Exam 15: Auditing It Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing122 Questions
Exam 3: Ethics,fraud,and Internal Control161 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures110 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting,and Management Reporting Systems100 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems95 Questions
Exam 12: Electronic Commerce Systems109 Questions
Exam 13: Managing the Systems Development Life Cycle94 Questions
Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 15: Auditing It Controls Part II: Security and Access95 Questions
Exam 16: Auditing It Controls Part III: Systems Development, program Changes, and Application Auditing66 Questions
Select questions type
Which of the following is considered an unintentional threat to the integrity of the operating system?
(Multiple Choice)
4.8/5
(35)
A recovery module suspends all data processing while the system reconciles its journal files against the database.
(True/False)
4.9/5
(38)
Transmitting numerous SYN packets to a targeted receiver,but not responding to an ACK,is
(Multiple Choice)
4.8/5
(43)
A value-added network can detect and reject transactions by unauthorized trading partners.
(True/False)
4.9/5
(34)
Electronic data interchange customers may be given access to the vendor's data files.
(True/False)
4.8/5
(40)
Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.
(Essay)
4.9/5
(39)
All of the following will reduce the exposure to computer viruses except
(Multiple Choice)
4.9/5
(44)
Electronic data interchange translation software interfaces with the sending firm and the value added network.
(True/False)
4.9/5
(39)
What is an operating system? What does it do? What are operating system control objectives?
(Essay)
4.9/5
(43)
All of the following tests of controls will provide evidence that access to the data files is limited except
(Multiple Choice)
4.9/5
(38)
Explain how transactions are audited in an electronic data interchange environment.
(Essay)
4.9/5
(46)
In an electronic data interchange environment,customers routinely access
(Multiple Choice)
4.8/5
(37)
One purpose of a database system is the easy sharing of data.But this ease of sharing can also jeopardize security.Discuss at least three forms of access control designed to reduce this risk.
(Essay)
4.8/5
(37)
Access controls protect databases against destruction,loss or misuse through unauthorized access.
(True/False)
4.9/5
(29)
Showing 61 - 80 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)