Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective95 Questions
Exam 2: Introduction to Transaction Processing113 Questions
Exam 3: Ethics,fraud,and Internal Control158 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures107 Questions
Exam 6: The Expenditure Cycle Part Ii: Payroll Processing and Fixed Asset Procedures92 Questions
Exam 7: The Conversion Cycle100 Questions
Exam 8: General Ledger,financial Reporting,and Management Reporting Systems93 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle92 Questions
Exam 14: Construct,deliver,and Maintain Systems Projects93 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance128 Questions
Exam 16: IT Controls Part II: Security and Access94 Questions
Exam 17: IT Controls Part III: Systems Development, program Changes, and Application Controls67 Questions
Select questions type
A formal log-on procedure is the operating system's last line of defense against unauthorized access.
(True/False)
4.8/5
(41)
All of the following techniques are used to validate electronic data interchange transactions except
(Multiple Choice)
4.9/5
(37)
The operating system performs all of the following tasks except
(Multiple Choice)
4.8/5
(34)
Which of the following is considered an unintentional threat to the integrity of the operating system?
(Multiple Choice)
4.8/5
(33)
Which control will not reduce the likelihood of data loss due to a line error?
(Multiple Choice)
4.8/5
(45)
Which method will render useless data captured by unauthorized receivers?
(Multiple Choice)
4.7/5
(37)
The audit trail for electronic data interchange transactions is stored on magnetic media.
(True/False)
4.8/5
(33)
When creating and controlling backups for a sequential batch system,
(Multiple Choice)
4.8/5
(48)
In a telecommunications environment,line errors can be detected by using an echo check.
(True/False)
4.7/5
(41)
Contrast the Private Encryption Standard approach with the Public Key Encryption approach to controlling access to telecommunication messages.
(Essay)
4.9/5
(34)
Which of the following is not an access control in a database system?
(Multiple Choice)
4.8/5
(42)
Audit objectives for the database management system include all of the following except
(Multiple Choice)
4.8/5
(38)
In determining whether a system is adequately protected from attacks by computer viruses,all of the following policies are relevant except
(Multiple Choice)
4.8/5
(32)
Access controls protect databases against destruction,loss or misuse through unauthorized access.
(True/False)
4.8/5
(30)
A value added network can detect and reject transactions by unauthorized trading partners.
(True/False)
4.8/5
(32)
Showing 21 - 40 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)