Exam 16: IT Controls : Security and Access
Exam 1: The Information System: An Accountant’s Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control119 Questions
Exam 4: The Revenue Cycle105 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures102 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures87 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: General Ledger, Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The REA Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems97 Questions
Exam 12: Electronic Commerce Systems102 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects93 Questions
Exam 15: IT Controls : Sarbanes-Oxley and IT Governance130 Questions
Exam 16: IT Controls : Security and Access96 Questions
Exam 17: IT Controls : Systems Development Program Changes and Application Controls96 Questions
Select questions type
A recovery module suspends all data processing while the system reconciles its journal files against the database.
(True/False)
4.8/5
(34)
In determining whether a system is adequately protected from attacks by computer viruses,all of the following policies are relevant except
(Multiple Choice)
4.8/5
(42)
In an electronic data interchange environment,customers routinely access
(Multiple Choice)
4.9/5
(47)
Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.
(Essay)
4.9/5
(33)
Disguising message packets to look as if they came from another user and to gain access to the host's network is called spooling.
(True/False)
4.8/5
(40)
Audit objectives for communications controls include all of the following except
(Multiple Choice)
4.7/5
(40)
Transmitting numerous SYN packets to a targeted receiver,but NOT responding to an ACK,is
(Multiple Choice)
4.9/5
(39)
Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.
(Essay)
4.9/5
(46)
Which of the following is not a basic database backup and recovery feature?
(Multiple Choice)
4.9/5
(34)
Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.
(True/False)
4.8/5
(31)
In an electronic data interchange environment,the audit trail
(Multiple Choice)
4.9/5
(33)
A formal log-on procedure is the operating system's first line of defense.Explain how this works.
(Essay)
4.9/5
(33)
Showing 81 - 96 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)