Exam 16: IT Controls : Security and Access
Exam 1: The Information System: An Accountant’s Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control119 Questions
Exam 4: The Revenue Cycle105 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures102 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures87 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: General Ledger, Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The REA Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems97 Questions
Exam 12: Electronic Commerce Systems102 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects93 Questions
Exam 15: IT Controls : Sarbanes-Oxley and IT Governance130 Questions
Exam 16: IT Controls : Security and Access96 Questions
Exam 17: IT Controls : Systems Development Program Changes and Application Controls96 Questions
Select questions type
Firewalls are special materials used to insulate computer facilities
(True/False)
4.9/5
(39)
Computer viruses usually spread throughout the system before being detected.
(True/False)
4.8/5
(40)
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called
(Multiple Choice)
4.8/5
(43)
To preserve audit trails in a computerized environment,transaction logs are permanent records of transactions.
(True/False)
4.8/5
(36)
Which method is most likely to detect unauthorized access to the system?
(Multiple Choice)
5.0/5
(32)
Network communication poses some special types of risk for a business.What are the two broad areas of concern? Explain.
(Essay)
4.8/5
(46)
Describe three ways in which IPS can be used to protect against DDoS Attacks?
(Essay)
4.9/5
(29)
Explain how transactions are audited in an electronic data interchange environment.
(Essay)
4.9/5
(36)
Which control will not reduce the likelihood of data loss due to a line error?
(Multiple Choice)
5.0/5
(34)
A software program that replicates itself in areas of idle memory until the system fails is called a
(Multiple Choice)
4.8/5
(40)
Showing 21 - 40 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)