Exam 3: Auditing Operating Systems and Networks
Exam 1: Auditing and Internal Control100 Questions
Exam 2: Auditing IT Governance Controls91 Questions
Exam 3: Auditing Operating Systems and Networks105 Questions
Exam 4: Auditing Database Systems100 Questions
Exam 5: Systems Development and Program Change Activities94 Questions
Exam 6: Transaction Processing and Financial Reporting Systems Overview98 Questions
Exam 7: Computer Assisted Audit Tools and Techniques82 Questions
Exam 8: Data Structures and Caatts for Data Extraction81 Questions
Exam 9: Auditing the Revenue Cycle97 Questions
Exam 10: Auditing the Expenditure Cycle100 Questions
Exam 11: Enterprise Resource Planning Systems90 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection84 Questions
Select questions type
List three methods of controlling unauthorized access to telecommunication messages.
(Essay)
4.7/5
(38)
Electronic data interchange translation software interfaces with the sending firm and the value added network.
(True/False)
4.8/5
(41)
Electronic data interchange customers may be given access to the vendor's data files.
(True/False)
4.8/5
(31)
Which method is most likely to detect unauthorized access to the system?
(Multiple Choice)
4.7/5
(40)
To preserve audit trails in a computerized environment, transaction logs are permanent records of transactions.
(True/False)
4.8/5
(34)
Which control will not reduce the likelihood of data loss due to a line error?
(Multiple Choice)
4.9/5
(38)
A value added network can detect and reject transactions by unauthorized trading partners.
(True/False)
4.7/5
(39)
Audit objectives for communications controls include all of the following except
(Multiple Choice)
4.8/5
(50)
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
(True/False)
4.7/5
(31)
In a computerized environment, the audit trail log must be printed onto paper documents.
(True/False)
5.0/5
(41)
Network protocols fulfill all of the following objectives except
(Multiple Choice)
4.8/5
(34)
The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to an intruder. To overcome this problem, private key encryption was devised.
(True/False)
5.0/5
(32)
Showing 81 - 100 of 105
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)