AUDITING LL W/ CONNECT <C>
11th Edition
ISBN: 9781307416268
Author: MESSIER
Publisher: MCGRAW-HILL HIGHER EDUCATION
expand_more
expand_more
format_list_bulleted
Question
Chapter 21, Problem 21.27MCQ
To determine
Concept Introduction:
Trust services means giving an assurance on services provided by the professional based on the common framework and principles. Trust Services Principles are security, availability, processing integrity, confidentiality and privacy. Every principle has its objective.
To choose: The assurance which is not in compliance with its principles.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What controls should be employed to avoid breaches into an accountijg information system.
Operating system security involves policies, procedures, and controls that determine who can access the operating system. User access privileges are assigned to individuals and to entire workgroups authorized to use the system.The way access privileges are assigned influences system security. Priviliges should be carefully administered and closely monitored for compliance with organizational policy. Choose one of the options below, that is not a test of control of the audit objective relating to access privileges.
a. Review employee records to determine whether users have formally acknowledged their responsibility to maintain the confidentiality of company data.b. Review the privileges of a selection of user groups and individuals to determine if their access rights are appropriate for their job descriptions and positions.c. The auditor should verify that individuals are granted access to data and programs based on their need to know.d. Review the account lockout policy and procedures…
Management and auditors are
responsible for maintaining effective
internal control system. *
True
False
Chapter 21 Solutions
AUDITING LL W/ CONNECT <C>
Ch. 21 - Prob. 21.1RQCh. 21 - Prob. 21.2RQCh. 21 - Prob. 21.3RQCh. 21 - Prob. 21.4RQCh. 21 - Prob. 21.5RQCh. 21 - Prob. 21.6RQCh. 21 - Prob. 21.7RQCh. 21 - Prob. 21.8RQCh. 21 - Prob. 21.9RQCh. 21 - Prob. 21.10RQ
Ch. 21 - Prob. 21.11RQCh. 21 - Prob. 21.12RQCh. 21 - Prob. 21.13RQCh. 21 - Prob. 21.14RQCh. 21 - Prob. 21.15MCQCh. 21 - Prob. 21.16MCQCh. 21 - Prob. 21.17MCQCh. 21 - Prob. 21.18MCQCh. 21 - Prob. 21.19MCQCh. 21 - Prob. 21.20MCQCh. 21 - Prob. 21.21MCQCh. 21 - Prob. 21.22MCQCh. 21 - Prob. 21.23MCQCh. 21 - Prob. 21.24MCQCh. 21 - Prob. 21.25MCQCh. 21 - Prob. 21.26MCQCh. 21 - Prob. 21.27MCQCh. 21 - Prob. 21.28MCQCh. 21 - Prob. 21.29MCQCh. 21 - Prob. 21.30PCh. 21 - Prob. 21.31PCh. 21 - Prob. 21.32PCh. 21 - Prob. 21.33PCh. 21 - Prob. 21.34PCh. 21 - Prob. 21.35P
Knowledge Booster
Similar questions
- Which of the following is NOT an SDLC controllable activity? a. External audit participation b. User specification c. Systems authorization d. User test and acceptance procedures e. All are SDLC controlsarrow_forwardA CIS environment exists when a computer of any type o. size is involved in the processing of an entity's financial information. If an auditor is involved in the configuration and system development prior to the implementation, is the financial information is considered reliable and free from error?arrow_forwardWhich of the following is not a major reason for maintaining an audit trail for a computer system? a. Analytical procedures. b. Query answering. c. Deterrent to fraud. d. Monitoring purposes.arrow_forward
- The purpose of ____________ is to help manage and control risk appropriately rather than to eliminate it. Internal control system Internal audit External audit Risk managementarrow_forwardTests of controls determine whether the database contents fairly reflect the organization's transactions. True Falsearrow_forwardHow audit programs that need to be made to detect vulnerabilities in the firewall?arrow_forward
- Identify each of the following as a (a) purpose of an internal control system, (b) principle of internalcontrol,or (c) limitation of internal control. Maintain adequate recordsarrow_forwardRequired: a. Create a document flowchart of the existing system. b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78. 1.Transaction Authorization 2.Segregation of Duties 3.Supervision 4.Accounting Records 5.Access Control 6.Independent Verificationarrow_forwardThe internal control requiring that checks must be prenumbered and accounted for satisfies the objective of O Accuracy O Existence O Completeness O Posting and summarizationarrow_forward
- "All the supporting documents such as PO, vendor's invoice are attached to the voucher" is one of the key controls to meet Occurrence audit assertion. True Falsearrow_forward____________can be defined as a management process that monitors on an ongoing basis whether internal controls are operating effectively. a) Continous monitoring b) Computer assisted audit techniques c) Continuous auditing d) Applicaiton controlsarrow_forwardWhich one is correct??arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubFinancial AccountingAccountingISBN:9781305088436Author:Carl Warren, Jim Reeve, Jonathan DuchacPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Financial Accounting
Accounting
ISBN:9781305088436
Author:Carl Warren, Jim Reeve, Jonathan Duchac
Publisher:Cengage Learning