________ _______________________________________________________________ _______________________________________________________________ II. Enumeration. 3 common IT problems 2 categories of IT controls 3 responsibilities of an IT auditor on Irregular and Illegal acts 2 examples of generalized audit software III. Define. (2pts each) 1. IT Audit
2. Computer-assisted audit techniques (CAATs)
IV. Essay. (3pts each) 1. Why is keeping electronic work paper on centralized audit file or database is important? 2.