Exam 16: IT Controls : Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is an operating system? What does it do? What are operating system control objectives?

Free
(Essay)
5.0/5
(28)
Correct Answer:
Verified

An operating system is a computer's control program.It controls user sharing of applications and resources such as processors,memory,databases,and peripherals such as printers.Common PC operating systems include Windows 2000,Windows NT,and Linux.
An operating system carries out three primary functions: translating high level languages into machine language using modules called compilers and interpreters;allocating computer resources to users,workgroups,and applications;and managing job scheduling and multiprogramming.Operating systems have five basic control objectives:
1.to protect itself from users,
2.to protect users from each other,
3.to protect users from themselves,
4.to protect it from itself,and
5.to protect itself from its environment.

Which of the following is not an access control in a database system?

Free
(Multiple Choice)
4.7/5
(43)
Correct Answer:
Verified

A

A value added network can detect and reject transactions by unauthorized trading partners.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

In an electronic data interchange (EDI)environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?

(Multiple Choice)
4.9/5
(33)

Operating system controls are of interest to system professionals but should not concern accountants and auditors.

(True/False)
4.9/5
(46)

The audit trail for electronic data interchange transactions is stored on magnetic media.

(True/False)
4.8/5
(42)

List three methods of controlling unauthorized access to telecommunication messages.

(Essay)
4.7/5
(40)

In an electronic data interchange environment,customers routinely

(Multiple Choice)
4.8/5
(29)

Viruses rarely attach themselves to executable files.

(True/False)
4.9/5
(31)

All of the following will reduce the exposure to computer viruses except

(Multiple Choice)
4.9/5
(35)

All of the following are objectives of operating system control except

(Multiple Choice)
4.8/5
(48)

Which backup technique is most appropriate for sequential batch systems?

(Multiple Choice)
4.9/5
(33)

What is a user-defined procedure?

(Essay)
4.8/5
(26)

Which method will render useless data captured by unauthorized receivers?

(Multiple Choice)
4.7/5
(36)

Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except

(Multiple Choice)
4.9/5
(41)

Audit objectives in the electronic data interchange (EDI)environment include all of the following except

(Multiple Choice)
4.9/5
(33)

Electronic data interchange customers may be given access to the vendor's data files.

(True/False)
4.8/5
(34)

Operating system integrity is not of concern to accountants because only hardware risks are involved.

(True/False)
4.8/5
(30)

What are biometric devices?

(Essay)
4.8/5
(39)

All of the following tests of controls will provide evidence that access to the data files is limited except

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)