Exam 15: Monitoring and Auditing Ais

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List common security threats for wireless LANs.Find a specific case in which the security of wireless LANs was threatened.Given the case you find,comment on how to prevent or mitigate the threats?

(Essay)
4.9/5
(39)

Identify which fundamental control objective belongs with the following statement: "One user must not be able to access,destroy,or corrupt the data or programs of another user."

(Multiple Choice)
4.8/5
(42)

Most threats involving a wireless local area network (LAN)involve which of the following?

(Multiple Choice)
4.7/5
(39)

Identify which fundamental control objective belongs with the following statement: "In the event of a power failure or other disaster,the operating system should be able to achieve a controlled termination of activities from which it can later recover."

(Multiple Choice)
4.9/5
(42)

Which of the statements regarding a data warehouse is incorrect?

(Multiple Choice)
4.8/5
(42)

What is the test data technique?

(Multiple Choice)
4.8/5
(33)

Data governance is the convergence of data quality,data management,data policies,business process management,and risk management surrounding the handling of data in a company.

(True/False)
5.0/5
(36)

An auditor reviewing the risks associated with a firm's Wide area network (WAN)should pay particular attention to which of the following?

(Multiple Choice)
4.8/5
(51)

Categorize the following scenario below as management,operational,or technical controls for wireless networks' security controls. "Providing regular updates in organizational policies and procedures to employees."

(Multiple Choice)
4.7/5
(31)

An auditor should be most concerned about which of the following when reviewing the risks of a company's wireless network:

(Multiple Choice)
4.9/5
(33)

Categorize the following scenario below as management,operational,or technical controls for wireless networks' security control. "Deciding how transmissions over wireless networks should be protected."

(Multiple Choice)
4.7/5
(42)

Which of the following strategies will a CPA most likely consider in auditing an entity that processes most of its financial data only in electronic form,such as a paperless system?

(Multiple Choice)
4.9/5
(48)

Which of the following statements regarding the black-box approach for systems auditing is correct?

(Multiple Choice)
4.8/5
(45)

Which of the following best describes continuous auditing?

(Multiple Choice)
4.9/5
(34)

The Generally Accepted Auditing Standards (GAAS)issued by PCAOB provide guidelines for conducting an IS/IT audit.

(True/False)
4.9/5
(38)

The data in a data warehouse are updated when transactions are processed.

(True/False)
4.9/5
(36)

Which of the following would not assist in continuous auditing?

(Multiple Choice)
4.9/5
(36)

Which of the following uses best describes the use of a VPN?

(Multiple Choice)
4.8/5
(40)

Parallel simulation uses an independent program to simulate a part of an existing application program,and is designed to test the validity and to verify the accuracy of an existing application program.

(True/False)
4.7/5
(39)

If an auditor wanted to test the accuracy of a computer generated report they might use which of the the following approaches?

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)