Exam 3: Security Part I: Auditing Operating Systems and Networks
Exam 1: Auditing and Internal Control103 Questions
Exam 2: Auditing IT Governance Controls99 Questions
Exam 3: Security Part I: Auditing Operating Systems and Networks143 Questions
Exam 4: IT Security Part II: Auditing Database Systems101 Questions
Exam 5: Systems Development and Program Change Activities108 Questions
Exam 6: Overview of Transaction Processing and Financial Reporting Systems143 Questions
Exam 7: Computer-Assisted Audit Tools and Techniques83 Questions
Exam 8: Data Structures and CAATTs for Data Extraction89 Questions
Exam 9: Auditing the Revenue Cycle105 Questions
Exam 10: Auditing the Expenditure Cycle144 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection85 Questions
Exam 11: Enterprise Resource Planning Systems92 Questions
Select questions type
Electronic data interchange translation software interfaces with the sending firm and the value added network.
Free
(True/False)
4.9/5
(39)
Correct Answer:
False
What is a seal of assurance?
Free
(Essay)
4.8/5
(37)
Correct Answer:
In response to consumer demand for evidence that a web-based business is trustworthy,a number of trusted third-party organizations are offering seals of assurance that businesses can display on their website home pages.To legitimately bear the seal,the company must show that it complies with certain business practices,capabilities,and controls.Examples of seal are: Better Business Bureau (BBB),TRUSTe,Veri-Sign,Inc.,International Computer Security Association (ICSA),AICPA/CICA WebTrust,and AICPA/CICA SysTrust.
A bus topology is less costly to install than a ring topology.
Free
(True/False)
4.9/5
(47)
Correct Answer:
True
Operating system controls are of interest to system professionals but should not concern accountants and auditors.
(True/False)
4.8/5
(36)
Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.
(Essay)
4.9/5
(37)
Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.
(True/False)
4.9/5
(36)
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
(True/False)
4.9/5
(40)
Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.
(Essay)
4.9/5
(30)
Describe three ways in which IPS can be used to protect against DDoS Attacks?
(Essay)
4.9/5
(32)
List three methods of controlling unauthorized access to telecommunication messages.
(Essay)
4.9/5
(41)
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?
(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 143
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)