Exam 15: Auditing It Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing122 Questions
Exam 3: Ethics,fraud,and Internal Control161 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures110 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting,and Management Reporting Systems100 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems95 Questions
Exam 12: Electronic Commerce Systems109 Questions
Exam 13: Managing the Systems Development Life Cycle94 Questions
Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 15: Auditing It Controls Part II: Security and Access95 Questions
Exam 16: Auditing It Controls Part III: Systems Development, program Changes, and Application Auditing66 Questions
Select questions type
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called
(Multiple Choice)
5.0/5
(38)
Audit objectives in the electronic data interchange (EDI)environment include all of the following except
(Multiple Choice)
4.7/5
(38)
Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.
(True/False)
4.8/5
(31)
Computer viruses usually spread throughout the system before being detected.
(True/False)
4.8/5
(39)
List three methods of controlling unauthorized access to telecommunication messages.
(Essay)
4.9/5
(46)
A firewall is a hardware partition designed to protect networks from power surges.
(True/False)
4.8/5
(32)
An integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n)
(Multiple Choice)
4.8/5
(38)
A formal log-on procedure is the operating system's first line of defense.Explain how this works.
(Essay)
4.8/5
(40)
Malicious and destructive programs cause millions of dollars of loss to corporations annually.
(True/False)
4.8/5
(40)
The request-response technique should detect if a data communication transmission has been diverted.
(True/False)
4.9/5
(30)
A software program that allows access to a system without going through the normal log-on procedures is called a
(Multiple Choice)
4.8/5
(35)
Audit objectives for the database management system include all of the following except
(Multiple Choice)
4.8/5
(36)
Which control will not reduce the likelihood of data loss due to a line error?
(Multiple Choice)
4.8/5
(38)
Which of the following is not an access control in a database system?
(Multiple Choice)
4.9/5
(31)
In an electronic data interchange (EDI)environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?
(Multiple Choice)
4.8/5
(41)
Transaction logs are permanent records of transactions created to preserve audit trails in a computerized environment.
(True/False)
4.8/5
(36)
Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.
(Essay)
5.0/5
(38)
Showing 21 - 40 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)