Exam 15: Monitoring and Auditing Ais

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Firewalls are security systems comprised of hardware and software that is built using routers,servers,and a variety of software.

(True/False)
4.9/5
(35)

Categorize the following scenario below as management,operational,or technical controls for wireless networks' security controls. "Conducting risk assessment on a regular basis."

(Multiple Choice)
4.9/5
(35)

An Integrated test facility (ITF)is an automated technique that enables test data to be continually evaluated during the normal operation of a system.

(True/False)
4.7/5
(40)

ACL and IDEA are two prominent examples of which of the following?

(Multiple Choice)
4.7/5
(37)

Which of the following is not a use of CAATs in auditing?

(Multiple Choice)
4.8/5
(41)

Accounting professionals should understand database systems for all of the following reasons except:

(Multiple Choice)
4.9/5
(28)

Which of the following tool advancements has made continuous auditing more feasable?

(Multiple Choice)
4.9/5
(40)

Which of the following statements regarding the purposes of an operating system is correct?

(Multiple Choice)
4.8/5
(32)

Which of the following statements about switches is correct?

(Multiple Choice)
5.0/5
(33)

The masquerading threat for wireless LANs is:

(Multiple Choice)
4.8/5
(40)

Identify which fundamental control objective belongs with the following statement: "User applications must not be able to gain control of or damage the operating system."

(Multiple Choice)
4.8/5
(30)

Which of the following is not a management control for wireless networks?

(Multiple Choice)
4.9/5
(38)

Accountants increasingly participate in designing internal controls and improving business and IT processes in a database environment.

(True/False)
4.7/5
(43)

Which of the following is an example of using the test data technique?

(Multiple Choice)
4.8/5
(37)

Which of the following is not an approach used for online analytical processing (OLAP)?

(Multiple Choice)
4.8/5
(34)

LAN is the abbreviation for:

(Multiple Choice)
4.8/5
(38)

Discuss five significant barriers that are often encountered in implementing continuous auditing?

(Essay)
4.9/5
(41)

One control objective for an operating system is that it must be protected from itself.Which of the following statements best explains this concept?

(Multiple Choice)
4.9/5
(33)

A wireless network is comprised of access points and stations.Access points logically connect stations to a firm's network.

(True/False)
4.7/5
(27)

Within a WAN,a router would perform which of the following functions?

(Multiple Choice)
5.0/5
(37)
Showing 41 - 60 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)