Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective95 Questions
Exam 2: Introduction to Transaction Processing113 Questions
Exam 3: Ethics,fraud,and Internal Control158 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures107 Questions
Exam 6: The Expenditure Cycle Part Ii: Payroll Processing and Fixed Asset Procedures92 Questions
Exam 7: The Conversion Cycle100 Questions
Exam 8: General Ledger,financial Reporting,and Management Reporting Systems93 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle92 Questions
Exam 14: Construct,deliver,and Maintain Systems Projects93 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance128 Questions
Exam 16: IT Controls Part II: Security and Access94 Questions
Exam 17: IT Controls Part III: Systems Development, program Changes, and Application Controls67 Questions
Select questions type
A firewall is a hardware partition designed to protect networks from power surges.
Free
(True/False)
4.9/5
(31)
Correct Answer:
False
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
A
What is EDI? How does its use affect the audit trail?
Free
(Essay)
4.8/5
(38)
Correct Answer:
Electronic data interchange is an arrangement which links the computer systems of two trading partners to expedite sales/purchases.The buying company's purchasing system creates and transmits a purchase order electronically in an agreed format,either directly or through a value-added network.The selling company receives the information,and it is converted electronically into a sales order. The absence of paper documents in an EDI transaction disrupts the traditional audit trail.This can be compensated for through the use of transaction logs which can be reconciled.
List three methods of controlling unauthorized access to telecommunication messages.
(Essay)
4.9/5
(47)
Describe three ways in which IPS can be used to protect against DDoS Attacks?
(Essay)
5.0/5
(47)
Subschemas are used to authorize user access privileges to specific data elements.
(True/False)
4.7/5
(35)
All of the following are objectives of operating system control except
(Multiple Choice)
4.9/5
(38)
All of the following will reduce the exposure to computer viruses except
(Multiple Choice)
4.8/5
(36)
Electronic data interchange customers may be given access to the vendor's data files.
(True/False)
4.8/5
(32)
Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.
(True/False)
4.8/5
(36)
A software program that allows access to a system without going through the normal logon procedures is called a
(Multiple Choice)
5.0/5
(28)
Which method is most likely to detect unauthorized access to the system?
(Multiple Choice)
4.9/5
(29)
Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.
(Essay)
4.8/5
(42)
Showing 1 - 20 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)