Exam 15: Auditing It Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The database management system controls access to program files.

(True/False)
4.9/5
(25)

A software program that replicates itself in areas of idle memory until the system fails is called a

(Multiple Choice)
4.8/5
(32)

What are some typical problems with passwords?

(Essay)
4.9/5
(38)

Operating system controls are of interest to system professionals but should not concern accountants and auditors.

(True/False)
4.9/5
(35)

Briefly define an operating system.

(Essay)
4.9/5
(29)

Firewalls are

(Multiple Choice)
4.8/5
(40)

Audit objectives for communications controls include all of the following except

(Multiple Choice)
4.8/5
(42)

What is event monitoring?

(Essay)
4.8/5
(31)

The database attributes that individual users have permission to access are defined in the

(Multiple Choice)
4.8/5
(37)

Network communication poses some special types of risk for a business.What are the two broad areas of concern? Explain.

(Essay)
4.8/5
(38)

The most frequent victims of program viruses are microcomputers.

(True/False)
4.8/5
(40)

Which method is most likely to detect unauthorized access to the system?

(Multiple Choice)
4.9/5
(43)

Public key encryption

(Multiple Choice)
5.0/5
(51)

Firewalls are special materials used to insulate computer facilities.

(True/False)
4.8/5
(38)

When auditors examine and test the call-back feature,they are testing which audit objective?

(Multiple Choice)
4.8/5
(35)
Showing 81 - 95 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)