Exam 15: Auditing It Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing122 Questions
Exam 3: Ethics,fraud,and Internal Control161 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures110 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting,and Management Reporting Systems100 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems95 Questions
Exam 12: Electronic Commerce Systems109 Questions
Exam 13: Managing the Systems Development Life Cycle94 Questions
Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 15: Auditing It Controls Part II: Security and Access95 Questions
Exam 16: Auditing It Controls Part III: Systems Development, program Changes, and Application Auditing66 Questions
Select questions type
In a telecommunications environment,line errors can be detected by using an echo check.
(True/False)
4.8/5
(36)
A formal log-on procedure is the operating system's last line of defense against unauthorized access.
(True/False)
4.7/5
(34)
All of the following are designed to control exposures from subversive threats except
(Multiple Choice)
4.9/5
(37)
A worm is software program that replicates itself in areas of idle memory until the system fails.
(True/False)
4.8/5
(40)
Describe three ways in which IPS can be used to protect against DDoS attacks?
(Essay)
4.8/5
(36)
Subschemas are used to authorize user access privileges to specific data elements.
(True/False)
4.9/5
(38)
Disguising message packets to look as if they came from another user in order to gain access to the host's network is called spooling.
(True/False)
4.8/5
(29)
In determining whether a system is adequately protected from attacks by computer viruses,all of the following policies are relevant except
(Multiple Choice)
4.8/5
(34)
Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is
(Multiple Choice)
4.9/5
(36)
In an electronic data interchange environment,customers routinely
(Multiple Choice)
4.9/5
(39)
All of the following techniques are used to validate electronic data interchange transactions except
(Multiple Choice)
5.0/5
(43)
Which of the following is not a basic database backup and recovery feature?
(Multiple Choice)
4.8/5
(43)
Showing 41 - 60 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)