Exam 16: IT Controls : Security and Access
Exam 1: The Information System: An Accountant’s Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control119 Questions
Exam 4: The Revenue Cycle105 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures102 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures87 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: General Ledger, Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The REA Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems97 Questions
Exam 12: Electronic Commerce Systems102 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects93 Questions
Exam 15: IT Controls : Sarbanes-Oxley and IT Governance130 Questions
Exam 16: IT Controls : Security and Access96 Questions
Exam 17: IT Controls : Systems Development Program Changes and Application Controls96 Questions
Select questions type
The operating system performs all of the following tasks except
(Multiple Choice)
4.8/5
(34)
An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)
(Multiple Choice)
4.9/5
(39)
A software program that allows access to a system without going through the normal logon procedures is called a
(Multiple Choice)
5.0/5
(38)
Access controls protect databases against destruction,loss or misuse through unauthorized access.
(True/False)
4.9/5
(35)
The database management system controls access to program files.
(True/False)
4.8/5
(31)
Which of the following is considered an unintentional threat to the integrity of the operating system?
(Multiple Choice)
4.7/5
(25)
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
(Multiple Choice)
4.9/5
(27)
One purpose of a database system is the easy sharing of data.But this ease of sharing can also jeopardize security.Discuss at least three forms of access control designed to reduce this risk.
(Essay)
4.8/5
(29)
Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is
(Multiple Choice)
4.9/5
(37)
When creating and controlling backups for a sequential batch system,
(Multiple Choice)
4.8/5
(35)
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.
(True/False)
4.9/5
(31)
When auditors examine and test the call-back feature,they are testing which audit objective?
(Multiple Choice)
4.9/5
(47)
Showing 61 - 80 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)