Exam 16: IT Controls : Security and Access
Exam 1: The Information System: An Accountant’s Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control119 Questions
Exam 4: The Revenue Cycle105 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures102 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures87 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: General Ledger, Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The REA Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems97 Questions
Exam 12: Electronic Commerce Systems102 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects93 Questions
Exam 15: IT Controls : Sarbanes-Oxley and IT Governance130 Questions
Exam 16: IT Controls : Security and Access96 Questions
Exam 17: IT Controls : Systems Development Program Changes and Application Controls96 Questions
Select questions type
A firewall is a hardware partition designed to protect networks from power surges.
(True/False)
4.8/5
(37)
Electronic data interchange translation software interfaces with the sending firm and the value added network.
(True/False)
4.9/5
(32)
All of the following techniques are used to validate electronic data interchange transactions except
(Multiple Choice)
4.9/5
(42)
In a computerized environment,the audit trail log must be printed onto paper documents.
(True/False)
4.7/5
(31)
The message authentication code is calculated by the sender and the receiver of a data transmission.
(True/False)
4.8/5
(43)
A formal log-on procedure is the operating system's last line of defense against unauthorized access.
(True/False)
4.9/5
(40)
Audit objectives for the database management system include all of the following except
(Multiple Choice)
4.8/5
(38)
All of the following are designed to control exposures from subversive threats except
(Multiple Choice)
4.8/5
(33)
In a telecommunications environment,line errors can be detected by using an echo check.
(True/False)
4.8/5
(40)
Subschemas are used to authorize user access privileges to specific data elements.
(True/False)
4.8/5
(40)
The most frequent victims of program viruses are microcomputers.
(True/False)
4.9/5
(33)
Contrast the Private Encryption Standard approach with the Public Key Encryption approach to controlling access to telecommunication messages.
(Essay)
4.9/5
(31)
A worm is software program that replicates itself in areas of idle memory until the system fails.
(True/False)
4.8/5
(44)
The request-response technique should detect if a data communication transmission has been diverted.
(True/False)
4.8/5
(34)
The database attributes that individual users have permission to access are defined in
(Multiple Choice)
4.7/5
(40)
Showing 41 - 60 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)