Search Header Logo

M03_Risk assessment – IT understanding

Authored by Lily Lin

Other

Professional Development

Used 1+ times

M03_Risk assessment –IT understanding
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

M03Q1. During your audit engagements, what layers of technology do you commonly identify as relevant? Select all that apply.

Application

Database

Operating system

Network

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

M03Q2. Based on the scenario presented, which layers would be considered relevant to risk assessment?

Application, Database and Operating System.

Application and Operating System.

Application and Database

Database and Operating System

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

M03Q3. What areas does the engagement team document in the IT Understanding Screen?

How the entity uses IT as part of financial reporting and related business processes.

The entity’s IT organization.

The entity’s IT policies and procedures.

All of the above.

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

M03Q4. When do we use the SSC instructions and reporting templates in KAEG?

To document your evaluation of a service organization controls (SOC) report.

To communicate the nature, timing and extent of procedures performed by the SSC auditor on behalf of the group engagement team and/or SSC user auditors.

When a SOC report is not provided by the Service Organization.

When the SSC auditor identifies issues that may require an audit response.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

M03Q5. Did you find it easy navigating KAEG?

Yes

No

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

M03Q6. When do we involve a team member with specialization in IT in response to a cybersecurity incident?

When an exception is noted during your testing of database access.

If an interface from an external source does not successfully complete.

When a cybersecurity incident at any layer comes to your attention during the audit.

When an terminated employee retains access privileges to a financially relevant application.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?