Exam 15: Auditing It Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing122 Questions
Exam 3: Ethics,fraud,and Internal Control161 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures110 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting,and Management Reporting Systems100 Questions
Exam 9: Database Management Systems106 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems95 Questions
Exam 12: Electronic Commerce Systems109 Questions
Exam 13: Managing the Systems Development Life Cycle94 Questions
Exam 14: Auditing It Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 15: Auditing It Controls Part II: Security and Access95 Questions
Exam 16: Auditing It Controls Part III: Systems Development, program Changes, and Application Auditing66 Questions
Select questions type
The database management system controls access to program files.
(True/False)
4.9/5
(25)
A software program that replicates itself in areas of idle memory until the system fails is called a
(Multiple Choice)
4.8/5
(32)
Operating system controls are of interest to system professionals but should not concern accountants and auditors.
(True/False)
4.9/5
(35)
Audit objectives for communications controls include all of the following except
(Multiple Choice)
4.8/5
(42)
The database attributes that individual users have permission to access are defined in the
(Multiple Choice)
4.8/5
(37)
Network communication poses some special types of risk for a business.What are the two broad areas of concern? Explain.
(Essay)
4.8/5
(38)
The most frequent victims of program viruses are microcomputers.
(True/False)
4.8/5
(40)
Which method is most likely to detect unauthorized access to the system?
(Multiple Choice)
4.9/5
(43)
Firewalls are special materials used to insulate computer facilities.
(True/False)
4.8/5
(38)
When auditors examine and test the call-back feature,they are testing which audit objective?
(Multiple Choice)
4.8/5
(35)
Showing 81 - 95 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)