Exam 15: Monitoring and Auditing Ais

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Categorize the following scenario below as management,operational,or technical controls for wireless networks' security controls. "Configuring all access points with encryption."

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

B

The purpose of a company's firewall is to:

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

D

Which of the following is not one of the reasons auditors should consider the use of CAATs?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

B

Identify which fundamental control objective belongs with the following statement: "A user's application may consist of several modules stored in separate memory locations,each with its own data.One module must not be allowed to destroy or corrupt another module."

(Multiple Choice)
4.9/5
(37)

CAATs are commonly used in all of the following situations except:

(Multiple Choice)
4.8/5
(41)

Parallel simulation attempts to simulate the firm's key features or processes.

(True/False)
4.9/5
(47)

Which of the following is least likely to be considered a component of a computer network?

(Multiple Choice)
4.9/5
(34)

A data warehouse is for daily operations and often includes data for the current fiscal year only.

(True/False)
4.7/5
(33)

Computer-assisted audit techniques (CAAT)are often used when auditing a company's IT infrastructure.

(True/False)
4.9/5
(30)

Which of the following is not a use of generalized audit software (GAS)?

(Multiple Choice)
4.7/5
(30)

Which of the following is not a benefit of using wireless technology?

(Multiple Choice)
4.9/5
(34)

Identify which fundamental control objective belongs with the following statement: "No module should be allowed to destroy or corrupt another module."

(Multiple Choice)
4.9/5
(36)

The results of a generalized audit software simulation of the aging of accounts receivable revealed substantial differences in the aging contribution,even though grand totals reconciled.Which of the following should the IS auditor do first to resolve the discrepancy?

(Multiple Choice)
4.9/5
(34)

Which statements are incorrect about virtual private network (VPN)?

(Multiple Choice)
4.9/5
(41)

Which of the following is not considered one of the primary CAAT approaches?

(Multiple Choice)
4.9/5
(36)

Which of the following statements about firewalls is wrong?

(Multiple Choice)
4.9/5
(44)

IT governance over operating systems includes establishing proper policies and procedures.These policies and procedures over operating systems should cover all of the following except:

(Multiple Choice)
4.8/5
(33)

Which of the following is not one of the benefits of using a wireless network?

(Multiple Choice)
4.8/5
(41)

What are the differences between LANs and WANs? Have you ever used any LANs and WANS?

(Essay)
4.8/5
(25)

Which of the following is a key reason an operating system is the most important system software?

(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)