Exam 15: Monitoring and Auditing Ais
Exam 1: Accounting Information Systems and Firm Value60 Questions
Exam 2: Accountants As Business Analysts53 Questions
Exam 3: Data Modeling53 Questions
Exam 4: Relational Databases and Enterprise Systems54 Questions
Exam 5: Sales and Collections Business Process35 Questions
Exam 6: Purchases and Payments Business Process36 Questions
Exam 7: Conversion Business Process38 Questions
Exam 9: Reporting Processes and Extensible Business Reporting Language Xbrl62 Questions
Exam 10: Data Analytics in Accounting: Concepts and the Amps Model38 Questions
Exam 11: Data Analytics in Accounting: Tools and Practice38 Questions
Exam 12: Emerging Technologies: Blockchain and Ai Automation39 Questions
Exam 13: Accounting Information Systems and Internal Controls60 Questions
Exam 14: Information Security and Computer Fraud58 Questions
Exam 15: Monitoring and Auditing Ais69 Questions
Exam 16: The Balanced Scorecard, Business Model Canvas, and Business Value of Information Technology46 Questions
Exam 17: Evaluating Ais Investments43 Questions
Select questions type
Categorize the following scenario below as management,operational,or technical controls for wireless networks' security controls. "Configuring all access points with encryption."
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
B
The purpose of a company's firewall is to:
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
D
Which of the following is not one of the reasons auditors should consider the use of CAATs?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
B
Identify which fundamental control objective belongs with the following statement: "A user's application may consist of several modules stored in separate memory locations,each with its own data.One module must not be allowed to destroy or corrupt another module."
(Multiple Choice)
4.9/5
(37)
CAATs are commonly used in all of the following situations except:
(Multiple Choice)
4.8/5
(41)
Parallel simulation attempts to simulate the firm's key features or processes.
(True/False)
4.9/5
(47)
Which of the following is least likely to be considered a component of a computer network?
(Multiple Choice)
4.9/5
(34)
A data warehouse is for daily operations and often includes data for the current fiscal year only.
(True/False)
4.7/5
(33)
Computer-assisted audit techniques (CAAT)are often used when auditing a company's IT infrastructure.
(True/False)
4.9/5
(30)
Which of the following is not a use of generalized audit software (GAS)?
(Multiple Choice)
4.7/5
(30)
Which of the following is not a benefit of using wireless technology?
(Multiple Choice)
4.9/5
(34)
Identify which fundamental control objective belongs with the following statement: "No module should be allowed to destroy or corrupt another module."
(Multiple Choice)
4.9/5
(36)
The results of a generalized audit software simulation of the aging of accounts receivable revealed substantial differences in the aging contribution,even though grand totals reconciled.Which of the following should the IS auditor do first to resolve the discrepancy?
(Multiple Choice)
4.9/5
(34)
Which statements are incorrect about virtual private network (VPN)?
(Multiple Choice)
4.9/5
(41)
Which of the following is not considered one of the primary CAAT approaches?
(Multiple Choice)
4.9/5
(36)
Which of the following statements about firewalls is wrong?
(Multiple Choice)
4.9/5
(44)
IT governance over operating systems includes establishing proper policies and procedures.These policies and procedures over operating systems should cover all of the following except:
(Multiple Choice)
4.8/5
(33)
Which of the following is not one of the benefits of using a wireless network?
(Multiple Choice)
4.8/5
(41)
What are the differences between LANs and WANs? Have you ever used any LANs and WANS?
(Essay)
4.8/5
(25)
Which of the following is a key reason an operating system is the most important system software?
(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)