Exam 15: Auditing It Controls Part II: Security and Access
Explain the concept of discretionary access privileges.
In centralized systems,a system administrator usually determines who is granted access to specific resources and maintains the access control list.In distributed systems,however,resources may be controlled (owned)by end users.Resource owners in this setting may be granted discretionary access privileges,which allow them to grant access privileges to other users.For example,the controller,who is the owner of the general ledger,may grant read-only privileges to a manager in the budgeting department.The accounts payable manager,however,may be granted both read and write permissions to the ledger.Any attempt by the budgeting manager to add,delete,or change the general ledger will be denied.The use of discretionary access control needs to be closely supervised to prevent security breaches because of its liberal use.
What is a user-defined procedure?
A user-defined procedure allows the user to create a personal security program or routine to provide more positive user identification than a password can.For example,in addition to a password,the security procedure asks a series of personal questions (such as the user's mother's maiden name),which only the legitimate user is likely to know.
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
B
Operating system integrity is not of concern to accountants because only hardware risks are involved.
The message authentication code is calculated by the sender and the receiver of a data transmission.
Contrast the private encryption standard approach with the public key encryption approach to controlling access to telecommunication messages.
In an electronic data interchange environment,the audit trail
The operating system performs all of the following tasks except
Examining programmer authority tables for information about who has access to data definition language commands will provide evidence about who is responsible for creating subschemas.
Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except
All of the following are objectives of operating system control except
Which method will render useless data captured by unauthorized receivers?
In a computerized environment,the audit trail log must be printed onto paper documents.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)