Access control software on an organization's mainframe computer records detailed information concerning both successful and unsuccessful log-on attempts to applications. Which of the following audit tools would be best suited to review the access information that has been recorded?
An audit department has received anonymous information that an employee has allegedly been able to steal and cash checks sent to the organization by customers. What is the most efficient way for an auditor to determine how this type of fraud could occur and who might be the perpetrator?
If an auditor expects to find numerous discrepancies between recorded values and audited values of sample selections, which sampling technique would be most appropriate?
During an audit of a retail organization, an internal auditor found a scheme in which the warehouse director and the purchasing agent diverted approximately $500,000 of goods to their own warehouse, then sold the goods to third parties. The fraud was not found earlier since the warehouse director updated the perpetual inventory records and then forwarded receiving reports to the accounts payable department for processing.
Which of the following procedures would have most likely led to the discovery of the missing materials and the fraud?