Which of the following would be classed as a contingency control in an information system?
All of the following, with one exception, are inherent limitations of internal control systems. Which is the exception?
Which of the following statements about external auditors is not correct?
In the context of audit, what are 'substantive tests' designed to accomplish?
Backing up computer files and storing copies of software in separate locations to the main system are examples of which type of controls?
In the context of data security controls, are records showing who has accessed a computer system and what operations he or she has performed.Which word or phrase correctly completes this definition?
Which type of audit is concerned with the monitoring of management's performance, concentrating on the outputs of the
system and the efficiency of the organisation?
Which of the following circumstances would cast doubt on the external auditor's ability to rely on the work of internal auditors?
What is the term given to a method of fraud in the accounts receivable area, by which cash or cheque receipts are stolen, and the theft concealed by setting subsequent receipts against the outstanding debt?
Which of the following activities create vulnerability to fraud?
(i) Calculating payslips
(ii) Preparing delivery notes
(iii) Paying supplier invoices
(iv) Meeting budgets and performance targets