Exam 16: IT Controls : Security and Access
What is an operating system? What does it do? What are operating system control objectives?
An operating system is a computer's control program.It controls user sharing of applications and resources such as processors,memory,databases,and peripherals such as printers.Common PC operating systems include Windows 2000,Windows NT,and Linux.
An operating system carries out three primary functions: translating high level languages into machine language using modules called compilers and interpreters;allocating computer resources to users,workgroups,and applications;and managing job scheduling and multiprogramming.Operating systems have five basic control objectives:
1.to protect itself from users,
2.to protect users from each other,
3.to protect users from themselves,
4.to protect it from itself,and
5.to protect itself from its environment.
Which of the following is not an access control in a database system?
A
A value added network can detect and reject transactions by unauthorized trading partners.
True
In an electronic data interchange (EDI)environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?
Operating system controls are of interest to system professionals but should not concern accountants and auditors.
The audit trail for electronic data interchange transactions is stored on magnetic media.
List three methods of controlling unauthorized access to telecommunication messages.
In an electronic data interchange environment,customers routinely
All of the following will reduce the exposure to computer viruses except
All of the following are objectives of operating system control except
Which backup technique is most appropriate for sequential batch systems?
Which method will render useless data captured by unauthorized receivers?
Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except
Audit objectives in the electronic data interchange (EDI)environment include all of the following except
Electronic data interchange customers may be given access to the vendor's data files.
Operating system integrity is not of concern to accountants because only hardware risks are involved.
All of the following tests of controls will provide evidence that access to the data files is limited except
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)