Exam 3: Security Part I: Auditing Operating Systems and Networks
Exam 1: Auditing and Internal Control103 Questions
Exam 2: Auditing IT Governance Controls99 Questions
Exam 3: Security Part I: Auditing Operating Systems and Networks143 Questions
Exam 4: IT Security Part II: Auditing Database Systems101 Questions
Exam 5: Systems Development and Program Change Activities108 Questions
Exam 6: Overview of Transaction Processing and Financial Reporting Systems143 Questions
Exam 7: Computer-Assisted Audit Tools and Techniques83 Questions
Exam 8: Data Structures and CAATTs for Data Extraction89 Questions
Exam 9: Auditing the Revenue Cycle105 Questions
Exam 10: Auditing the Expenditure Cycle144 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection85 Questions
Exam 11: Enterprise Resource Planning Systems92 Questions
Select questions type
When auditors examine and test the call-back feature,they are testing which audit objective?
(Multiple Choice)
4.8/5
(42)
Audit objectives for communications controls include all of the following except
(Multiple Choice)
4.8/5
(41)
In a computerized environment,the audit trail log must be printed onto paper documents.
(True/False)
4.8/5
(37)
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
(Multiple Choice)
4.8/5
(38)
A worm is software program that replicates itself in areas of idle memory until the system fails.
(True/False)
4.9/5
(39)
Which control will not reduce the likelihood of data loss due to a line error?
(Multiple Choice)
4.9/5
(32)
In a telecommunications environment,line errors can be detected by using an echo check.
(True/False)
4.9/5
(29)
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
(True/False)
4.9/5
(43)
The client-server model can only be applied to ring and star topologies.
(True/False)
4.7/5
(40)
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
(True/False)
4.8/5
(30)
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
(True/False)
5.0/5
(41)
The message authentication code is calculated by the sender and the receiver of a data transmission.
(True/False)
4.8/5
(39)
A formal log-on procedure is the operating system's first line of defense.Explain how this works.
(Essay)
4.8/5
(42)
Showing 21 - 40 of 143
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)