Exam 3: Security Part I: Auditing Operating Systems and Networks
Exam 1: Auditing and Internal Control103 Questions
Exam 2: Auditing IT Governance Controls99 Questions
Exam 3: Security Part I: Auditing Operating Systems and Networks143 Questions
Exam 4: IT Security Part II: Auditing Database Systems101 Questions
Exam 5: Systems Development and Program Change Activities108 Questions
Exam 6: Overview of Transaction Processing and Financial Reporting Systems143 Questions
Exam 7: Computer-Assisted Audit Tools and Techniques83 Questions
Exam 8: Data Structures and CAATTs for Data Extraction89 Questions
Exam 9: Auditing the Revenue Cycle105 Questions
Exam 10: Auditing the Expenditure Cycle144 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection85 Questions
Exam 11: Enterprise Resource Planning Systems92 Questions
Select questions type
The operating system performs all of the following tasks except
(Multiple Choice)
4.8/5
(37)
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.
(True/False)
4.8/5
(40)
In a hierarchical topology,network nodes communicate with each other via a central host computer.
(True/False)
4.9/5
(34)
A software program that replicates itself in areas of idle memory until the system fails is called a
(Multiple Choice)
5.0/5
(44)
A formal log-on procedure is the operating system's last line of defense against unauthorized access.
(True/False)
4.9/5
(39)
What security questions must be considered with regard to Internet commerce?
(Essay)
4.8/5
(47)
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
(True/False)
5.0/5
(40)
Operating system integrity is not of concern to accountants because only hardware risks are involved.
(True/False)
4.7/5
(41)
Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is
(Multiple Choice)
4.9/5
(38)
Describe the basic differences between the star,ring,and bus topologies.
(Essay)
4.9/5
(32)
An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)
(Multiple Choice)
4.9/5
(41)
A value added network can detect and reject transactions by unauthorized trading partners.
(True/False)
4.8/5
(34)
Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except
(Multiple Choice)
4.9/5
(39)
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
(True/False)
4.8/5
(32)
All of the following are objectives of operating system control except
(Multiple Choice)
4.9/5
(37)
Showing 81 - 100 of 143
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)