Exam 15: Auditing It Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain the concept of discretionary access privileges.

Free
(Essay)
4.8/5
(39)
Correct Answer:
Verified

In centralized systems,a system administrator usually determines who is granted access to specific resources and maintains the access control list.In distributed systems,however,resources may be controlled (owned)by end users.Resource owners in this setting may be granted discretionary access privileges,which allow them to grant access privileges to other users.For example,the controller,who is the owner of the general ledger,may grant read-only privileges to a manager in the budgeting department.The accounts payable manager,however,may be granted both read and write permissions to the ledger.Any attempt by the budgeting manager to add,delete,or change the general ledger will be denied.The use of discretionary access control needs to be closely supervised to prevent security breaches because of its liberal use.

What is a user-defined procedure?

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

A user-defined procedure allows the user to create a personal security program or routine to provide more positive user identification than a password can.For example,in addition to a password,the security procedure asks a series of personal questions (such as the user's mother's maiden name),which only the legitimate user is likely to know.

All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

B

What can be done to defeat a DDoS attack?

(Essay)
4.8/5
(38)

Audit trails cannot be used to

(Multiple Choice)
4.7/5
(39)

Operating system integrity is not of concern to accountants because only hardware risks are involved.

(True/False)
4.8/5
(35)

Which of the following deal with transaction legitimacy?

(Multiple Choice)
4.9/5
(42)

The message authentication code is calculated by the sender and the receiver of a data transmission.

(True/False)
4.8/5
(40)

Contrast the private encryption standard approach with the public key encryption approach to controlling access to telecommunication messages.

(Essay)
4.8/5
(30)

What are the auditor's concerns in testing EDI controls?

(Essay)
4.8/5
(38)

In an electronic data interchange environment,the audit trail

(Multiple Choice)
4.8/5
(32)

The operating system performs all of the following tasks except

(Multiple Choice)
5.0/5
(35)

Explain how smurf attacks can be controlled.

(Essay)
4.9/5
(39)

Examining programmer authority tables for information about who has access to data definition language commands will provide evidence about who is responsible for creating subschemas.

(True/False)
4.7/5
(41)

Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except

(Multiple Choice)
4.9/5
(41)

Describe one benefit of using a call-back device.

(Essay)
4.9/5
(44)

All of the following are objectives of operating system control except

(Multiple Choice)
4.8/5
(34)

Which method will render useless data captured by unauthorized receivers?

(Multiple Choice)
4.9/5
(33)

What is deep packet inspection?

(Essay)
4.8/5
(33)

In a computerized environment,the audit trail log must be printed onto paper documents.

(True/False)
4.9/5
(33)
Showing 1 - 20 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)