AUDITING & ASSURANCE SERVICES CONNECT AC
10th Edition
ISBN: 9781259292057
Author: MESSIER
Publisher: MCG
expand_more
expand_more
format_list_bulleted
Question
Chapter 21, Problem 21.28MCQ
To determine
Concept Introduction:
SOC 2 Engagement is an auditor’s opinion on how the organization’s safety/controls SOC 2 requirements. It is more common in tech industries. SOC 2 has five trust categories:
1. Security
2. Confidentiality
3. Process Integrity
4. Availability
5. Privacy
To choose:The statement that is true in the case of SOC 2 engagement.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Consider “control environment.” Why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls?
Now consider “segregation of duties.” Determine why it is important in an IT environment. What are some advantages of using IT and audit software when conducting an audit?
What controls should be employed to avoid breaches into an accountijg information system.
You are the administrator of a web server to configure the level of access for users. Then need to be authenticated first before having access to some web pages. What criteria of information security has been addressed in this configuration? Choose one of the below options and justify your answer.
- integrity
- scalability
- availability
- confidentiality
Chapter 21 Solutions
AUDITING & ASSURANCE SERVICES CONNECT AC
Ch. 21 - Prob. 21.1RQCh. 21 - Prob. 21.2RQCh. 21 - Prob. 21.3RQCh. 21 - Prob. 21.4RQCh. 21 - Prob. 21.5RQCh. 21 - Prob. 21.6RQCh. 21 - Prob. 21.7RQCh. 21 - Prob. 21.8RQCh. 21 - Prob. 21.9RQCh. 21 - Prob. 21.10RQ
Ch. 21 - Prob. 21.11RQCh. 21 - Prob. 21.12RQCh. 21 - Prob. 21.13RQCh. 21 - Prob. 21.14RQCh. 21 - Prob. 21.15MCQCh. 21 - Prob. 21.16MCQCh. 21 - Prob. 21.17MCQCh. 21 - Prob. 21.18MCQCh. 21 - Prob. 21.19MCQCh. 21 - Prob. 21.20MCQCh. 21 - Prob. 21.21MCQCh. 21 - Prob. 21.22MCQCh. 21 - Prob. 21.23MCQCh. 21 - Prob. 21.24MCQCh. 21 - Prob. 21.25MCQCh. 21 - Prob. 21.26MCQCh. 21 - Prob. 21.27MCQCh. 21 - Prob. 21.28MCQCh. 21 - Prob. 21.29MCQCh. 21 - Prob. 21.30PCh. 21 - Prob. 21.31PCh. 21 - Prob. 21.32PCh. 21 - Prob. 21.33PCh. 21 - Prob. 21.34PCh. 21 - Prob. 21.35PCh. 21 - Prob. 21.36P
Knowledge Booster
Similar questions
- Which of the following is NOT an SDLC controllable activity? a. External audit participation b. User specification c. Systems authorization d. User test and acceptance procedures e. All are SDLC controlsarrow_forwardOperating system security involves policies, procedures, and controls that determine who can access the operating system. User access privileges are assigned to individuals and to entire workgroups authorized to use the system.The way access privileges are assigned influences system security. Priviliges should be carefully administered and closely monitored for compliance with organizational policy. Choose one of the options below, that is not a test of control of the audit objective relating to access privileges. a. Review employee records to determine whether users have formally acknowledged their responsibility to maintain the confidentiality of company data.b. Review the privileges of a selection of user groups and individuals to determine if their access rights are appropriate for their job descriptions and positions.c. The auditor should verify that individuals are granted access to data and programs based on their need to know.d. Review the account lockout policy and procedures…arrow_forwardWhat are the advantages and disadvantages of documenting internal control by using (1) an internalcontrol questionnaire, (2) a narrative memorandum, and (3) a flowchart?arrow_forward
- Consider the “control environment.” Asses why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls?arrow_forwardChoose the one correct answer. Internal control provides reasonable assurance means that ? internal control has its inherent limitations internal control is integrated in the various transaction cycles internal control involves every people in the organization evaluation of internal control is only a secondary objective of FS auditarrow_forwardThe purpose of ____________ is to help manage and control risk appropriately rather than to eliminate it. Internal control system Internal audit External audit Risk managementarrow_forward
- 1. Data under a traditional ledger system is authenticated by a central authority while data under a blockchain is authenticated through Select one: a. central authority. b. a party outside the blockchain. C. mass collaboration. d. an external audit. 2 Analyzing data with the purpose of determining a casual relationship refers to Select one: a. predictive analytics. b. descriptive analytics. c. diagnostic analytics. d. prescriptive analytics. 3. Which of the following items is not an application of blockchain? Select one: a. joining ERP systems from multinational subsidaries. b. continual updating of real-time data on customer preferences. C. continual updating of financial statements with new transactions. d. joining ERP systems from different companies.arrow_forwardWhich of the following is not a major reason for maintaining an audit trail for a computer system? a. Analytical procedures. b. Query answering. c. Deterrent to fraud. d. Monitoring purposes.arrow_forwardControls over data management systems fall into two categories: access controls and backup controls. In the shared database environment, access control risks include corruption, theft, misuse, and destruction of data. These threats originate from both unauthorized intruders and authorized users who exceed their access privileges. Which of the following options is not part of controls over data management systems? a. Employees that sharing the same computers need restriction for access to specific directories, programs, and data files by using multilevel password control.b. To recover data from disaster, organizations must implement policies and procedures and routinely provide backup copies of critical files.c. Database Administrator works closely with users and systems designers has primary responsibility for user view design and works closely with users and systems designers.d. Access to confidential data must be properly managed. Inference controls prevent users from inferring,…arrow_forward
- Audit concerns and implications on risk assessment are two important factorsthat must be addressed in a computer information system enviroment.Discuss the above statement.arrow_forwardAn internal auditor is examining the effectiveness of procedures management established to protect customer data from cyberattacks and whether those procedures are cost effective. This is an example of an operational audit. Question options: True Falsearrow_forwardManagement and auditors are responsible for maintaining effective internal control system. * True Falsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub