Exam 12: Monitoring and Auditing AIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Parallel simulation attempts to simulate the firm's key features or processes.

Free
(True/False)
4.8/5
(43)
Correct Answer:
Verified

True

Data governance is the convergence of data quality,data management,data policies,business process management,and risk management surrounding the handling of data in a company.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

True

Which of the following statements is not correct?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

B

The results of a generalized audit software simulation of the aging of accounts receivable revealed substantial differences in the aging contribution,even though grand totals reconciled.Which of the following should the IS auditor do first to resolve the discrepancy?

(Multiple Choice)
4.9/5
(44)

A data warehouse is for daily operations and often includes data for the current fiscal year only.

(True/False)
4.9/5
(34)

Masquerading threat for wireless LANs is:

(Multiple Choice)
4.9/5
(32)

Embedded audit module is a programmed audit module that is added to the system under review.

(True/False)
4.9/5
(43)

Which statements are incorrect about virtual private network (VPN)?

(Multiple Choice)
4.8/5
(44)

What are the benefits of conducting continuous audits (or monitoring)?

(Essay)
4.7/5
(33)

Within a WAN,a router would perform which of the following functions?

(Multiple Choice)
4.9/5
(41)

Which of the following describes a group of computers that connects the internal users of a company distributed over an office building?

(Multiple Choice)
4.8/5
(32)

Which of the following is the primary reason that many auditors hesitate to use embedded audit modules?

(Multiple Choice)
4.9/5
(50)

Data mining is the process of searching for patterns in the data in a data warehouse and to analyze the patterns for decision making.

(True/False)
4.8/5
(35)

Categorize the following scenarios as management,operational,or technical controls for wireless networks' security controls. Categorize the following scenarios as management,operational,or technical controls for wireless networks' security controls.

(Essay)
4.8/5
(38)

Accountants increasingly participate in designing internal controls and improving business and IT processes in a database environment.

(True/False)
4.7/5
(33)

What are the differences between LANs and WANs? Have you ever used any LANs and WANS? 1)LANs covers a small area while WANs covers a significantly larger area. 2)LANs speeds are also significantly faster than WANs. 3)LANs is more secure than WANs. 4)WANs are much more expensive to implement than LANs. The Internet is the most popular WAN.A local area network is often used in a computer lab on campus.(Students' answers may vary.)

(Short Answer)
4.8/5
(37)

What is the man-in-the-middle threat for wireless LANs?

(Multiple Choice)
4.9/5
(28)

The purpose of a company's firewall is to:

(Multiple Choice)
4.8/5
(30)

Virtual private network (VPN)is a private network,provided by a third party,for exchanging information through a high capacity connection.

(True/False)
4.8/5
(38)

Which of the following statements is wrong regarding continuous audit?

(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 48
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)