Internal Auditing and Systems Controls Paper 14

1

The normal sequence of documents and operations on a well-prepared systems flowchart is






2

The diamond-shaped symbol is commonly used in flowcharting to show or represent a






3

A company’s management is concerned about computer data eavesdropping and wants to maintain the confidentiality of its information as it is transmitted. The company should utilize






4

An advantage of using systems flowcharts to document information about internal control instead of using internal control questionnaires is that systems flowcharts






5

When documenting the understanding of a client’s internal control, the independent auditor sometimes uses a systems flowchart, which can best be described as a






6

Which one of the following would most compromise the use of the grandfather-father-son principle of file retention as protection against loss or damage of master files?






7

Of the techniques available to an auditor, which is the most valuable in providing a summary outline and overall description of the process of transactions in an information system?






8

Confidential data can be securely transmitted over the Internet by using






9

All of the following are examples of encryption techniques used for computer security except






10

When attempting to restore computing facilities at an alternate site following a disaster, which one of the following should be restored first?






Result

Total Questions:
Correct Answers:
Wrong Answers:
Percentage: