Exam 4: IT Security Part II: Auditing Database Systems
Exam 1: Auditing and Internal Control103 Questions
Exam 2: Auditing IT Governance Controls99 Questions
Exam 3: Security Part I: Auditing Operating Systems and Networks143 Questions
Exam 4: IT Security Part II: Auditing Database Systems101 Questions
Exam 5: Systems Development and Program Change Activities108 Questions
Exam 6: Overview of Transaction Processing and Financial Reporting Systems143 Questions
Exam 7: Computer-Assisted Audit Tools and Techniques83 Questions
Exam 8: Data Structures and CAATTs for Data Extraction89 Questions
Exam 9: Auditing the Revenue Cycle105 Questions
Exam 10: Auditing the Expenditure Cycle144 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection85 Questions
Exam 11: Enterprise Resource Planning Systems92 Questions
Select questions type
An important feature associated with the traditional approach to data management is the ability to produce ad hoc reports.
(True/False)
4.9/5
(40)
The database management system controls access to program files.
(True/False)
4.7/5
(33)
Audit objectives for the database management system include all of the following except
(Multiple Choice)
4.8/5
(29)
Which of the following is not a common form of conceptual database model?
(Multiple Choice)
4.8/5
(36)
The data definition language is used to insert special database commands into application programs.
(True/False)
4.8/5
(30)
What flat-file data management problems are solved as a result of using the database concept?
(Essay)
4.8/5
(35)
A customer name and an unpaid balance is an example of a one-to-many relationship.
(True/False)
4.8/5
(31)
Which of the following may provide many distinct views of the database?
(Multiple Choice)
4.9/5
(39)
The advantages of a partitioned database include all of the following except
(Multiple Choice)
4.7/5
(40)
Use the following words to complete the sentences in questions 1 through 5.
-The conceptual view of the database is often called ____________________.

(Short Answer)
4.9/5
(37)
Subschemas are used to authorize user access privileges to specific data elements.
(True/False)
4.8/5
(30)
What are four ways in which database management systems provide a controlled environment to manage user access and the data resources?
(Essay)
4.8/5
(31)
A deadlock is a phenomenon that prevents the processing of transactions.
(True/False)
4.7/5
(39)
When creating and controlling backups for a sequential batch system,
(Multiple Choice)
4.8/5
(27)
The database approach to data management is sometimes called the flat file approach.
(True/False)
4.9/5
(36)
What is a replicated database and what are the advantages of this approach?
(Essay)
4.9/5
(36)
Showing 21 - 40 of 101
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)