Exam 3: Auditing Operating Systems and Networks
Exam 1: Auditing and Internal Control100 Questions
Exam 2: Auditing IT Governance Controls91 Questions
Exam 3: Auditing Operating Systems and Networks105 Questions
Exam 4: Auditing Database Systems100 Questions
Exam 5: Systems Development and Program Change Activities94 Questions
Exam 6: Transaction Processing and Financial Reporting Systems Overview98 Questions
Exam 7: Computer Assisted Audit Tools and Techniques82 Questions
Exam 8: Data Structures and Caatts for Data Extraction81 Questions
Exam 9: Auditing the Revenue Cycle97 Questions
Exam 10: Auditing the Expenditure Cycle100 Questions
Exam 11: Enterprise Resource Planning Systems90 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection84 Questions
Select questions type
The client-server model can only be applied to ring and star topologies.
(True/False)
4.8/5
(39)
Passwords are secret codes that users enter to gain access to systems. Security can be compromised by all of the following except
(Multiple Choice)
4.9/5
(44)
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
(True/False)
4.7/5
(37)
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
(True/False)
4.9/5
(40)
Computer viruses usually spread throughout the system before being detected.
(True/False)
4.9/5
(43)
When auditors examine and test the call-back feature, they are testing which audit objective?
(Multiple Choice)
4.9/5
(39)
A software program that allows access to a system without going through the normal logon procedures is called a
(Multiple Choice)
4.9/5
(44)
Describe the basic differences between the star, ring, and bus topologies.
(Essay)
4.8/5
(35)
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
(True/False)
4.9/5
(42)
A formal log-on procedure is the operating system's first line of defense. Explain how this works.
(Essay)
4.9/5
(37)
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
(Multiple Choice)
4.9/5
(34)
All of the following will reduce the exposure to computer viruses except
(Multiple Choice)
5.0/5
(35)
Showing 41 - 60 of 105
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)