Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective95 Questions
Exam 2: Introduction to Transaction Processing113 Questions
Exam 3: Ethics,fraud,and Internal Control158 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures107 Questions
Exam 6: The Expenditure Cycle Part Ii: Payroll Processing and Fixed Asset Procedures92 Questions
Exam 7: The Conversion Cycle100 Questions
Exam 8: General Ledger,financial Reporting,and Management Reporting Systems93 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle92 Questions
Exam 14: Construct,deliver,and Maintain Systems Projects93 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance128 Questions
Exam 16: IT Controls Part II: Security and Access94 Questions
Exam 17: IT Controls Part III: Systems Development, program Changes, and Application Controls67 Questions
Select questions type
Which of the following is not a basic database backup and recovery feature?
(Multiple Choice)
4.7/5
(39)
Network communication poses some special types of risk for a business.What are the two broad areas of concern? Explain.
(Essay)
4.8/5
(45)
Explain how transactions are audited in an electronic data interchange environment.
(Essay)
4.8/5
(34)
A recovery module suspends all data processing while the system reconciles its journal files against the database.
(True/False)
4.8/5
(43)
In an electronic data interchange (EDI)environment,when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table,the auditor is testing which audit objective?
(Multiple Choice)
4.8/5
(37)
In an electronic data interchange environment,customers routinely
(Multiple Choice)
4.9/5
(47)
The message authentication code is calculated by the sender and the receiver of a data transmission.
(True/False)
4.9/5
(34)
The database management system controls access to program files.
(True/False)
4.9/5
(40)
The database attributes that individual users have permission to access are defined in
(Multiple Choice)
4.8/5
(45)
Operating system controls are of interest to system professionals but should not concern accountants and auditors.
(True/False)
4.9/5
(39)
Many techniques exist to reduce the likelihood and effects of data communication hardware failure.One of these is
(Multiple Choice)
4.9/5
(44)
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
(Multiple Choice)
4.9/5
(38)
When auditors examine and test the call-back feature,they are testing which audit objective?
(Multiple Choice)
4.8/5
(38)
The request-response technique should detect if a data communication transmission has been diverted.
(True/False)
4.8/5
(34)
Audit objectives in the electronic data interchange (EDI)environment include all of the following except
(Multiple Choice)
4.8/5
(39)
A worm is software program that replicates itself in areas of idle memory until the system fails.
(True/False)
4.9/5
(43)
Showing 41 - 60 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)