Vous êtes sur la page 1sur 5

Quiz on Information System Audit-I BCA-V

Roll no: Name: Date:-

1. Information system auditing is function to assess whether computer systems safeguards assets, maintain data integrity, and allows an organization to achieve its goal ________________and___________________. 2. _________is a critical resource necessary for an organization's

continuing its operations. 3. Making high-quality decision depends the quality of the ___________and quality of ___________ that exits in computer-based information system. 4. If ____________of an expert system that supports medical diagnosis is incorrect in that case doctors may prescribe wrong medicine to the patient. 5. Some major type of computer abuse are as follows a. Hacking b. _____________ c. illegal physical access d. abuse of privilege 6. A person gains unauthorized access to a computer system to read, modify or delete program or data to disrupt services is called___________. 7. Program s which attach themselves to exe files, system areas on disks of data files that contain macros to cause disruption of computer operation is called____________

Quiz on Information System Audit-I BCA-V


8. Specify the type of computer abuse if a person gains unauthorized physical access to the computer facilities (gaining illegal entry to a computer room or terminal).__________________

9. In addition to data, computer hardware, software. __________ are also critical organizational resources.

10.

Which one is not part of internal control system a. Separation of duties b. Clear delegation of authority and responsibility. c. Competent and Trustworthy personnel. d. Cost of loss of data _____________________

11.

List any two Procedures to obtain an understanding of controls.

1._____________________ 2.____________________ 12. Write name of unit 2 of information system audit.

_______________________________ 13. A ____________is system which prevents, detects, or corrects

unlawful act.

Quiz on Information System Audit-I BCA-V


14. ____________is a set of interrelated components that function to

achieve overall goal 15. When an unauthorized, inaccurate, incomplete, redundant,

inefficient input goes in system is called________________. 16. Purpose of controls is to ___________expected loss from

unlawful acts or events. 17. When auditors failing to detect actual or potential losses or misstatements at the conclusion of audit is

account

called______________. 18. 19. DAR=IR*CR*_______ Name any two systems where inherent risk factor is very high.

1.____________________ 2.____________________ 20. Audit opinion according to professional standards is of four types. a. Disclaimer of opinion b. Adverse Opinion c. Qualified Opinion d. Unqualified opinion

Answer
1. Effectively, efficiently.

Quiz on Information System Audit-I BCA-V


2. Data 3. Data ,decision rules 4. decision rule 5. Viruses 6. Hacker 7. Virus 8. Illegal physical access. 9. Personnel 10. 11. 12. 13. 14. 15. 16. 17. 18. Cost of loss of data Inquiries , observation Conducting Information System Audit Control. System. Unlawful act. Reduce. audit risk DR.

19. Financial System. Strategic system

20.

Qualified Opinion

Quiz on Information System Audit-I BCA-V

Vous aimerez peut-être aussi